Distributed File System | prof. Giovanni Chiola | ![]() |
Best keys for symmetric encryption should be chosen at random, in order to prevent key-guessing attacks. | ||
Different "session keys" should be used to cipher different files. | ||
Pass-phrases can be converted in good fixed size keys by application of Hash functions. | ||
Session keys can be encrypted using symmetric ciphers by means of hashed pass-phrases. | ||
Encrypted session keys can be stored remotely without comprimising security. | ||
previous | crypt03.htm | next |