31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

15. Private ephemeral key agreement key:<br />

March, 2007<br />

a. Type Considerations: Private ephemeral key agreement keys are the private key<br />

elements of asymmetric key pairs that are used in a single transaction to establish one or<br />

more keys. Private ephemeral key agreement keys may be used to establish symmetric<br />

keys (e.g., key wrapping keys) or other secret keying material.<br />

b. Cryptoperiod: Private ephemeral key agreement keys are used for a single key<br />

agreement transaction. However, a private ephemeral key may be used multiple times to<br />

establish the same symmetric key with multiple parties during the same transaction<br />

(broadcast). The cryptoperiod of a private ephemeral key agreement key is the duration of<br />

a single key agreement transaction.<br />

16. Public ephemeral key agreement key:<br />

a. Type Considerations: Public ephemeral key agreement keys are the public key<br />

elements of asymmetric key pairs that are used only once to establish one or more keys.<br />

b. Cryptoperiod: Public ephemeral key agreement keys are used for a single key<br />

agreement transaction. The cryptoperiod of a public ephemeral key agreement key is the<br />

duration of a single key agreement transaction.<br />

17. Symmetric authorization key:<br />

a. Type Considerations: A symmetric authorization key may be used for an extended<br />

period of time, depending on the resources that are protected and the role of the entity<br />

authorized for access. For this key type, the originator usage period and the recipient<br />

usage period are the same, and therefore the equal to the cryptoperiod of the symmetric<br />

authorization key. Primary considerations in establishing the cryptoperiod for symmetric<br />

authorization keys include the robustness of the key, the adequacy of the cryptographic<br />

method, and the adequacy of key protection mechanisms and procedures.<br />

b. Cryptoperiod: Given the use of FIPS-Approved algorithms and key sizes, and an<br />

expectation that the security of the key storage and use environment will increase as the<br />

sensitivity and criticality of the authorization processes increases, it is recommended that<br />

cryptoperiods be no more than two years.<br />

18. Private authorization key:<br />

a. Type Considerations: A private authorization key may be used for an extended period<br />

of time, depending on the resources that are protected and the role of the entity authorized<br />

for access. Primary considerations in establishing the cryptoperiod for private<br />

authorization keys include the robustness of the key, the adequacy of the cryptographic<br />

method, and the adequacy of key protection mechanisms and procedures. The<br />

cryptoperiod of the private authorization key and its associated public key shall be the<br />

same.<br />

b. Cryptoperiod: Given the use of FIPS-Approved algorithms and key sizes, and an<br />

expectation that the security of the key storage and use environment will increase as the<br />

sensitivity and criticality of the authorization processes increases, it is recommended that<br />

cryptoperiods for private authorization keys be no more than two years.<br />

54

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!