31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

March, 2007<br />

The implementation and associated key management must provide adequate security to prevent<br />

any feasible attack from being successful.<br />

6.2.1 Protection Mechanisms for Cryptographic Information in Transit<br />

Cryptographic information in transit may be keying material being distributed in order to obtain<br />

a cryptographic service (e.g., establish a key that will be used to provide confidentiality) (see<br />

Section 8.1.5), or cryptographic information being backed up or archived for possible use or<br />

recovery in the future (see Sections 8.2.2 and 8.3.1). This may be accomplished manually (i.e.,<br />

via trusted courier), in an automated fashion (i.e., electronic communication protocols) or by<br />

some combination of manual and automated methods. For some protocols, the protections are<br />

provided by the protocol; in other cases, the protection for the keying material is provided<br />

directly on the keying material. It is the responsibility of the originating entity to apply protection<br />

mechanisms, and the responsibility of the recipient to undo or check the mechanisms used.<br />

6.2.1.1 Availability<br />

Since communications may be garbled, intentionally altered, or destroyed, the availability of<br />

cryptographic information after transit cannot be assured using cryptographic methods. However,<br />

availability can be supported by redundant or multiple channels, store and forward (deleting only<br />

after confirmation of receipt) systems, error correction codes, and other non-cryptographic<br />

mechanisms. Retransmission should only be used as a fall-back mechanism, since it imposes<br />

requirements on entities outside of the communications system.<br />

6.2.1.2 Integrity<br />

Integrity involves both the prevention and detection of modifications to information. When<br />

modifications are detected, measures may be taken to restore the information to its unaltered<br />

form. Cryptographic mechanisms are often used to detect unauthorized modifications. The<br />

integrity of cryptographic information during transit shall be protected using one or more of the<br />

following mechanisms:<br />

1. Manual method (physical protection is provided):<br />

(a) An integrity mechanism comparable to a CRC (e.g., CRC, MAC or digital signature)<br />

is used on the information, and the resulting code (e.g., CRC, MAC or digital<br />

signature) is provided to the recipient. Note: A CRC may be used instead of MAC or<br />

digital signature, since the physical protection is intended to protect against<br />

intentional modifications.<br />

-OR-<br />

(b) The keying material is used to perform the intended cryptographic operation. If the<br />

received information does not conform to the expected format, or the data is<br />

inconsistent in the context of the application, then the keying material may have been<br />

corrupted.<br />

2. Electronic distribution via communication protocols (provided by the user or by the<br />

communication protocol):<br />

(a) A cryptographic integrity mechanism (e.g., a MAC or digital signature) is used on the<br />

information, and the resulting code (e.g., MAC or digital signature) is provided to the<br />

recipient. Note that a CRC is not Approved for this purpose. The integrity mechanism<br />

79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!