Why is "not storing data protection keys" not a popular choice?
In the NIST SP 800-132, they specified two ways to use the data protection key (DPK) that is derived from a password. One of them is to use the DPK to encrypt data, and then, if I am not mistaken, destroying the DPK. To verify whether an… Continue reading Why is "not storing data protection keys" not a popular choice?