31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

March, 2007<br />

8.2.3.1 Re-keying...........................................................................................106<br />

8.2.3.2 Key Update Function .........................................................................106<br />

8.2.4 Key Derivation Function...................................................................................107<br />

8.3 Post-Operational Phase .................................................................................................108<br />

8.3.1 Archive Storage and Key Recovery Functions.................................................108<br />

8.3.2 Entity De-registration Function ........................................................................111<br />

8.3.3 Key De-registration Function ...........................................................................112<br />

8.3.4 Key Destruction Function.................................................................................112<br />

8.3.5 Key Revocation Function .................................................................................112<br />

8.4 Destroyed Phase............................................................................................................113<br />

9 ACCOUNTABILITY, AUDIT, AND SURVIVABILITY .................................................113<br />

9.1 Accountability...............................................................................................................114<br />

9.2 Audit .............................................................................................................................114<br />

9.3 Key Management System Survivability .......................................................................115<br />

9.3.1 Back-up Keys....................................................................................................115<br />

9.3.2 Key Recovery....................................................................................................115<br />

9.3.3 System Redundancy/Contingency Planning.....................................................115<br />

9.3.3.1 <strong>General</strong> Principles..............................................................................116<br />

9.3.3.2 Cryptography and Key Management-specific Recovery Issues ........117<br />

9.3.4 Compromise Recovery......................................................................................117<br />

10KEY MANAGEMENT SPECIFICATIONS FOR CRYPTOGRAPHIC DEVICES OR<br />

APPLICATIONS...................................................................................................................119<br />

10.1 Key Management Specification Description/Purpose ..................................................119<br />

10.2 Content of the Key Management Specification............................................................120<br />

10.2.1 Cryptographic Application................................................................................120<br />

10.2.2 Communications Environment .........................................................................120<br />

10.2.3 Key Management Component Requirements ...................................................120<br />

10.2.4 Key Management Component Generation........................................................121<br />

10.2.5 Key Management Component Distribution......................................................121<br />

10.2.6 Keying Material Storage...................................................................................121<br />

10.2.7 Access Control..................................................................................................121<br />

10.2.8 Accounting........................................................................................................121<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!