
and the User must login before the second "Write Key Split" can be performed. The two iKey
tokens used for carrying key parts are labeled with the word "CODE". The two key parts are
then physically carried by separate trusted individuals to another device. If this device is also
an HSM, the two parts may loaded into it using the "Read Key Split" command. Similarly, this
command must be issued twice, once for the Security Officer and once for the User. Separate
authentications are required for each "Read Key Split" command. After the second "Read Key
Split " command has been successfully completed the destination device will contain the same
Key-Wrapping-Key as the originating device. Once two or more devices that contain the same
Key-Wrapping-Key, they are said to be in the same family. Devices in the same family may
share other secrets. Secrets are moved between devices under the control of a Rainbow
Technologies key management utility. The key management utility runs on the host, and uses
"Wrap Key" and "Unwrap" commands to move wrapped keys between devices in the same
family.
10.5 Key Destruction
Critical security parameters including plaintext private keys, symmetric keys and intermediate
values will be zeroized according to various conditions as described in
Table 9: Key
Destruction
on page 235. It is also possible for the security officer to command the board to
un-initialize, which causes the data stored in RAM, FLASH and BBRAM to be erased.
Table 9: Key Destruction
Tamper
Detected
Voltage Applied
Storage
Battery
PCI
BRAM
RAM and Other
Flash
NO
YES
YES
Retained
Retained
Retained
NO
YES
NO
Retained
Erased
Retained
NO
NO
YES
Retained
Retained
Retained
NO
NO
NO
Erased
Erased
Retained
YES
YES
YES
Erased
Erased
Retained
YES
YES
NO
Erased
Erased
Retained
YES
NO
YES
Erased
Erased
Retained
YES
NO
NO
Erased
Erased
Retained
10.6 Key Archiving
Under the control of the Rainbow Technologies key management utility, it is also possible to
archive keys. This may be done so that keys may be stored on backup media such as tape or
hard drives. The Rainbow Technologies key management utility utilizes the "Wrap Key"
10.0 Key Management
User Guide
April 2013 235
Summary of Contents for 3050-VM
Page 1: ...User Guide Avaya VPN Gateway Release 9 0 NN46120 104 Issue 04 04 April 2013 ...
Page 4: ...4 User Guide April 2013 Comments infodev avaya com ...
Page 12: ...12 User Guide April 2013 ...
Page 20: ...New in this release 20 User Guide April 2013 Comments infodev avaya com ...
Page 30: ...Introducing the VPN Gateway 30 User Guide April 2013 Comments infodev avaya com ...
Page 36: ...Introducing the ASA 310 FIPS 36 User Guide April 2013 Comments infodev avaya com ...
Page 74: ...Upgrading the AVG Software 74 User Guide April 2013 Comments infodev avaya com ...
Page 86: ...Managing Users and Groups 86 User Guide April 2013 Comments infodev avaya com ...
Page 130: ...The Command Line Interface 130 User Guide April 2013 Comments infodev avaya com ...
Page 162: ...Supported Ciphers 162 User Guide April 2013 Comments infodev avaya com ...
Page 212: ...Syslog Messages 212 User Guide April 2013 Comments infodev avaya com ...
Page 242: ...Definition of Key Codes 242 User Guide April 2013 Comments infodev avaya com ...
Page 259: ...Creating a Port Forwarder Authenticator User Guide April 2013 259 ...
Page 266: ...Using the Port Forwarder API 266 User Guide April 2013 Comments infodev avaya com ...
Page 274: ...X 509 274 User Guide April 2013 Comments infodev avaya com ...