There are many issues to be considered with key management.

  • Securely distribute your keys to your remote nodes.
  • Have key revocation procedures in place to have your remote nodes replace lost or stolen keys.
  • Consider key aging; a hacker's odds of success are increased as more cipher text becomes available.
  • The hacker may perform a successful crypto-analytic attack and guess your key.