31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

March, 2007<br />

4.2.4.1 DSA......................................................................................................37<br />

4.2.4.2 RSA......................................................................................................37<br />

4.2.4.3 ECDSA ................................................................................................37<br />

4.2.5 Key Establishment Schemes...............................................................................38<br />

4.2.5.1 Discrete Log Key Agreement Schemes Using Finite Field Arithmetic38<br />

4.2.5.2 Discrete Log Key Agreement Schemes Using Elliptic Curve<br />

Arithmetic ............................................................................................39<br />

4.2.5.3 RSA Key Transport..............................................................................39<br />

4.2.5.4 Key Wrapping......................................................................................39<br />

4.2.5.5 Key Confirmation ................................................................................39<br />

4.2.6 Key Establishment Protocols ..............................................................................39<br />

4.2.7 Random Number Generation ..............................................................................40<br />

5 GENERAL KEY MANAGEMENT GUIDANCE................................................................41<br />

5. 1 Key Types and Other Information ..................................................................................41<br />

5.1.1 Cryptographic Keys ............................................................................................41<br />

5.1.2 Other Cryptographic or Related Information......................................................43<br />

5.2 Key Usage.......................................................................................................................44<br />

5.3 Cryptoperiods..................................................................................................................44<br />

5.3.1 Risk Factors Affecting Cryptoperiods ................................................................45<br />

5.3.2 Consequence Factors Affecting Cryptoperiods ..................................................46<br />

5.3.3 Other Factors Affecting Cryptoperiods ..............................................................46<br />

5.3.3.1 Communications versus Storage..........................................................46<br />

5.3.3.2 Cost of Key Revocation and Replacement ..........................................46<br />

5.3.4 Cryptoperiods for Asymmetric Keys..................................................................46<br />

5.3.5 Symmetric Key Usage Periods and Cryptoperiods.............................................47<br />

5.3.6 Cryptoperiod Recommendations for Specific Key Types ..................................49<br />

5.3.7 Recommendations for Other Keying Material....................................................56<br />

5.4 Assurances ......................................................................................................................57<br />

5.4.1 Assurance of Integrity (Also Integrity Protection) .............................................57<br />

5.4.2 Assurance of Domain Parameter Validity ..........................................................57<br />

5.4.3 Assurance of Public Key Validity.......................................................................57<br />

5.4.4 Assurance of Private Key Possession .................................................................57<br />

5.5 Compromise of Keys and other Keying Material...........................................................58<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!