31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

March, 2007<br />

The process for the initial installation of keying material (e.g., by manual entry, electronic key<br />

loader, by a vendor during manufacture) shall include the protection of the keying material<br />

during entry into a software/hardware/system/application/cryptomodule/ device, take into<br />

account the requirements of [FIPS140-2] and its differing requirements based on levels of<br />

protection, and include any additional procedures that may be required.<br />

Many applications or systems are provided by the manufacturer with keying material that is used<br />

to test that the newly installed application/system is functioning properly. This test keying<br />

material shall not be used operationally.<br />

8.1.5 Key Establishment Function<br />

Key establishment involves the generation and distribution, or the agreement of keying material<br />

for communication between entities. All keys shall be generated within a FIPS 140-2 validated<br />

cryptographic module or obtained from another source approved by the U.S. Government for the<br />

protection of national security information. During the key establishment process, some of the<br />

keying material may be in transit (i.e., the keying material is being manually or electronically<br />

distributed). Other keying material may be retained locally. In either case, the keying material<br />

shall be protected in accordance with Section 6.<br />

An entity may be an individual (person), organization, device or process. When keying material<br />

is generated by an entity for its own use, and the keying material is not distributed among “subentities”<br />

(e.g., is not distributed among various individuals, devices or processes within an<br />

organization), one or more of the appropriate protection mechanisms for stored information in<br />

Section 6.2.2 shall be used.<br />

Keying material that is distributed between entities, or among an entity and its sub-entities, shall<br />

be protected using one or more of the appropriate protection mechanisms specified in Section<br />

6.2.1. Any keying material that is not distributed (e.g., the private key of a key pair, or one's own<br />

copy of a symmetric key) shall be protected using one or more of the appropriate protection<br />

mechanisms specified in Section 6.2.2.<br />

8.1.5.1 Generation and Distribution of Asymmetric Key Pairs<br />

Key pairs shall be generated in accordance with the mathematical specifications of the<br />

appropriate Approved standard.<br />

A static key pair shall be generated by the entity that “owns” the key pair (i.e., the entity that<br />

uses the private key in the cryptographic computations), by a facility that distributes the key pair<br />

in accordance with Section 8.1.5.1.3, or by the user and facility in a cooperative process. When<br />

generated by the entity that owns the key pair, a signing private key shall not be distributed to<br />

other entities. In the case of a signature verification public key and its associated private key, the<br />

owner should generate the keying material rather than any other entity generating the keying<br />

material for that owner; this will facilitate non-repudiation.<br />

Ephemeral keys are often used for key establishment (see [SP800-56]). They are generated for<br />

each new key establishment process (e.g., unique to each message or session<br />

The generated key pairs shall be protected in accordance with Section 6.1.1.<br />

93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!