--%>

Master key and session key

Specify some of the difference between master key and session key?

E

Expert

Verified

Session key:

a) Communication between end systems is encrypted by using the temporary key, generally known as the session key.

b) The session key is used for duration of the logical connection, like the frame relay connection or transport connection, and then it is discarded.

Master key:

a) Session keys are broadcasted within the encrypted form, by using the master key which is shared by keys distribution center and an end system.

b) For each end system or user, there exists a unique master key which it shares along with the key distribution center. These master keys should be distributed in some fashion.

   Related Questions in Computer Network Security

  • Q : Components in a typical security policy

    There are numerous components in a typical security policy. Explain three important components.

  • Q : Techniques for distribution of public

    plain the techniques that are used for the distribution of public key.

  • Q : E-mail compatibility function in PGP

    Explain the need of E-mail compatibility function in PGP?

  • Q : What is Service set id or SSID-LAN

    SSID (Service set id): SSID is an identifier of the users of the network. SSID acts as a password and it is of 32 characters. The users in the particular network need to know the SSID. Since only users have the 32 SSID, the attackers cannot access the

  • Q : Problems with one-time pad Explain the

    Explain the two problems which are there along with the one-time pad?

  • Q : Situations for confidentiality attacks

    List the potential situations for confidentiality attacks for the user workstations in the typical business environment.

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Access control list or ACL ACL (Access

    ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put

  • Q : Purpose of State array State the

    State the purpose of State array?

  • Q : LAN Security Systems LAN Security

    LAN Security Systems: The threats might be of very serious concern to the organization and hence they should be addressed with the deployment of a security system which can prevent the attacker to access the information which is sensitive to the organ