• Home
    • Contact

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ

    Table of Contents

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 5c9a

    Hello everyone๐Ÿ˜Š

    My name is Elif Hilal! ๐Ÿ”ฎ I have been working on Blockchain for years. Again, again and again, Iโ€™m back with another post! First of all, thank you for reading my articles and blog posts. If some do not know me or have heard my name for the first time, I will leave a link here to introduce myself! (All opinions are my own, it has nothing to do with the companies I work for)

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - facb

    Whatโ€™s in this content?

    ๐Ÿ”ต What is key management, and how does it work?

    ๐Ÿ”ต Encryption Key Management

    ๐Ÿ”ต Why is Key Management important?

    ๐Ÿ”ต How does key encryption work?

    ๐Ÿ”ต What are the encryption types?

    ๐Ÿ”ต What are symmetric and asymmetric cryptography?

    ๐Ÿ”ต What is a public key and private key?

    ๐Ÿ”ต What are encryption errors?

    ๐Ÿ”ต What should be considered in this regard? and more :)

    If youโ€™re ready, let's get started!

    ๐ŸŸฉ What is Key Management, and How Does It Work?

    Cryptographic keys are vital in protecting sensitive information, preventing data breaches, and complying with regulations. Unfortunately, a lost or stolen key can lead to costly system and data losses; therefore, any security-minded company should implement robust key management protocols. Especially if the company in question is a worldwide company, data security becomes more important. :) We donโ€™t want our data to be leaked all the time, do we?

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - c077

    ๐Ÿ”ท What is Encryption Key Management?

    Encryption key management is a set of practices and rules that ensure the secure use of cryptographic keys.

    Proper key management ensures that a key remains secure throughout its lifecycle, from generation, use, storage, and deletion.

    A cryptographic key is a file that, when processed by a crypto algorithm, corrupts a string of letters and numbers that can encrypt and decrypt data.

    The main purpose of key management is to keep these files away from unauthorized users and systems.

    ๐Ÿ”ด As you can imagine, losing a key can have serious consequences, so a solid encryption key management strategy is required. Well then, letโ€™s ask, what should a reliable and robust encryption key management include? :

    ๐ŸŽ— Those working at different stages and in different units should โ€œabsolutelyโ€ share instructions on how to manage keys

    ๐ŸŽ—Security measures should be taken to prevent unauthorized physical and virtual access to the server that stores the keys

    ๐ŸŽ— Policies should be set for key functions

    ๐ŸŽ— Role-based controls that define who can access keys and when

    ๐ŸŽ— Directions for how different departments should interact and coordinate keys should be predetermined

    When you read it, it sounds like itโ€™s straightforward and the precautions everyone takes, but unfortunately, itโ€™s not like that in real life ๐ŸŒš

    A business or workplace can approach key management in three different ways:

  • Decentralized: End users or employees are responsible for key management, and corporate governance does not undertake this. In this way, the most reliable key management is in question. So the responsibility is on the person himself.
  • Distributed: Each team or department has a separate key management protocol, while the workplace provides basic guidance. In this way, there is a more reliable structure than central systems.
  • Centralized: A policy set within the workplace determines how all staff and departments will use the keys. According to these policies, everything is stored centrally on servers.
  • ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 5976

    ๐ŸŸข If you ask me, the safest approach is to establish a centralized strategy and move to a decentralized structure once teams have complete control over how they store, share, and use private keys. So I believe there should be a central policy or a guide. This issue should not be risked!

    Why is Key Management Important?

    As I mentioned above, careful management of keys is vital for effectively using cryptography in cybersecurity strategy or in industries such as crypto.

    Itโ€™s similar to the key safe combination: No safe can stop a thief if the perpetrator knows how to unlock the safe. Similarly, weak key management can render even the best encryption algorithms worthless.

    ๐ŸŸก A compromised key allows an attacker to:

  • Can convert encrypted data back to original plain text format
  • They can create a phishing website that impersonates your official website
  • They can crash the entire security infrastructure
  • They can act as a privileged user and access different systems and databases
  • They can sign applications and documents on their behalf
  • ๐ŸŸก Reliable key management guarantees a high level of security regarding encrypted data and provides strictly:

  • Only authorized users can read or access data (which is the most essential measure for any business)
  • Secure data transfer over the Internet and private networks
  • Hackers canโ€™t easily infiltrate your systems
  • ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 0751

    ๐ŸŽ„So, How Does Key Encryption Work?

    Encryption is actually the first requirement of data privacy. We can summarize what encryption does as follows:

    Encryption; It allows us to exchange data while keeping a content unreadable by everyone except the sender and receiver.

    ๐ŸŸก But how? Encrypted data exchange is a two-step transaction :

  • First, algorithms mix the data in a series consisting of random-looking characters (encrypted text/ciphertext). The sender then transmits the encrypted text to the recipient.
  • When the recipient side receives the encrypted text, a password-solving key; returns the message to the original flat text form.
  • The most important information here is that during this process, information cannot be read by people who do not have the key to solve the password.

    ๐ŸŸก The encryption is completely automatic, and the two sides who exchange data do not need to code or solve the code. The main factors and operations in the encryption process are as follows:

  • ๐Ÿ’  The data encryption key (DEK): It is an encryption key that encrypts data and solves its password
  • ๐Ÿ’  The key encryption key (KEK): It is a key that encrypts and solves the password (the above Data is Encryption Key)
  • ๐Ÿ’  Key Management System (KMS): It is a system that stores and runs the key management software
  • ๐Ÿ’  Key management API (KM API): It is an API that receives encryption keys from a server to a client
  • ๐Ÿ’  A certificate authority (CA): It is a third-party asset that confirms the identity of users and systems through digital certificates.
  • ๐Ÿ’  Transport layer security (TLS): A cryptographic protocol protects data moving through a computer network.
  • ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - e662

    You can use encryption to protect your data, both fixed and on movement:

  • ๐Ÿ”˜ Waiting encryption: This type of encryption protects stored data. If computer pirates enter a database, they cannot decipher the information without a key. (You can see this as encryption at rest)
  • ๐Ÿ”˜ Encryption during transfer: This type of encryption protects motion and prevents intervention or manipulation. Typical examples are e-mails, short messages, and web data. (You can also see this as Encryption in Transit)
  • If we understand this, whatโ€™s the next issue now? Did I say it was a long article? :)

    ๐ŸŽˆ Types of Encryption

    Now letโ€™s go deeper; there are two main encryption types:

  • Symmetrical encryption
  • As the name suggests, in symmetrical encryption, the same key message both passwords and solves the password.
    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 8150
  • Asymmetric Encryption
  • As the name suggests, a key encrypts content and solves the password of a different key data. These two keys are mathematically related to each other.
    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 60ed

    As you can imagine, symmetrical encryption is easier to use and install. Because only 1 key is mentioned. However, relying on the same key to encode and solve the content makes this strategy less safe than asymmetric encryption. Therefore, the use of asymmetric encryption makes the system safer. Remember ๐ŸŽ‰

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 62b2

    ๐ŸŽจ Symmetrical Cryptography ๐ŸŽจ

    ๐Ÿ˜As I said at least three times above, symmetrical cryptography uses the same key for both data encryption and password-solving. ๐Ÿ˜… The privacy of the key is essential because a single key protects the whole process.

    Below, there is a diagram showing what a symmetrical encryption process looks like:

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 548c

    There is a diagram about how the process in the scheme above works, but I still want to explain step by step how this system works:

    1. First of all, the user sends a request to the application and asks him to access encrypted data. 2. Then the application sends the customerโ€™s request to the customerโ€™s KM API (Key Management). 3. The client (through KM API) and km confirm each otherโ€™s certificates 4. If the identity information is valid, KM API and KM will create a safe TLS connection 5. Km solves the requested dekโ€™s password with KEK (key encryption key) 6. Key Manager sends DEK to KM API 7. Then, KM API sends DEK to the application 8. And finally, the application sends straight text data to the user ๐Ÿ˜‡

    In the meantime, companies usually use symmetrical encryption to protect waiting data.

    Now if we have learned about symmetrical cryptography, there is asymmetric cryptography.

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 68b8

    ๐ŸŽจ What is Asymmetric Encryption?? ๐ŸŽจ

    As I mentioned above, there are two different keys in the asymmetric encryption. One of the two keys is to encrypt the data, and the other is to dissolve the password. Now what is important here is the separation of Public and Private Keys.

    โœ… Public Key

    A public key allows you to get crypto money transactions. While everyone can send transactions to Public Key, you need a private key to โ€œunlockโ€ and prove that you own the cryptocurrency taken in the transaction.

    You can freely share your Public Key without worrying. (Iban or e-mail sharing the same function). You may have seen donation pages for content creators or charities with open keys for crypto addresses online. Although everyone can donate, you will need Private Key to unlock and access the donated funds!

    An **public key** example is as follows :
    3048 0241 00C9 18FA CF8D EB2D EFD5 FD37 89B9 E069 EA97 FC20 5E35 F577 EE31 C4FB C6E4 4811 7D86 BC8F BAFA 362F 922B C01B CAB 423 CB040 CB021B CAB 4000 CR744 2654 C01B 2F40 CR74F 922B F01B 2F40 CR74F 922B F01B 2F40 CR74F 922B F01B 2F40 CR744 265B F01B 2F40 CRDS CRIGED
    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 2981

    โœ… Private Key

    A private Key solves the password of data and is a unique equivalent of the open key. It is very important to keep this key safe because there is only a way to solve the code of data with a Private Key.

    โš  โš  โš  Here is some essential advice that should not be forgotten: Never share your private key with anyone. The private key allows you to prove ownership or spend funds associated with your general address.

    A private key can be used in many ways:

  • 256 characters length binary code
  • 64 -step six -six code
  • QR Code
  • Like a reminder sentence..
  • (Let me talk about the wallets, the differences between wallets and the storage of keys in another article; this is already prolonged :)

    Both keys are unique, special and created at the same time.

    โœˆ Here is a diagram showing how the asymmetric encryption allowed the two sides to exchange files safely:

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - f069

    ๐Ÿ”ฑ Although this diagram summarizes most things, I still want to make a description of this diagram and summarize how asymmetric cryptography works.

    I hope nothing is understood in the parts I have explained so far; if you have a question mark, you know how you can reach me. ๐Ÿ˜Š

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - cda1

    โœ” What are the management errors of encryption keys?

    It is a mistake to ensure the safe use of encryption keys without considering every stage of a password's life cycle. If you are curious about other common mistakes made by companies, I can summarize as follows:

    - Trusting weak, extremely short keys and passwords - Using the same key for different purposes and tasks (for example, using a password for ten different websites) - Reuse of old key versions - Storing special keys on the same server or database as encrypted data - Keeping keys in an unexpected way - Transport of keys between systems and users without appropriate protection

    โœ” As a lawyer, I want to tell you about an area that I love very much. ๐Ÿคฉ

    โš– What should companies pay attention to about passwords? โš–

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - e52b

    Would you like to look at what your team or workplace should pay attention to at every stage of the life cycle of a key to ensure the safe use of encryption keys? If it is not paid attention to, it is an issue that creates a constant problem. โ˜บ

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 262d

    ๐Ÿ— Key Generation ๐Ÿ—

    Companies and business centers normally create encryption keys on a key management server and store them. First of all, make sure that the โ€œkey creation,โ€ which we call a generator to prevent hackers from using simple techniques to break the code, only creates long and complex keys.๐Ÿ’Š

    The server typically uses a safe random bit generator and stores the key in a storage database with all its attributes.

    ๐Ÿน As a second piece of information, I would like to say that a key manager should allow managers to regulate the key features at any time.๐Ÿ’Š

    ๐Ÿ’Š The key activation occurs during the creation or on a subsequent date (automatic or manual). In addition, defining a crypto period for each key makes it easier for you. This period is when the key is functional, ie working. Two factors affect the duration of the crypto period:

  • OUP โ€” originator usage period
  • RUP โ€” recipient usage period
  • Note: For example, you encrypt a database and plan to add items to it for the next six months. In this case, the OUP sits in six months. If you plan to allow users to access the database and use the database for two years, this is RUP. In this example, the crypto period is for two years because OUP and RUP coincide.

    ๐Ÿ’Š As another piece of advice, when you create a key, make sure that the server stores it in an encrypted situation. The keys should only be found uncomfortably in a safe, protected environment against manipulation. Also, do not store the key in the same database as the encrypted data it protects, which is very painful.

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - d226

    โœ… Key Use and Rollover๐Ÿ”‹

    ๐Ÿ”” The key manager has to allow authorized systems and users to get keys for encryption or passwordโ€”solving operations.

    The key manager has to allow authorized systems and users to get keys for encryption or password -solving operations.

    ๐Ÿ”” For example, if the software creates a new key every year and disables the old one (or directs it to the new one), the administrator must hold the previous versions of the key but must only distribute the current example.

    ๐Ÿ”” Today, many companies prefer to turn-key rotations into an automatic process. For additional security, you may also consider recording key usage to a technology diary and providing traces of control.

    ๐Ÿ”” Make sure that the team does not use the same key for different purposes. If a hacker seizes a single key, each task must work with a unique key to prevent potential lateral movement between the systems.

    Of course, these are my thoughts; whatever you want, you use it๐Ÿค—

    ๐Ÿ•น Key Revocation

    To manage everything, a manager should be able to use the key manager to cancel a key and prevent its use. Why is this important?

  • ๐ŸŸฉ Individuals can leave the company and want to be sure of the safety of passwords
  • ๐ŸŸฉ You archive certain processes and want to keep the key to the archives safe
  • ๐ŸŸฉ It is necessary to watch who has access to what
  • Reactivating a canceled key can help managers solve the password of encrypted data, such as old backups. However, it is important to know who has access to canceled keys. Therefore, the manager must follow the cancellations of the password.

    โœ… Backup ๐ŸŽ™

    All keys require a backup before being disabled, so the administrator must hold the mirror archive of all disabled keys.

    After the crypto period, the recovery allows managers to rebuild the keys if they need to re-activate (crypto period described above).

    The fact that a key is not recovered means that all the data remaining with the password is dissolved with the key is lost. There is nothing to do!

    Deleting Key๐Ÿ“ธ

    The manager can delete the key [storage database]. The deletion option is vital in these cases:

  • If the key is no longer in use
  • If someone is in jeopardizing the key
  • The removal of a key can delete all or part of the samples. If someone endangers encrypted data, the ability to quickly delete the key can keep the data safe and irrevocable. When the security team eliminates the threat, a manager can use the image to recreate the key and solve the data password.

    There is no safe cryptography without solid and reliable key management ๐ŸŽฌ ๐Ÿ˜‡

    I said so much in this article :) But Iโ€™m very excited about other articles!๐Ÿšฆ

    ๐Ÿง  ๐Ÿ’ป By the way, you can sign up for my Meetup page, join my Telegram group, and follow me on Twitter to be informed about the events I organize in the Blockchain ecosystem!๐Ÿ‘ป I hope my articles and contents are beneficial to you. ๐Ÿง‘โ€๐ŸŽค๐Ÿ‘ฉ๐Ÿผโ€๐ŸŽค Do not hesitate to contact me ๐Ÿ˜‰๐ŸŽ„

    ๐ŸŒป My Cryptography Guide ๐ŸŽจ image - 059d

    Let me leave a sunflower here ๐ŸŒป

    Karakod is a global software development firm specializing in AI, blockchain, IoT and more. We provide innovative solutions to help you protect and grow your business in the digital age.

    • Karakod LinkedIn
    • info@karakod.net

    The Digital Legal Guide โ€” Join the Newsletter!

    Subscribe to our newsletter for the latest insights on tech, startups, and more.

    Services

      Blockchain Infrastructure

      • Smart Contract Development
      • Private Blockchain Deployment
      • Node Operations & Integration
      • Token Economy Design
      • Decentralized Application Development
      • Blockchain Security Audit

      Cybersecurity & Cloud Security

      • Cloud Infrastructure Hardening
      • Security Operations & Monitoring
      • Zero-Trust Architecture
      • Identity & Access Management (IAM)
      • Threat Intelligence & Risk Assessment
      • Compliance & Security Frameworks

      AI Systems & Automation

      • Machine Learning Solutions
      • Intelligent Process Automation
      • AI Integration & Deployment
      • AI Audit
      • Computer Vision Solutions
      • Predictive Analytics & Automation
    ยฉ 2025 Karakod. All rights reserved.