31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

March, 2007<br />

6. Destroyed Compromised state: The key is destroyed after a compromise, or the key is<br />

destroyed and a compromise is later discovered. Key attributes (e.g., key name, type, and<br />

cryptoperiod) may be retained. This state differs from the destroyed state in that keys in<br />

this state are known, or suspected, to have been compromised (see Section 8.4).<br />

7.2 Key State Transitions<br />

Transitions between states are triggered by events, such as the expiration of a cryptoperiod or the<br />

detection of a compromise of a key. Figure 3 depicts the key states and transitions.<br />

1<br />

2<br />

Pre-<br />

Activation<br />

4<br />

3<br />

7<br />

Active<br />

(Protect Only<br />

Process Only<br />

Protect and Process)<br />

6<br />

Deactivated<br />

(Process Only)<br />

Destroyed<br />

5<br />

8<br />

10<br />

Compromised<br />

(process only)<br />

9<br />

Destroyed<br />

Compromised<br />

Figure 3: Key states and transitions<br />

Transition 1: A key enters the pre-activation state immediately upon generation.<br />

Transition 2: A key that is never used may transition from the pre-activation state directly<br />

to the destroyed state. In this case, the integrity of a key or the confidentiality<br />

of a key requiring confidentiality protection is considered trustworthy, but it<br />

has been determined that the key will not be needed in the future.<br />

86

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!