Cryptography done right is so strong it's near impossible to break, which creates a need for a cryptographic key escrow. In this video, discover what role key escrow plays and how it's used.
- [Instructor] Government Access Keys,…commonly referred to simply as GAK,…is the act of giving government full or partial access…to your encryption and decryption keys.…Now, the idea here is that you're not giving them full use…of those keys in all circumstances.…Those keys are only to be used or released…in specific circumstances…when a court warrant has been issued.…This is what's known as a type of key escrow.…This can also give access to keys in the event…that a company has shut down or no longer exists.…
So think of a company that is using a key…to encrypt information on someone's computer.…In the event that that company goes out of existence,…the government may have need to access…data that has been encrypted by that software.…If the company is no longer there,…the government has no recourse…through use of a court warrant to receive that key.…So key escrow is also a way of future-proofing in the event…that a company goes out of business,…and that those keys need accessed…under controlled and approved circumstances.…
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks