Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
March, 2007<br />
4.2.4.1 DSA......................................................................................................37<br />
4.2.4.2 RSA......................................................................................................37<br />
4.2.4.3 ECDSA ................................................................................................37<br />
4.2.5 Key Establishment Schemes...............................................................................38<br />
4.2.5.1 Discrete Log Key Agreement Schemes Using Finite Field Arithmetic38<br />
4.2.5.2 Discrete Log Key Agreement Schemes Using Elliptic Curve<br />
Arithmetic ............................................................................................39<br />
4.2.5.3 RSA Key Transport..............................................................................39<br />
4.2.5.4 Key Wrapping......................................................................................39<br />
4.2.5.5 Key Confirmation ................................................................................39<br />
4.2.6 Key Establishment Protocols ..............................................................................39<br />
4.2.7 Random Number Generation ..............................................................................40<br />
5 GENERAL KEY MANAGEMENT GUIDANCE................................................................41<br />
5. 1 Key Types and Other Information ..................................................................................41<br />
5.1.1 Cryptographic Keys ............................................................................................41<br />
5.1.2 Other Cryptographic or Related Information......................................................43<br />
5.2 Key Usage.......................................................................................................................44<br />
5.3 Cryptoperiods..................................................................................................................44<br />
5.3.1 Risk Factors Affecting Cryptoperiods ................................................................45<br />
5.3.2 Consequence Factors Affecting Cryptoperiods ..................................................46<br />
5.3.3 Other Factors Affecting Cryptoperiods ..............................................................46<br />
5.3.3.1 Communications versus Storage..........................................................46<br />
5.3.3.2 Cost of Key Revocation and Replacement ..........................................46<br />
5.3.4 Cryptoperiods for Asymmetric Keys..................................................................46<br />
5.3.5 Symmetric Key Usage Periods and Cryptoperiods.............................................47<br />
5.3.6 Cryptoperiod Recommendations for Specific Key Types ..................................49<br />
5.3.7 Recommendations for Other Keying Material....................................................56<br />
5.4 Assurances ......................................................................................................................57<br />
5.4.1 Assurance of Integrity (Also Integrity Protection) .............................................57<br />
5.4.2 Assurance of Domain Parameter Validity ..........................................................57<br />
5.4.3 Assurance of Public Key Validity.......................................................................57<br />
5.4.4 Assurance of Private Key Possession .................................................................57<br />
5.5 Compromise of Keys and other Keying Material...........................................................58<br />
8