Patterns are based on scientific sources.
| Name | Create Keys When Needed |
| Sources | (Garfinkel, 2005), (Ylönen, 1996) |
| Synonyms | None |
| Context | The use of encryption between unauthenticated endpoints protects the data from passive eavesdropping. These attacks are easier than active man-in-the-middle attacks, so it makes sense to defend against them by default. |
| Problem | How to protect data from passive eavesdropping? |
| Solution | Ensure that cryptographic protocols that can use keys will have access to keys, even if those keys were not signed by the private key of a well-known certificate authority. |
| Examples | Most SSH distributions are configured to automatically create host keys when the server starts if no keys are found. Source: (Garfinkel, 2005) |
| Implementation | When a program that can use an X.509 certificate for authentication discovers that it does not have an X.509 certificate, a self-signed certificate should be made for default use. |
| Consequences | Systems that require cryptographic keys can be immediately used without the need to obtain certification from third-parties. This allows for both confidentiality and integrity protection without authentication control, which is better than no cryptographic protection at all. |
| Dependencies | None |
| Relationships | [Key Continuity Management] [Track Received Keys] |
| Principles | [Good Security Now] |
| Guidelines | None |
| Check lists | None |
| Use cases | None |
| Tags | Key Management |
| Log history | [01/18/2016]: Added to repository |
Garfinkel, S.L., 2005. Design principles and patterns for computer systems that are simultaneously secure and usable (PhD thesis). Massachusetts Institute of Technology.
Ylönen, T., 1996. SSH: Secure login connections over the internet, in: Proceedings of the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, SSYM’96. USENIX Association, Berkeley, CA, USA, pp. 4–4.