ANSI X9.69:2006 pdf download

ANSI X9.69:2006 pdf download

ANSI X9.69:2006 pdf download.Framework for Key Management Extensions.
4.2 The Use of Constructive Key Management
With Constructive Key Management (CKM), key components, called splits, shall be generated with a random or pseudorandom number generator. Each of these splits shall be given a name, called a Credential that Provides some meaningfui information to the sender, and allows the sender to direct the encrypted obecl to a selected set of end-users, The working key shall be constructed by combining the addressee splits with the system generated and controlled splits. Thus, with CKM it is possible to create a group key for a particular set of end-users. Other recients, who are not members of the group, will be unable to re-construct that particular group key.
4.3 The Use of Key Usage Control Vector
With Key Usage Control Vectors, keys shall be generated using any acceptable method of key generation. Then a key usage vector shall be attached 10 the key. This vector specifies cryptographic services, modes and key parameters, in which the associated key shall be used. This usage vector shall be securely bound to the key to prevent misuse of the key or misinterpretation of Its use.
4.4 System Algorithm and System Key
The CKM operations system shall use a common system-wide encryption algorithm and key to wrap the header of encrypted objects as they transit communications networks. The purpose is privacy, not security. For example, when multiple objects are sent in a batch mode, recients need to be able to unwrap the bundle and determine from the encrypted header information which obØct(s) is addressed to thorn, Security is not compromised because the objects themselves are encrypted using secret splits that only the addressees of each object possess.
5 Constructive Key Management
5.1 Overview
Constructive Key Management is exactly what the name implies: key is constructed as needed by the originator of the message, and can only be re-constructed by intended recipients. In the interim, Credentials of the key components are associated with the encrypted object. For example, in an e-mail message, they might be passed, encrypted under a system key In the message header (depending on the protocol). In a session-oriented protocol, they might be exchanged as part of the key management protocol, and stored locally in the security management Information base (SMIB). This means the encrypting key Is always fully recoverable and the message is always decryptable by the appropriate audience.
There are two mayor administrative functions required to manage the CKM system: the CKM Administration (see §5.2 CKM Administration) and the Token Distribution (see §5.3 Token Distribution). In large organizations, these could be independent of each other. The CKM Administration function shall design the overall interconriectivity arid read-write privileges in the system, and create the Credentials and splits. The Token Distribution function shall include the day-to-day management of the system, the creation, distribution and update of Credentials, and maintenance of a current users list (see Figure 1 – Token Distribution). The Token Distribution function shall be accomplished through a secure channel (see §5.3 Token Distribution).
After the CKM Administration has defined the system and system parameters, except for those instances where major changes must be made (for instance, interaction with another organization that requires each Token Distribution to set up a common communication pathf, it basically lies dormant. It is at the Token Distribution level where Dual Control of key mater4al shall be accomplished, ii required in the system. On the other hand, the CKM Administration function is a daily management process.
Credentials consist of Splits, Algorithm-Access, and Administrative Information.
Credentials are the categories and sub-categories of addressees. In many applications they are humanly readable, so they are comprehensIble 10 the sender who is determining the recipients of the encrypted object. There are also one or more system Credentials that are used in every encryption and decryption, and are transparent to the user.
Every Credential points to a unique Split, a secret, random number which is a component in the working key. After the object is property addressed. (I.e. credentialed) the appropriate splits are combined to produce the working key for the encryption/decryption process.
Depending on the application. Algorithm-Access may be used to accomplish data separation and access control. For example, the CBC mode of 3DEA/AES is used in MACIng, and ECB mode is called for in key management applications.
Administrative Information should control such things as user read-write privileges, and what devices in the system can be used by individuals and applications.

Leave a Reply

Your email address will not be published. Required fields are marked *