31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8. Symmetric and Asymmetric RNG keys:<br />

March, 2007<br />

a. Type Considerations: Symmetric and asymmetric RNG keys are used in deterministic<br />

random number generation functions. The Approved RNGs control key changes (e.g.,<br />

during reseeding).<br />

b. Cryptoperiod: Assuming the use of Approved RNGs, the cryptoperiod of symmetric<br />

and asymmetric RNG keys is determined by the design of the RNG.<br />

9. Symmetric master key:<br />

a. Type Considerations: A symmetric master key may be used multiple times to derive<br />

other keys using a (one-way) key derivation function (see Section 8.2.4). Therefore, the<br />

cryptoperiod consists of only an originator usage period for this key type. A suitable<br />

cryptoperiod depends on the nature and use of the keys derived from the master key and<br />

on considerations provided earlier in Section 5.3. The cryptoperiod of a key derived from<br />

a master key could be relatively short, e.g., a single use, communication session, or<br />

transaction. Alternatively, the master key could be used over a longer period of time to<br />

derive (or re-derive) multiple keys for the same or different purposes. The cryptoperiod<br />

of the derived keys depends on their use (e.g., as symmetric encryption or authentication<br />

keys).<br />

b. Cryptoperiod: An appropriate cryptoperiod for the symmetric master key might be 1<br />

year, depending on its usage environment and the sensitivity/criticality of the information<br />

protected by the derived keys and the number of keys derived from the master key.<br />

10. Private key transport key:<br />

a. Type Considerations: A private key transport key may be used multiple times. Due to<br />

the potential need to decrypt keys some time after they have been encrypted for transport,<br />

the cryptoperiod of the private key transport key may be longer than the cryptoperiod of<br />

the associated public key. The cryptoperiod of the private key is the length of time during<br />

which any keys encrypted by the associated key transport public key need to be<br />

decrypted.<br />

b. Cryptoperiod: Given 1) the use of FIPS-Approved algorithms and key sizes, 2) the<br />

volume of information that may be protected by keys encrypted under the associated<br />

public transport key, and 3) an expectation that the security of the key storage and use<br />

environment will increase as the sensitivity and/or criticality of the processes for which<br />

the key provides protection increases; a maximum cryptoperiod of about 2 years is<br />

recommended. In certain applications (e.g., email), where received messages are stored<br />

and decrypted at a later time, the cryptoperiod of the private key transport key may<br />

exceed the cryptoperiod of the public key transport key.<br />

11. Public key transport key:<br />

a. Type Considerations: The cryptoperiod for the public key transport key is that period<br />

of time during which the public key may be used to actually apply the encryption<br />

operation to the keys that will be protected. Public key transport keys can be public<br />

knowledge. The driving factor in establishing the public key transport key cryptoperiod is<br />

the cryptoperiod of the associated private key transport key. As indicated in the private<br />

key transport key discussion, due to the potential need to decrypt keys some time after<br />

52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!