About 36,100 results
Open links in new tab
  1. DEK, KEK and Master key - Information Security Stack Exchange

    Mar 2, 2016 · This article is intended to be a simplified explanation sans drill-down for people wanting to understand these concepts/terms. What are DEK, KEK and MEK/Master key?

  2. How do SED drives generate the DEK? - Information Security Stack …

    Mar 6, 2017 · The DEK is used to encrypt all content on the drive. In the case the drive needs to be securely wiped, the DEK can simply be erased, regardless of whether or not the AK is set. …

  3. cryptography - Exchange of DEK and KEK (encryption keys) …

    To make the system more secure, instead of storing DEK in plain text in the app server, it is stored in encrypted form (en_dek) in the app server. The key to encrypt the DEK is stored in a …

  4. encryption - Why not use the KEK directly to encrypt data ...

    Jan 4, 2023 · The DEK never changes: you don't want to re-encrypt every single file, so you don't change the DEK. You may want to change the KEK: if your KEK expires, got compromised, or …

  5. Hierarchical Key Rotation. Should I rotate the lowest level keys?

    Jan 17, 2021 · Ultimately, your DEK is the critical one - if someone has your data and your DEK then it is game over. Moreover, if someone has access to your data and the DEK then rotating …

  6. Is it Secure to Use a Single AES-GCM Encryption Key for an Entire ...

    Jan 6, 2025 · A better option is to have two keys: A data encryption key (DEK) which encrypts the data and a key encryption key (KEK) which encrypts the DEK. When you rotate the KEK, you …

  7. How to decrypt ECDSA_secp256k1 private key from PEM format …

    Jun 12, 2023 · OpenSSL's 'legacy' or 'traditional' privatekey (PEM) encryption uses OpenSSL's EVP_BytesToKey which is based on (in this case equal to) PBKDF1, with MD5 n=1 and using …

  8. Browser- side caching of encrypted sensitive informations in ...

    Nov 20, 2024 · The DEK (data encryption key) used to decrypt user data will be stored with the WebCrypto API as a non-extractable key. The CryptoKey object itself will get stored in the …

  9. Checking if an RSA private key is passphrase protected

    Aug 16, 2018 · The 'legacy' (OpenSSL) unencrypted format does start with MII (which is 30 82, the first two octets of all reasonable-sized ASN.1 DER SEQUENCEs, and encrypted does not, …

  10. password management - Information Security Stack Exchange

    Oct 14, 2022 · The below is some JavaDoc from a different bit of code that is for using a DEK to protect secrets like credentials in an application. public class SecretGenerator extends …