Sadece bu master password sizin ihtiyacının emin olmak için,
- Is it expected to be used only as a '
encrypt this
' command that will 'seal' something
which can then only be opened by someone knowing the private key in question? Or,
- Is it something you expect to open any encryption done in the enterprise?
- Ben sadece cümleleme bu ikinci şekilde de yorumlanabilir değil emin olmak istiyorum
- your phrase '
decrypt any data
' sounds dangerous
(and not-feasible/practical with asymmetric key encryption)
Yorumlarınız dayalı güncelleme.
- You are planning for two copies of the data each encrypted with different keys
- one copy is to be encrypted with the master public key
- can be decrypted with anyone having the master private key
the master private key must then be secured (public key is not critical)
- second copy
Rijndael 256
anahtarla şifreli olması
- purpose is to allow the master to decrypt the data whenever required
particularly, in the absence of the individual who encrypted it
This approach will work for,
easy access of the data by the individual with the Rijndael key,
without need for intervention by the master private key owner.
And, when the master private key owner is trusted with the secrecy of the data.
Sizin düzeni kullanıcı kendi kopyasını güncellemeleri her zaman (biri eski ve yeni bir re-şifreleyerek silme) ana kopyasını güncellemeniz gerekir.
Bununla birlikte, eğer user data is trusted with the master (burada açık bir şekilde olduğu gibi),
- an easier approach ustadan Rijndael anahtarı sorunu olacaktır
- Usta bu usta-genel anahtarla kendisi ile şifrelenmiş tutmak olabilir
- The data can then be encrypted with just the issued Rijndael key
- it will always be accessible with the master-private key
which can open the user's Rijndael key
If the user needs to sign the data, that can be accomplished separately in the process.
It will save you from keeping double copies and maintaining them.
To sign the data, kullanıcı onlar tarafından oluşturulan aa anahtar çifti olabilir.
- Rijndael özel anahtarı ile verileri şifreleyerek önce
- master-public key user-private-key buna eklenebilir ile şifrelenmiş
- the user-public key shared with the master (at least)
will be sufficient to authenticate that the user has provided the data
- In a worst-case scenario, if the user is unavailable and the key confirmation fails,
the master may be trusted on the authenticity of the data -- which can still be decrypted