31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

March, 2007<br />

a. A private signature key is not retained in the deactivated state, but transitions<br />

immediately to the destroyed state.<br />

b. A private signature key transitioning from the active state to the compromised state is not<br />

retained in that state, but transitions immediately to the destroyed-compromised state<br />

unless retention is required for legal purposes.<br />

c. A public signature verification key may transition to the deactivated state at the end of<br />

the corresponding private key’s cryptoperiod. The public signature verification key enters<br />

the compromised state if its integrity becomes suspect. However, public signature<br />

verification keys need not be destroyed.<br />

d. A public key transport key transitioning from the active state is not retained in the<br />

deactivated state, but transitions immediately to the destroyed state. It enters the<br />

compromised state only when its integrity is suspect.<br />

e. Private and public key agreement keys transitioning from the active state are not retained<br />

in the deactivated state, but transition immediately to the destroyed state.<br />

88

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!