31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

March, 2007<br />

For example, suppose that 3TDEA is to be fielded in January of the year 2010 and the security<br />

life of the data may be up to four years. Table 4 indicates that 3TDEA has an algorithm security<br />

lifetime that extends through 2030, but not beyond. However, since the data may have up to a<br />

four-year security life, the algorithm originator usage period would have to end in 2026 rather<br />

than 2030 (i.e., the algorithm could not be used to apply protection to data beyond 2026). See<br />

Figure 2. After 2026, the algorithm could be used to process data for another four years, at which<br />

time the algorithm (and key size) would no longer provide adequate protection. If the security<br />

life of the data was estimated correctly, the data would also no longer need this protection.<br />

69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!