【文章內(nèi)容簡(jiǎn)介】
authenticated may or may not require key recovery – Access control or authorization keys may need to be recoverable – Other examples? Key Recovery (Contd.) ?Key Recovery Policy (when a need for key recovery is determined) ?Define a Key Recovery System (KRS) to support the Key Recovery Policy ?Contents of the Policy (minimum): – What keying material needs to be saved? – How and where keying material is saved? – Who will protect the saved keying material? – Who can request key recovery and under what conditions? Key Recovery (Contd.) ?Contents of the Policy (contd.) – How is a request authenticated and authorized? – Who is notified of a key recovery action? – How is the policy modified and by whom? – What audit capabilities and procedures are needed? – How does the KRS deal with the destruction of keying material? – How does the KRS deal with a promise? Discussion of Key Management Policy? ? Key Management Practices Statement ? Key Usage ? Cryptoperiods ? Domain Parameter Validation and Public Key Validation ? Compromise of Keying Material ? Accountability ? Audit ? Key Recovery Guidance for Cryptographic Algorithm and Key Size Selection ?Approved algorithms are specified in FIPS ?Approved algorithms provide different security strengths ?In some cases, multiple key sizes are specified Equivalent Algorithm Strengths ?Two algorithms are considered to be of equivalent strength for the given key sizes if the amount of time needed to “break the algorithms” or determine th