Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ... Part 1: General - Computer Security Resource Center - National ...

csrc.nist.gov
from csrc.nist.gov More from this publisher
31.07.2013 Views

March, 2007 8.2.3.1 Re-keying...........................................................................................106 8.2.3.2 Key Update Function .........................................................................106 8.2.4 Key Derivation Function...................................................................................107 8.3 Post-Operational Phase .................................................................................................108 8.3.1 Archive Storage and Key Recovery Functions.................................................108 8.3.2 Entity De-registration Function ........................................................................111 8.3.3 Key De-registration Function ...........................................................................112 8.3.4 Key Destruction Function.................................................................................112 8.3.5 Key Revocation Function .................................................................................112 8.4 Destroyed Phase............................................................................................................113 9 ACCOUNTABILITY, AUDIT, AND SURVIVABILITY .................................................113 9.1 Accountability...............................................................................................................114 9.2 Audit .............................................................................................................................114 9.3 Key Management System Survivability .......................................................................115 9.3.1 Back-up Keys....................................................................................................115 9.3.2 Key Recovery....................................................................................................115 9.3.3 System Redundancy/Contingency Planning.....................................................115 9.3.3.1 General Principles..............................................................................116 9.3.3.2 Cryptography and Key Management-specific Recovery Issues ........117 9.3.4 Compromise Recovery......................................................................................117 10KEY MANAGEMENT SPECIFICATIONS FOR CRYPTOGRAPHIC DEVICES OR APPLICATIONS...................................................................................................................119 10.1 Key Management Specification Description/Purpose ..................................................119 10.2 Content of the Key Management Specification............................................................120 10.2.1 Cryptographic Application................................................................................120 10.2.2 Communications Environment .........................................................................120 10.2.3 Key Management Component Requirements ...................................................120 10.2.4 Key Management Component Generation........................................................121 10.2.5 Key Management Component Distribution......................................................121 10.2.6 Keying Material Storage...................................................................................121 10.2.7 Access Control..................................................................................................121 10.2.8 Accounting........................................................................................................121 11

March, 2007 10.2.9 Compromise Management and Recovery.........................................................122 10.2.10 Key Recovery...................................................................................................122 APPENDIX A: CRYPTOGRAPHIC AND NON-CRYPTOGRAPHIC INTEGRITY AND AUTHENTICATION MECHANISMS...............................................................................123 APPENDIX B: KEY RECOVERY ..........................................................................................125 B.1 Recovery from Stored Keying Material........................................................................126 B.2 Recovery by Reconstruction of Keying Material .........................................................126 B.3 Conditions Under Which Keying Material Needs to be Recoverable ..........................126 B.3.1 Signature Key Pairs...........................................................................................127 B.3.1.1 Public Signature Verification Keys ...................................................127 B.3.1.2 Private Signature Keys.......................................................................127 B.3.2 Symmetric Authentication Keys.......................................................................128 B.3.3 Authentication Key Pairs ..................................................................................129 B.3.3.1 Public Authentication Keys ...............................................................129 B.3.3.2 Private Authentication Keys ..............................................................130 B.3.4 Symmetric Data Encryption Keys ....................................................................130 B.3.5 Symmetric Key Wrapping Keys .......................................................................131 B.3.6 Random Number Generation Keys...................................................................131 B.3.7 Symmetric Master Keys....................................................................................131 B.3.8 Key Transport Key Pairs...................................................................................132 B.3.8.1 Private Key Transport Keys...............................................................132 B.3.8.2 Public Key Transport Keys................................................................132 B.3.9 Symmetric Key Agreement Keys .....................................................................133 B.3.10 Static Key Agreement Key Pairs ......................................................................133 B.3.10.1 Private Static Key Agreement Keys ..................................................133 B.3.10.2 Public Static Key Agreement Keys....................................................133 B.3.11 Ephemeral Key Pairs.........................................................................................133 B.3.11.1 Private Ephemeral Keys.....................................................................134 B.3.11.2 Public Ephemeral Keys......................................................................134 B.3.12 Symmetric Authorization Keys.........................................................................134 B.3.13 Authorization Key Pairs....................................................................................134 B.3.13.1 Private Authorization Keys................................................................134 12

March, 2007<br />

10.2.9 Compromise Management and Recovery.........................................................122<br />

10.2.10 Key Recovery...................................................................................................122<br />

APPENDIX A: CRYPTOGRAPHIC AND NON-CRYPTOGRAPHIC INTEGRITY AND<br />

AUTHENTICATION MECHANISMS...............................................................................123<br />

APPENDIX B: KEY RECOVERY ..........................................................................................125<br />

B.1 Recovery from Stored Keying Material........................................................................126<br />

B.2 Recovery by Reconstruction of Keying Material .........................................................126<br />

B.3 Conditions Under Which Keying Material Needs to be Recoverable ..........................126<br />

B.3.1 Signature Key Pairs...........................................................................................127<br />

B.3.1.1 Public Signature Verification Keys ...................................................127<br />

B.3.1.2 Private Signature Keys.......................................................................127<br />

B.3.2 Symmetric Authentication Keys.......................................................................128<br />

B.3.3 Authentication Key Pairs ..................................................................................129<br />

B.3.3.1 Public Authentication Keys ...............................................................129<br />

B.3.3.2 Private Authentication Keys ..............................................................130<br />

B.3.4 Symmetric Data Encryption Keys ....................................................................130<br />

B.3.5 Symmetric Key Wrapping Keys .......................................................................131<br />

B.3.6 Random Number Generation Keys...................................................................131<br />

B.3.7 Symmetric Master Keys....................................................................................131<br />

B.3.8 Key Transport Key Pairs...................................................................................132<br />

B.3.8.1 Private Key Transport Keys...............................................................132<br />

B.3.8.2 Public Key Transport Keys................................................................132<br />

B.3.9 Symmetric Key Agreement Keys .....................................................................133<br />

B.3.10 Static Key Agreement Key Pairs ......................................................................133<br />

B.3.10.1 Private Static Key Agreement Keys ..................................................133<br />

B.3.10.2 Public Static Key Agreement Keys....................................................133<br />

B.3.11 Ephemeral Key Pairs.........................................................................................133<br />

B.3.11.1 Private Ephemeral Keys.....................................................................134<br />

B.3.11.2 Public Ephemeral Keys......................................................................134<br />

B.3.12 Symmetric Authorization Keys.........................................................................134<br />

B.3.13 Authorization Key Pairs....................................................................................134<br />

B.3.13.1 Private Authorization Keys................................................................134<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!