Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
March, 2007<br />
The implementation and associated key management must provide adequate security to prevent<br />
any feasible attack from being successful.<br />
6.2.1 Protection Mechanisms for Cryptographic Information in Transit<br />
Cryptographic information in transit may be keying material being distributed in order to obtain<br />
a cryptographic service (e.g., establish a key that will be used to provide confidentiality) (see<br />
Section 8.1.5), or cryptographic information being backed up or archived for possible use or<br />
recovery in the future (see Sections 8.2.2 and 8.3.1). This may be accomplished manually (i.e.,<br />
via trusted courier), in an automated fashion (i.e., electronic communication protocols) or by<br />
some combination of manual and automated methods. For some protocols, the protections are<br />
provided by the protocol; in other cases, the protection for the keying material is provided<br />
directly on the keying material. It is the responsibility of the originating entity to apply protection<br />
mechanisms, and the responsibility of the recipient to undo or check the mechanisms used.<br />
6.2.1.1 Availability<br />
Since communications may be garbled, intentionally altered, or destroyed, the availability of<br />
cryptographic information after transit cannot be assured using cryptographic methods. However,<br />
availability can be supported by redundant or multiple channels, store and forward (deleting only<br />
after confirmation of receipt) systems, error correction codes, and other non-cryptographic<br />
mechanisms. Retransmission should only be used as a fall-back mechanism, since it imposes<br />
requirements on entities outside of the communications system.<br />
6.2.1.2 Integrity<br />
Integrity involves both the prevention and detection of modifications to information. When<br />
modifications are detected, measures may be taken to restore the information to its unaltered<br />
form. Cryptographic mechanisms are often used to detect unauthorized modifications. The<br />
integrity of cryptographic information during transit shall be protected using one or more of the<br />
following mechanisms:<br />
1. Manual method (physical protection is provided):<br />
(a) An integrity mechanism comparable to a CRC (e.g., CRC, MAC or digital signature)<br />
is used on the information, and the resulting code (e.g., CRC, MAC or digital<br />
signature) is provided to the recipient. Note: A CRC may be used instead of MAC or<br />
digital signature, since the physical protection is intended to protect against<br />
intentional modifications.<br />
-OR-<br />
(b) The keying material is used to perform the intended cryptographic operation. If the<br />
received information does not conform to the expected format, or the data is<br />
inconsistent in the context of the application, then the keying material may have been<br />
corrupted.<br />
2. Electronic distribution via communication protocols (provided by the user or by the<br />
communication protocol):<br />
(a) A cryptographic integrity mechanism (e.g., a MAC or digital signature) is used on the<br />
information, and the resulting code (e.g., MAC or digital signature) is provided to the<br />
recipient. Note that a CRC is not Approved for this purpose. The integrity mechanism<br />
79