Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ... Part 1: General - Computer Security Resource Center - National ...

csrc.nist.gov
from csrc.nist.gov More from this publisher
31.07.2013 Views

19. Public authorization key: March, 2007 a. Type Considerations: A public authorization key is the public element of an asymmetric key pair used to verify privileges for an entity that possesses the associated private key. The length of the public authorization key cryptoperiod is of far less concern, from a security point of view, than is that of the associated private key. b. Cryptoperiod: The cryptoperiod of the public authorization key shall be the same as the authorization private key: no more than two years. Table 1 below is a summary of the cryptoperiods that are recommended for each key type. Table 1: Recommended Cryptoperiods for key types 13 Key Type Originator Usage Period (OUP) Cryptoperiod Recipient Usage Period 1. Private Signature Key 1-3 years 2. Public Signature Key Several years (depends on key size) 3. Symmetric Authentication Key < 2 years < OUP + 3 years 4. Private Authentication Key 1-2 years 5. Public Authentication Key 1-2 years 6. Symmetric Data Encryption Keys 7. Symmetric Key Wrapping Key 8. Symmetric and asymmetric RNG Keys < 2 years < OUP + 3 years < 2 years < OUP + 3 years Upon reseeding 9. Symmetric Master Key About 1 year 10. Private Key Transport Key < 2 years 14 11. Public Key Transport Key 1-2 years 13 In some cases risk factors affect the cryptoperiod selection (see Section 5.3.1). 14 . In certain email applications where received messages are stored and decrypted at a later time, the cryptoperiod of the private key transport key may exceed the cryptoperiod of the public key transport key. 55

Key Type 12. Symmetric Key Agreement Key 13. Private Static Key Agreement Key 14. Public Static Key Agreement Key 15. Private Ephemeral Key Agreement Key 16. Public Ephemeral Key Agreement Key 17. Symmetric Authorization Key Originator Usage Period (OUP) Cryptoperiod 1-2 years 1-2 years 15 1-2 years Recipient Usage Period One key agreement transaction One key agreement transaction < 2 years 18. Private Authorization Key < 2 years 19. Public Authorization Key < 2 years 5.3.7 Recommendations for Other Keying Material March, 2007 Other keying material does not have well-established cryptoperiods, per se. The following recommendations are offered regarding the disposition of this other keying material: 1. Domain parameters remain in effect until changed. 2. An IV is associated with the information that it helps to protect, and is needed until the information and its protection are no longer needed. 3. Shared secrets shall be destroyed as soon as they are no longer needed to derive keying material. 4. RNG seeds should be destroyed immediately after use. 5. Other public information should not be retained longer than needed for cryptographic processing. 6. Intermediate results shall be destroyed immediately after use. 15 In certain email applications whereby received messages are stored and decrypted at a later time, the cryptoperiod of the private static key agreement key may exceed the cryptoperiod of the public static key agreement key. 56

Key Type<br />

12. Symmetric Key Agreement<br />

Key<br />

13. Private Static Key<br />

Agreement Key<br />

14. Public Static Key Agreement<br />

Key<br />

15. Private Ephemeral Key<br />

Agreement Key<br />

16. Public Ephemeral Key<br />

Agreement Key<br />

17. Symmetric Authorization<br />

Key<br />

Originator Usage<br />

Period (OUP)<br />

Cryptoperiod<br />

1-2 years<br />

1-2 years 15<br />

1-2 years<br />

Recipient Usage<br />

Period<br />

One key agreement transaction<br />

One key agreement transaction<br />

< 2 years<br />

18. Private Authorization Key < 2 years<br />

19. Public Authorization Key < 2 years<br />

5.3.7 Recommendations for Other Keying Material<br />

March, 2007<br />

Other keying material does not have well-established cryptoperiods, per se. The following<br />

recommendations are offered regarding the disposition of this other keying material:<br />

1. Domain parameters remain in effect until changed.<br />

2. An IV is associated with the information that it helps to protect, and is needed until the<br />

information and its protection are no longer needed.<br />

3. Shared secrets shall be destroyed as soon as they are no longer needed to derive keying<br />

material.<br />

4. RNG seeds should be destroyed immediately after use.<br />

5. Other public information should not be retained longer than needed for cryptographic<br />

processing.<br />

6. Intermediate results shall be destroyed immediately after use.<br />

15 In certain email applications whereby received messages are stored and decrypted at a later time, the cryptoperiod<br />

of the private static key agreement key may exceed the cryptoperiod of the public static key agreement key.<br />

56

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!