7. Key Management
Key management is a critical component of a security product. A risk analysis will
determine the strength of cryptographic algorithm and associated key sizes and lifetimes
required to protect customer data.
7.1. Key management schema
Refer to the Security Worlds chapter in the User Guide for a description of the Security
World infrastructure available for managing the secure life-cycle of cryptographic keys.
See
Security World Access Control Architecture
available to protect application keys.
7.2. Security World security strengths
Security strength is represented by a number associated with the amount of work (that
is, the number of guesses/operations) that is required to break a cryptographic algorithm
or system. The security strength is specified in bits and is a specific value from the set
{80, 96, 112, 128, 192, 256} e.g. a security strength of 112 bits would require on average
(112-1)
2
operations to brute force the algorithm or system.
Security World modes are selected when creating a Security World. The available modes,
associated cipher suites, automatic FIPS mechanism compliance and security strengths
are:
Modes
FIPS 140-2 Level 3 (FIPS
approved mode
enforced)
Unrestricted (default)
Common Criteria CMTS
(see note 2)
nShield® Security Manual
Ciphersuite
DLf3072s256mAEScSP8
00131Ar1
DLf3072s256mAEScSP8
00131Ar1
DLf3072s256mAEScSP8
00131Ar1
for a description of the different keys
Automatic compliance
of FIPS mechanisms
with NIST SP800-131A
Revision 1
algorithm/key sizes
Yes
No (see note 1)
No
Security
Strength
128 bits
128 bits
128 bits
49 of 90
Need help?
Do you have a question about the nShield and is the answer not in the manual?