Meztigis Security requirements for trustworthy systems managing certificates for electronic signatures. Company organization, management and quality. This website is best viewed with browser version of up to Microsoft Internet Explorer 8 or Firefox 3. Find Similar Items This product falls into the following categories. You may find similar items within these categories by selecting from the choices below:.
|Published (Last):||28 January 2005|
|PDF File Size:||12.66 Mb|
|ePub File Size:||19.64 Mb|
|Price:||Free* [*Free Regsitration Required]|
In compliance with CWA , Section 5. There must be re-authentication after log-out and the authentication data, where used, is unique and cannot be reused. Short term session keys are not categorized as Infrastructure keys 3. In terms of security requirements, ALL Signing Keys are long-term keys whose impact from exposure is high.
Consequently, countermeasures for managing this risk are also high, both in number and in effect. Infrastructure keys are also considered high risk but due to their distributed functionality and shorter lifespan they are a lower risk in comparison to signing keys.
Infrastructure and Control keys may be either asymmetric or symmetric keys. Key Generation Key Generation refers to the creation of keys. Key Usage This is the controlling of usage of generated keys within cryptographic algorithms to provide cryptographic services.
Key Change Key change may be: Programmed - where a key is replaced by a newly generated key once it reaches the end of its operational life as determined by policy Non-Programmed — where a key is replaced by a newly generated key if it has been compromised.
Key Destruction When a key is compromised or when it reaches the end of its operational life it may be destroyed to prevent any further use of the key. These backed up keys may need to be recovered when for example the existing key is inadvertently destroyed.
CWA 14167-1 PDF
CEN Workshop Agreement