31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

March, 2007<br />

5.6 Guidance for Cryptographic Algorithm and Key Size Selection....................................61<br />

5.6.1 Comparable Algorithm Strengths .......................................................................61<br />

5.6.2 Defining Appropriate Algorithm Suites..............................................................65<br />

5.6.3 Using Algorithm Suites.......................................................................................67<br />

5.6.4 Transitioning to New Algorithms and Key Sizes ...............................................68<br />

6 PROTECTION REQUIREMENTS FOR CRYPTOGRAPHIC INFORMATION .........72<br />

6.1 Protection Requirements.................................................................................................72<br />

6.1.1 Summary of Protection Requirements for Cryptographic Keys.........................73<br />

6.1.2 Summary of Protection Requirements for Other Cryptographic or Related<br />

Information .........................................................................................................76<br />

6.2 Protection Mechanisms...................................................................................................78<br />

6.2.1 Protection Mechanisms for Cryptographic Information in Transit.....................79<br />

6.2.1.1 Availability ..........................................................................................79<br />

6.2.1.2 Integrity................................................................................................79<br />

6.2.1.3 Confidentiality .....................................................................................80<br />

6.2.1.4 Association with Usage or Application ...............................................80<br />

6.2.1.5 Association with Other Entities ...........................................................81<br />

6.2.1.6 Association with Other Related Information .......................................81<br />

6.2.2 Protection Mechanisms for Information in Storage............................................81<br />

6.2.2.1 Availability ..........................................................................................81<br />

6.2.2.2 Integrity................................................................................................81<br />

6.2.2.3 Confidentiality ....................................................................................82<br />

6.2.2.4 Association with Usage or Application ...............................................82<br />

6.2.2.5 Association with the Other Entities .....................................................83<br />

6.2.2.6 Association with Other Related Information .......................................83<br />

6.2.3 Labeling of Cryptographic Information..............................................................83<br />

6.2.3.1 Labels for Keys....................................................................................83<br />

6.2.3.2 Labels for Related Cryptographic Information....................................84<br />

7 KEY STATES AND TRANSITIONS....................................................................................85<br />

7.1 Key States ...........................................................................................................................85<br />

7.2 Key State Transitions..........................................................................................................86<br />

7.3 States and Transitions for Asymmetric Keys......................................................................87<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!