About 50 results
Open links in new tab
  1. DEK, KEK and Master key - Information Security Stack Exchange

    Mar 2, 2016 · This article is intended to be a simplified explanation sans drill-down for people wanting to understand these concepts/terms. What are DEK, KEK and MEK/Master key?

  2. encryption - Why not use the KEK directly to encrypt data ...

    Jan 4, 2023 · The DEK never changes: you don't want to re-encrypt every single file, so you don't change the DEK. You may want to change the KEK: if your KEK expires, got compromised, or you …

  3. cryptography - Exchange of DEK and KEK (encryption keys) between …

    To make the system more secure, instead of storing DEK in plain text in the app server, it is stored in encrypted form (en_dek) in the app server. The key to encrypt the DEK is stored in a totally separate …

  4. How do SED drives generate the DEK? - Information Security Stack …

    Mar 6, 2017 · The DEK is used to encrypt all content on the drive. In the case the drive needs to be securely wiped, the DEK can simply be erased, regardless of whether or not the AK is set. According …

  5. Hierarchical Key Rotation. Should I rotate the lowest level keys?

    Jan 17, 2021 · Ultimately, your DEK is the critical one - if someone has your data and your DEK then it is game over. Moreover, if someone has access to your data and the DEK then rotating all the other …

  6. Why is there a "des-ede3-cbc" in my rsa private key?

    Why is there des-ede3-cbs in my rsa private key? Because your private key is encrypted with that. As far as I know "DES" is an encryption standard from the seventies and it's considered broken. Yup. Pretty …

  7. Is it Secure to Use a Single AES-GCM Encryption Key for an Entire ...

    Jan 6, 2025 · A better option is to have two keys: A data encryption key (DEK) which encrypts the data and a key encryption key (KEK) which encrypts the DEK. When you rotate the KEK, you only have to …

  8. Can AWS KMS be used for both KEK and DEK for PCI DSS?

    Jun 24, 2019 · There's nothing within the PCI DSS which would prevent you from using AWS KMS for both the KEK and the DEK. You should ensure you're generating strong keys, the KEK is equivalent …

  9. Thales HSM: relationship between the various key types?

    Dec 19, 2019 · I am going through the Thales HSM manuals, and frankly the key acronyms are driving me crazy. I would like to understand the differences between the following keys, and how they relate …

  10. encryption - How to decrypt the Encrypted DEK using KEK which are ...

    Decrypting the DEK using KEK under PCI-Standards, which are separated by Servers: Let say for example we have server1 and server2 Server1: It is in East US, called it as Application Server. Host...