Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
March, 2007<br />
a. A private signature key is not retained in the deactivated state, but transitions<br />
immediately to the destroyed state.<br />
b. A private signature key transitioning from the active state to the compromised state is not<br />
retained in that state, but transitions immediately to the destroyed-compromised state<br />
unless retention is required for legal purposes.<br />
c. A public signature verification key may transition to the deactivated state at the end of<br />
the corresponding private key’s cryptoperiod. The public signature verification key enters<br />
the compromised state if its integrity becomes suspect. However, public signature<br />
verification keys need not be destroyed.<br />
d. A public key transport key transitioning from the active state is not retained in the<br />
deactivated state, but transitions immediately to the destroyed state. It enters the<br />
compromised state only when its integrity is suspect.<br />
e. Private and public key agreement keys transitioning from the active state are not retained<br />
in the deactivated state, but transition immediately to the destroyed state.<br />
88