Information, Computer and Network Security Terms Glossary and
Key file only contains keys used for encryption. Some encryption programs store the encryption keys in a file where they can be conveniently accessed. Usually, the keys are themselves strongly encrypted, but you do not then need to enter each key as it is used. This helps ensure that if the key file is stolen, it will be of limited use to the attacker.