Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
March, 2007<br />
B.3.13.2 Public Authorization Keys.................................................................134<br />
B.3.14 Other Cryptographically Related Material........................................................134<br />
B.3.14.1 Domain Parameters............................................................................135<br />
B.3.14.2 Initialization Vectors (IVs) ................................................................135<br />
B.3.14.3 Shared Secrets....................................................................................135<br />
B.3.14.4 RNG Seeds.........................................................................................135<br />
B.3.14.5 Other Public Information ...................................................................135<br />
B.3.14.6 Intermediate Results...........................................................................135<br />
B.3.14.7 Key Control Information....................................................................136<br />
B.3.14.8 Random Numbers ..............................................................................136<br />
B.3.14.9 Passwords...........................................................................................136<br />
B.3.14.10 Audit Information ..................................................................136<br />
B.4 Key Recovery Systems .................................................................................................136<br />
B.5 Key Recovery Policy ....................................................................................................137<br />
APPENDIX C: REFERENCES................................................................................................139<br />
APPENDIX D: REVISIONS.....................................................................................................141<br />
Tables<br />
Table 1: Recommended Cryptoperiods for key types................................................................... 55<br />
Table 2: Comparable strengths ..................................................................................................... 63<br />
Table 3: Hash function security strengths for cryptographic applications ................................... 64<br />
Table 4: Recommended algorithms and minimum key sizes ....................................................... 66<br />
Table 5: Protection requirements for cryptographic keys............................................................. 74<br />
Table 6: Protection requirements for other cryptographic or related material.............................. 77<br />
Table 7: Backup of keys ............................................................................................................. 104<br />
Table 8: Backup of other cryptographic or related information ................................................. 105<br />
Table 9: Archive of keys............................................................................................................. 109<br />
Table 10: Archive of other cryptographic related information................................................... 111<br />
Figures<br />
Figure 1: Symmetric key cryptoperiod (Example C).................................................................... 48<br />
Figure 2: Algorithm Originator Usage Period Example............................................................... 70<br />
13