31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

March, 2007<br />

B.3.13.2 Public Authorization Keys.................................................................134<br />

B.3.14 Other Cryptographically Related Material........................................................134<br />

B.3.14.1 Domain Parameters............................................................................135<br />

B.3.14.2 Initialization Vectors (IVs) ................................................................135<br />

B.3.14.3 Shared Secrets....................................................................................135<br />

B.3.14.4 RNG Seeds.........................................................................................135<br />

B.3.14.5 Other Public Information ...................................................................135<br />

B.3.14.6 Intermediate Results...........................................................................135<br />

B.3.14.7 Key Control Information....................................................................136<br />

B.3.14.8 Random Numbers ..............................................................................136<br />

B.3.14.9 Passwords...........................................................................................136<br />

B.3.14.10 Audit Information ..................................................................136<br />

B.4 Key Recovery Systems .................................................................................................136<br />

B.5 Key Recovery Policy ....................................................................................................137<br />

APPENDIX C: REFERENCES................................................................................................139<br />

APPENDIX D: REVISIONS.....................................................................................................141<br />

Tables<br />

Table 1: Recommended Cryptoperiods for key types................................................................... 55<br />

Table 2: Comparable strengths ..................................................................................................... 63<br />

Table 3: Hash function security strengths for cryptographic applications ................................... 64<br />

Table 4: Recommended algorithms and minimum key sizes ....................................................... 66<br />

Table 5: Protection requirements for cryptographic keys............................................................. 74<br />

Table 6: Protection requirements for other cryptographic or related material.............................. 77<br />

Table 7: Backup of keys ............................................................................................................. 104<br />

Table 8: Backup of other cryptographic or related information ................................................. 105<br />

Table 9: Archive of keys............................................................................................................. 109<br />

Table 10: Archive of other cryptographic related information................................................... 111<br />

Figures<br />

Figure 1: Symmetric key cryptoperiod (Example C).................................................................... 48<br />

Figure 2: Algorithm Originator Usage Period Example............................................................... 70<br />

13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!