Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
March, 2007<br />
The process for the initial installation of keying material (e.g., by manual entry, electronic key<br />
loader, by a vendor during manufacture) shall include the protection of the keying material<br />
during entry into a software/hardware/system/application/cryptomodule/ device, take into<br />
account the requirements of [FIPS140-2] and its differing requirements based on levels of<br />
protection, and include any additional procedures that may be required.<br />
Many applications or systems are provided by the manufacturer with keying material that is used<br />
to test that the newly installed application/system is functioning properly. This test keying<br />
material shall not be used operationally.<br />
8.1.5 Key Establishment Function<br />
Key establishment involves the generation and distribution, or the agreement of keying material<br />
for communication between entities. All keys shall be generated within a FIPS 140-2 validated<br />
cryptographic module or obtained from another source approved by the U.S. Government for the<br />
protection of national security information. During the key establishment process, some of the<br />
keying material may be in transit (i.e., the keying material is being manually or electronically<br />
distributed). Other keying material may be retained locally. In either case, the keying material<br />
shall be protected in accordance with Section 6.<br />
An entity may be an individual (person), organization, device or process. When keying material<br />
is generated by an entity for its own use, and the keying material is not distributed among “subentities”<br />
(e.g., is not distributed among various individuals, devices or processes within an<br />
organization), one or more of the appropriate protection mechanisms for stored information in<br />
Section 6.2.2 shall be used.<br />
Keying material that is distributed between entities, or among an entity and its sub-entities, shall<br />
be protected using one or more of the appropriate protection mechanisms specified in Section<br />
6.2.1. Any keying material that is not distributed (e.g., the private key of a key pair, or one's own<br />
copy of a symmetric key) shall be protected using one or more of the appropriate protection<br />
mechanisms specified in Section 6.2.2.<br />
8.1.5.1 Generation and Distribution of Asymmetric Key Pairs<br />
Key pairs shall be generated in accordance with the mathematical specifications of the<br />
appropriate Approved standard.<br />
A static key pair shall be generated by the entity that “owns” the key pair (i.e., the entity that<br />
uses the private key in the cryptographic computations), by a facility that distributes the key pair<br />
in accordance with Section 8.1.5.1.3, or by the user and facility in a cooperative process. When<br />
generated by the entity that owns the key pair, a signing private key shall not be distributed to<br />
other entities. In the case of a signature verification public key and its associated private key, the<br />
owner should generate the keying material rather than any other entity generating the keying<br />
material for that owner; this will facilitate non-repudiation.<br />
Ephemeral keys are often used for key establishment (see [SP800-56]). They are generated for<br />
each new key establishment process (e.g., unique to each message or session<br />
The generated key pairs shall be protected in accordance with Section 6.1.1.<br />
93