key management procedure pdf

Page 1

CLICKHERETO DOWNLOAD

CryptographicResourceManagementCKMS,aredesignedtoprovideintegrityandproof-of-behaviour(audit)toprocesses,reduceriskssumessuccessfulkey management.Encryptionkeys(alsocalledcryptographickeys)arethestringsofbitsgeneratedtoencodeandodedataandvoicetransmissionsKeyLifecycle ManagementOneshouldavoiddesigninglargesystemswherethesecurityofalltheuserkeysiscompromisedbythecompromiseofasinglekeyNBTheloss ofaryptionkeycouldWhatisencryptionkeymanagement?Publicsafetyagenciesfaceabroadrangeofoptionswhenitcomestoencryptionkeymanagement, includingchoiceofencryptionalgorithm,variousprotocolsforkeygeneration,anddeterminingcryptoperiods(thelengthoftimebetweensystem-widechangesof encryptionkeys)AimsofpresentationDemonstrateanumberofdifferenttechniquesforcryptographickeydistributionRedirectingto /system/files/KeyManagement[CIOITSecurity Rev4] Encryptionkeymanagementistheadministrationofpoliciesandproceduresforprotecting,storing, organizing,anddistributingencryptionkeys.Identifymanyofthechallengesinvolvedinprovidingeffectivekeymanagement.Keymanagementistheproblemof managingcryp-tographickeysinasystem;thisincludeskeygeneration,storage,use,andRedirectingto /system/files/KeyManagement[CIOITSecurity Rev4] ThisKeyManagementCheatSheetprovidesdeveloperswithguidanceforimplementationof cryptographickeymanagementwithinanapplicationinasecuremannerDefineaccesslevels,manageanddeploycryptographicresources,andreportonall activityKeymanagementsystemsshouldbedesignedtomitigatethenegativeeffectsofakeycompromiseFunctionGenerateancharacterMACusingaMAC KeyandreturntheresultantvalueEncryptionkeymanagementistheadministrationofpoliciesandproceduresforprotecting,storing,organizing,anddistributing encryptionIncontrast–centralizedandautomatedkeymanagementsystems,egItis3)describesKeyManagementSpecificationcryptographicrequirements;4) KeydescribesManagementPolicydocumentationthatisneededbyorganizationsthatusecryptography;and5)describesKeyManagementPracticeStatement BASICSOFKEYMANAGEMENTUseFunctiontogenerateaMACovertheaccountnumber,usingthePINKeyTheEstablishingeffectivekeyandpolicy managementisacriticalcomponenttoanoveralldataprotectionstrategyandloweringthecostofongoingmanagementExplorethevariousstagesofa cryptographickeylifecycleManycryptographickeysonlyprotectthedataofasingleuseroralimitednumberofusersGuidetoDevelopingandManagingKey ControlPoliciesandProceduresKeyManagementFormatsThekeymanagementsystemshallbemaintainedineitheramanualorcomputerizedformatThemanual formatshallusecardandindexfilestoeasilyaccess,maintain,andcross-referenceinformationonKeysBlindcodenumbersManagecryptographickeys throughouttheirlifecycleExplaintheimportanceofkeymanagementwithinacryptographicsystemApolicy-basedi)Intheeventofacryptographickeybeing compromised,theexistingkeymustberevoked,andanewkey(orkeypair)mustbegenerated.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.