Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ... Part 1: General - Computer Security Resource Center - National ...

csrc.nist.gov
from csrc.nist.gov More from this publisher
31.07.2013 Views

March, 2007 protected in the event that a key is compromised. However, future keys are not protected. After a limited number of updates, new keying material shall be established by employing a fresh re-key operation (see Section 8.2.3.1). Key update is often used to limit the amount of data protected by a single key, but it shall not be used to replace a compromised key. 8.2.4 Key Derivation Function Symmetric and private cryptographic keys may be derived from other secret values, sometimes called master keys. The secret values and possibly other information are input into a function that outputs one or more derived keys. In contrast to key change, the derived keys are often used for new purposes, rather than for replacing the secret values from which they are derived. The derivation function shall be a non-reversible function so that the secret values cannot be determined from the derived keys. In addition, it shall not be possible to determine a derived key from other derived keys. It should be noted that the strength of the derived key is no greater than the strength of the derivation algorithm and the secret values from which the key is derived. Four key derivation cases are discussed below. 1. Two parties derive common keys from a common shared secret. This approach is used in the key agreement techniques specified in [SP800-56]. The security of this process is dependent on the security of the shared secret and the specific key derivation function used. If the shared secret is known, the derived keys may be determined. A key derivation function specified in [SP800-56] shall be used for this purpose. These derived keys may be used to provide the same confidentiality, authentication, and data integrity services as randomly generated keys 2. Individual entity keys are derived from a master key. This is often accomplished by using the master key, entity ID, and other known information as input to a function that generates the entity keys. The security of this process depends upon the security of the master key and the key derivation function. If one of the entities knows the master key, the other entity keys may all be generated. Therefore, keys derived from a master key are only as secure as the master key itself. As long as the master key is kept secret, these keys may be used in the same manner as randomly generated keys. 3. The individual entity key is derived from a master key and the entity password. These secret values are input to the key derivation function along with other known information. The security of a derived entity key is dependent upon the security of the master key, the security of the password, and the strength of the key derivation process. This form of key derivation is often used to add the entity authentication service to the derived keys. As long as the secret inputs are kept secret, these keys may be used in the same manner as randomly generated keys. The strength of the authentication service is only as strong as the security provided by the password. 4. The individual entity key is derived from the entity password 29 . This is accomplished using a password, entity ID, and other known information as input to the key derivation function. This technique differs from previous technique 3 since no master key is used. Therefore, the security of the process depends solely upon the security of the password 29 This technique is used in RSA PKCS #5. 107

March, 2007 and the key derivation process. If the entity password is known or can be guessed, then the corresponding derived entity key may be generated. Since the number of possible (or likely) passwords is often significantly smaller than the number of possible keys, keys derived in this manner are likely to be less secure than randomly generated keys. Keys derived in this case shall be used for authentication purposes only and not for general encryption. 8.3 Post-Operational Phase During the post-operational phase, keying material is no longer in operational use, but access to the keying material may still be possible. 8.3.1 Archive Storage and Key Recovery Functions An archive for keying material shall provide both integrity and access control. Integrity is required in order to protect the archived material from unauthorized modification, deletion, and insertion. Access control is needed to prevent unauthorized disclosure. Archived information shall be protected as specified in Section 6.2.2. When keying material is entered into the archive, it is often time stamped so that the date of entry can be determined. This date may itself be cryptographically protected so that it cannot be changed without detection. If the keying material needs to be recoverable after the end of its cryptoperiod, the keying material shall be either archived or the system shall be designed to allow reconstruction (e.g., rederivation) of the keying material. Acquiring the keying material from archive storage or by reconstruction is commonly known as key recovery. A key management archive is a repository containing keying material and other related information of historical interest. Not all keying material needs to be archived. An organization’s security plan should indicate the types of information that are to be archived (see Part 2). While in storage, archived information may be either static (i.e., never changing) or may need to be re-encrypted under a new archive encryption key. Archived data should be stored separately from operational data, and multiple copies of archived cryptographic information should be provided in physically separate locations (i.e., it is recommended that the key management archive be backed up). For critical information encrypted under archived keys, it may be necessary to back up archive keys and to store multiple copies of archived keys in separate locations. When archived, keying material should be archived prior to the end of the cryptoperiod of the key. When no longer required, the keying material shall be destroyed in accordance with Section 8.3.4. Archived cryptographic information requires protection in accordance with Section 6.2.2 and Section 8. Confidentiality is provided by an archive encryption key (one or more encryption keys that are used exclusively for the encryption of archived information), by another key that has been archived, or by a key that may be derived from an archived key. When encrypted by the archive encryption key, the encrypted keying material shall be re-encrypted by any new archive encryption key at the end of the cryptoperiod of the old archive encryption key. When the keying material is re-encrypted, integrity values on that keying material shall be 108

March, 2007<br />

and the key derivation process. If the entity password is known or can be guessed, then<br />

the corresponding derived entity key may be generated. Since the number of possible (or<br />

likely) passwords is often significantly smaller than the number of possible keys, keys<br />

derived in this manner are likely to be less secure than randomly generated keys. Keys<br />

derived in this case shall be used for authentication purposes only and not for general<br />

encryption.<br />

8.3 Post-Operational Phase<br />

During the post-operational phase, keying material is no longer in operational use, but access to<br />

the keying material may still be possible.<br />

8.3.1 Archive Storage and Key Recovery Functions<br />

An archive for keying material shall provide both integrity and access control. Integrity is<br />

required in order to protect the archived material from unauthorized modification, deletion, and<br />

insertion. Access control is needed to prevent unauthorized disclosure. Archived information<br />

shall be protected as specified in Section 6.2.2. When keying material is entered into the archive,<br />

it is often time stamped so that the date of entry can be determined. This date may itself be<br />

cryptographically protected so that it cannot be changed without detection.<br />

If the keying material needs to be recoverable after the end of its cryptoperiod, the keying<br />

material shall be either archived or the system shall be designed to allow reconstruction (e.g., rederivation)<br />

of the keying material. Acquiring the keying material from archive storage or by<br />

reconstruction is commonly known as key recovery.<br />

A key management archive is a repository containing keying material and other related<br />

information of historical interest. Not all keying material needs to be archived. An organization’s<br />

security plan should indicate the types of information that are to be archived (see <strong>Part</strong> 2).<br />

While in storage, archived information may be either static (i.e., never changing) or may need to<br />

be re-encrypted under a new archive encryption key. Archived data should be stored separately<br />

from operational data, and multiple copies of archived cryptographic information should be<br />

provided in physically separate locations (i.e., it is recommended that the key management<br />

archive be backed up). For critical information encrypted under archived keys, it may be<br />

necessary to back up archive keys and to store multiple copies of archived keys in separate<br />

locations.<br />

When archived, keying material should be archived prior to the end of the cryptoperiod of the<br />

key. When no longer required, the keying material shall be destroyed in accordance with<br />

Section 8.3.4.<br />

Archived cryptographic information requires protection in accordance with Section 6.2.2 and<br />

Section 8. Confidentiality is provided by an archive encryption key (one or more encryption<br />

keys that are used exclusively for the encryption of archived information), by another key that<br />

has been archived, or by a key that may be derived from an archived key. When encrypted by<br />

the archive encryption key, the encrypted keying material shall be re-encrypted by any new<br />

archive encryption key at the end of the cryptoperiod of the old archive encryption key. When<br />

the keying material is re-encrypted, integrity values on that keying material shall be<br />

108

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!