There are many issues to be considered with key management.
- Securely distribute your keys to your remote nodes.
- Have key revocation procedures in place to have your remote nodes replace lost or stolen keys.
- Consider key aging; a hacker's odds of success are increased as more cipher text becomes available.
- The hacker may perform a successful crypto-analytic attack and guess your key.
|