An Entity of Type: software, from Named Graph: http://dbpedia.org, within Data Space: dbpedia.org

The offline private key protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used to decrypt that data. The protocol is based on three rules regarding the key. An offline private key should: To comply with these rules, the offline private key protocol uses a method of asymmetric key wrapping.

Property Value
dbo:abstract
  • The offline private key protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used to decrypt that data. The protocol is based on three rules regarding the key. An offline private key should: * not be stored with the encrypted data (obviously) * not be kept by the organisation that physically stores the encrypted data, to ensure privacy * not be stored at the same system as the original data, to avoid the possibility that theft of only the private key would give access to all data at the storage provider; and to avoid that when the key would be needed to restore a backup, the key would be lost together with the data loss that made the restore necessary in the first place To comply with these rules, the offline private key protocol uses a method of asymmetric key wrapping. (en)
dbo:wikiPageID
  • 14242021 (xsd:integer)
dbo:wikiPageLength
  • 2583 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID
  • 828453220 (xsd:integer)
dbo:wikiPageWikiLink
dbp:wikiPageUsesTemplate
dcterms:subject
gold:hypernym
rdf:type
rdfs:comment
  • The offline private key protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used to decrypt that data. The protocol is based on three rules regarding the key. An offline private key should: To comply with these rules, the offline private key protocol uses a method of asymmetric key wrapping. (en)
rdfs:label
  • Offline private key protocol (en)
owl:sameAs
prov:wasDerivedFrom
foaf:isPrimaryTopicOf
is dbo:wikiPageWikiLink of
is foaf:primaryTopic of
Powered by OpenLink Virtuoso    This material is Open Knowledge     W3C Semantic Web Technology     This material is Open Knowledge    Valid XHTML + RDFa
This content was extracted from Wikipedia and is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License