• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Which statement describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?

  • The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.
  • Systems can only store a certain number of keys and could be unable to generate new keys for communication.
  • It increases the risk of duplicate keys existing for the key space of the algorithm.
  • The risk of weaker keys being generated increases as the number of keys stored increases.
Explanation & Hint:

The statement that describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data is:

  • The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.

This is known as a “store now, decrypt later” attack, where an attacker who has recorded encrypted traffic waits until they can obtain the session key—through various means like key compromise, cryptanalysis, or brute force attacks. If the attacker succeeds in obtaining the key and the key has not been destroyed, they can then decrypt the previously captured communications. This is why it’s important for session keys to be ephemeral, meaning they are destroyed at the end of the session, to minimize the window of opportunity for such an attack.

For more Questions and Answers:

Data Security Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments