Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
March, 2007<br />
6. Destroyed Compromised state: The key is destroyed after a compromise, or the key is<br />
destroyed and a compromise is later discovered. Key attributes (e.g., key name, type, and<br />
cryptoperiod) may be retained. This state differs from the destroyed state in that keys in<br />
this state are known, or suspected, to have been compromised (see Section 8.4).<br />
7.2 Key State Transitions<br />
Transitions between states are triggered by events, such as the expiration of a cryptoperiod or the<br />
detection of a compromise of a key. Figure 3 depicts the key states and transitions.<br />
1<br />
2<br />
Pre-<br />
Activation<br />
4<br />
3<br />
7<br />
Active<br />
(Protect Only<br />
Process Only<br />
Protect and Process)<br />
6<br />
Deactivated<br />
(Process Only)<br />
Destroyed<br />
5<br />
8<br />
10<br />
Compromised<br />
(process only)<br />
9<br />
Destroyed<br />
Compromised<br />
Figure 3: Key states and transitions<br />
Transition 1: A key enters the pre-activation state immediately upon generation.<br />
Transition 2: A key that is never used may transition from the pre-activation state directly<br />
to the destroyed state. In this case, the integrity of a key or the confidentiality<br />
of a key requiring confidentiality protection is considered trustworthy, but it<br />
has been determined that the key will not be needed in the future.<br />
86