Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
March, 2007<br />
For example, suppose that 3TDEA is to be fielded in January of the year 2010 and the security<br />
life of the data may be up to four years. Table 4 indicates that 3TDEA has an algorithm security<br />
lifetime that extends through 2030, but not beyond. However, since the data may have up to a<br />
four-year security life, the algorithm originator usage period would have to end in 2026 rather<br />
than 2030 (i.e., the algorithm could not be used to apply protection to data beyond 2026). See<br />
Figure 2. After 2026, the algorithm could be used to process data for another four years, at which<br />
time the algorithm (and key size) would no longer provide adequate protection. If the security<br />
life of the data was estimated correctly, the data would also no longer need this protection.<br />
69