Skip to main content

key compromise

Definition

Basically there are three infrastructures that are included in “key management” systems that must be protected:

  • Key pair creation and storage
  • Event signing
  • Event signature verification So when we say “key compromise” we really mean compromise of one of those three things.

More information

More in the security sections of Universal Identifier Theory