31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

March, 2007<br />

and the method of key recovery requires reconstruction of the derived key from the<br />

master key, then the master key should be backed up or archived.<br />

B.3.8 Key Transport Key Pairs<br />

A key transport key pair may be used to transport keying material from an originating entity to a<br />

receiving entity during communications, or to protect keying material while in storage. The<br />

originating entity in a communication (or the entity initiating the storage of the keying material)<br />

uses the public key to encrypt the keying material; the receiving entity (or the entity retrieving<br />

the stored keying material) uses the private key to decrypt the encrypted keying material.<br />

B.3.8.1 Private Key Transport Keys<br />

If a key transport key pair is only used during communications, then the private key transport<br />

key does not need to be backed up if a replacement key pair can be generated and distributed in a<br />

timely fashion. Alternatively, one or more additional key pairs could be made available (i.e.,<br />

already generated and distributed). Otherwise, the private key should be backed up. The private<br />

key transport key may be archived.<br />

If the transport key pair is used only during storage, then the private key transport key should be<br />

backed up or archived for as long as the protected keying material may need to be accessed.<br />

However, at some time the strength of the cryptography may be reduced or lost completely. The<br />

key transport algorithm may no longer offer adequate security or the private key transport key<br />

may have been compromised. If the key transport algorithm has been withdrawn or the<br />

cryptoperiod of the private key transport key has expired, the cryptographic protection shall be<br />

regarded as minimal. Appropriate storage systems are being developed that employ<br />

cryptographic time stamps to store sensitive data beyond the normal security life of the original<br />

key transport algorithm or its keys.<br />

If the transport key pair is used during both communications and storage of keying material, then<br />

the private key transport key should be backed up or archived for as long as the protected keying<br />

material may need to be accessed. However, at some time the strength of the cryptography may<br />

be reduced or lost completely. If the key transport algorithm has been withdrawn or the<br />

cryptoperiod of the private key transport key has expired, the cryptographic protection shall be<br />

regarded as minimal.<br />

B.3.8.2 Public Key Transport Keys<br />

If the sending entity (the originating entity in a communications) loses the public key transport<br />

key or determines that the key has been corrupted, the key can be reacquired from the key pair<br />

owner or by obtaining the public key certificate containing the public key (if the public key was<br />

certified).<br />

If the entity that applies the cryptographic protection to keying material that is to be stored<br />

determines that the public key transport key has been lost or corrupted, the entity may recover in<br />

one of the following ways:<br />

1. If the public key has been certified and is stored elsewhere within the infrastructure, then<br />

the certificate can be requested.<br />

2. If some other entity knows the public key (e.g., the other entity is the actual owner of the<br />

key pair), the key can be requested from this other entity.<br />

132

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!