T 2.19 Inadequate key management for encryption

If cryptographic systems are used to protect the confidentiality of data during transmission, then inadequate key management can undermine the desired level of protection when

Examples:

However, not only the disclosure of cryptographic keys can lead to serious problems, but their loss as well. Cryptographic keys can

When keys become unavailable, the data protected by them can no longer be decrypted or tested for authenticity.