World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

By Polk, W. Timothy

Click here to view

Book Id: WPLBN0000694001
Format Type: PDF eBook
File Size: 199.70 KB.
Reproduction Date: 2005
Full Text

Title: Cryptographic Algorithms and Key Sizes for Personal Identity Verification  
Author: Polk, W. Timothy
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Polk, W. T. (n.d.). Cryptographic Algorithms and Key Sizes for Personal Identity Verification. Retrieved from http://hawaiilibrary.net/


Description
Technical Reference Publication

Excerpt
Introduction: The Homeland Security Presidential Directive (HSPD) 12 mandated the creation of new standards for interoperable identity credentials for physical and logical access to Federal government locations and systems. Federal Information Processing Standard 201 (FIPS 201), Personal Identity Verification (PIV) of Federal Employees and Contractors, was developed to establish standards for identity credentials [FIPS201]. This document, Special Publication 800-78 (SP 800-78), specifies the cryptographic algorithms and key sizes for PIV systems and is a companion document to FIPS 201. This document has been developed by the National Institute of Standards and Technology (NIST) in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations and assets, but such standards?

Table of Contents
Table of Contents 1. INTRODUCTION...................................................................................................................1 11..11 AUTHORITY......................................................................................................................1 11..22 PURPOSE...........................................................................................................................1 11..33 SCOPE...............................................................................................................................1 11..44 AUDIENCE AND ASSUMPTIONS...........................................................................................2 11..55 DOCUMENT OVERVIEW......................................................................................................2 2. APPLICATION OF CRYPTOGRAPHY IN FIPS 201............................................................3 3. ON CARD CRYPTOGRAPHIC REQUIREMENTS..............................................................5 33..11 PIV CRYPTOGRAPHIC KEYS..............................................................................................5 33..22 AUTHENTICATION INFORMATION STORED ON THE PIV CARD...........................................7 3.2.1 Specification of Digital Signatures on Authentication Information...........................7 3.2.2 Specification of Public Keys In X.509 Certificates.....................................................8 3.2.3 Specification of Message Digests in the SP 800-73 Security Object..........................9 4. CERTIFICATE STATUS INFORMATION..........................................................................11 5. PIV CARD MANAGEMENT KEYS.....................................................................................12 APPENDIX A? ACRONYMS..................................................................................................13 APPENDIX B? REFERENCES..............................................................................................14 List of Tables Table 3-1. Algorithm and Key Size Requirements for PIV Key Types........................................6 Table 3-2. RSA Public Key Exponents..........................................................................................7 Table 3-3. Signature Algorithm and Key Size Requirements for PIV Information......................8 Table 3-4. FIPS 201 Signature Algorithm Object Identifiers........................................................8 Table 3-5. Public Key Object Identifiers for PIV Key Types........................................................9 Table 3-6. ECC Parameter Object Identifiers for Approved Curves.............................................9 Table 3-7. Hash Algorithm Requirements for the 800-73 Security Object.................................10 Table 3-8. Hash Algorithm Object Identifiers for the 800-73 Security Object...........................10 Table 4-1. Signature Algorithm and Key Size Requirements for PIV Status Information..........11 Table 5-1. Algorithm and Key Size Requirements for Card Management Keys........................12 Page iii

 

Click To View

Additional Books


  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.