About 23,300 results
Open links in new tab
  1. DEK, KEK and Master key - Information Security Stack Exchange

    Mar 2, 2016 · This article is intended to be a simplified explanation sans drill-down for people wanting to understand these concepts/terms. What are DEK, KEK and MEK/Master key?

  2. encryption - Why not use the KEK directly to encrypt data ...

    Jan 4, 2023 · The DEK never changes: you don't want to re-encrypt every single file, so you don't change the DEK. You may want to change the KEK: if your KEK expires, got compromised, or …

  3. How do SED drives generate the DEK? - Information Security Stack …

    Mar 6, 2017 · The DEK is used to encrypt all content on the drive. In the case the drive needs to be securely wiped, the DEK can simply be erased, regardless of whether or not the AK is set. …

  4. cryptography - Exchange of DEK and KEK (encryption keys) …

    To make the system more secure, instead of storing DEK in plain text in the app server, it is stored in encrypted form (en_dek) in the app server. The key to encrypt the DEK is stored in a …

  5. Browser- side caching of encrypted sensitive informations in ...

    Nov 20, 2024 · The DEK (data encryption key) used to decrypt user data will be stored with the WebCrypto API as a non-extractable key. The CryptoKey object itself will get stored in the …

  6. Is it Secure to Use a Single AES-GCM Encryption Key for an Entire ...

    Jan 6, 2025 · A better option is to have two keys: A data encryption key (DEK) which encrypts the data and a key encryption key (KEK) which encrypts the DEK. When you rotate the KEK, you …

  7. How to properly encode in PEM an RSA private key encrypted with …

    Feb 19, 2022 · @Robert: that's incorrect; for PKCS8 keys, the unencrypted and encrypted forms use different PEM labels and ASN.1 structures, but for the 'legacy' PKCS1 format with label …

  8. Use of TPM to encrypt data of my application in practice

    Jul 11, 2024 · To perform cryptographic operations, you decrypt the DEK with the KEK and then use it together with the CPU to encrypt or decrypt data. Both approaches solve the problem of …

  9. password management - Information Security Stack Exchange

    Oct 14, 2022 · The below is some JavaDoc from a different bit of code that is for using a DEK to protect secrets like credentials in an application. public class SecretGenerator extends …

  10. How to decrypt ECDSA_secp256k1 private key from PEM format …

    Jun 12, 2023 · OpenSSL's 'legacy' or 'traditional' privatekey (PEM) encryption uses OpenSSL's EVP_BytesToKey which is based on (in this case equal to) PBKDF1, with MD5 n=1 and using …