
Security Policy, version 1.0
January 31, 2008
HP StorageWorks Secure Key Manager
Page
14
of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
Service
Description
Keys/CSPs
Zeroize all keys/CSPs
Zeroize all keys/CSPs in the module
All keys/CSPs – delete
2.4.4
Cluster Member Role
The Cluster Member role is associated with other SKMs that can connect to this SKM and access cluster services.
See Table 9 – Cluster Member Services. The keys and CSPs in the rightmost column correspond to the keys and
CSPs introduced in Section 2.7.1.
Table 9 – Cluster Member Services
Service
Description
Keys/CSPs
Authenticate Cluster
Member
Authenticate to SKM via TLS
Cluster Member passwords –
read; Cluster key – read; Cluster
Member RsaPub – read
Receive Configuration
File
Update the module’s configuration settings
None
Zeroize Key
Delete a specific key
Cluster key – delete
Backup Configuration
File
Back up a configuration file
None
2.4.5 Authentication
The module performs identity-based authentication for the four roles. Two authentication schemes are used:
authentication with certificate in TLS and authentication with password. See Table 10 – Roles and Authentications
for a detailed description.
Table 10 – Roles and Authentications
Role
Authentication
Crypto Officer
Username and password with optional digital certificate
User
Username and password and/or digital certificate
HP User
Digital certificate
Cluster Member
Digital certificate over TLS
The 1024-bit RSA signature on a digital certificate provides 80-bits of security. There are 2
80
possibilities. The
probability of a successful random guess is 2
-80
. Since 10
-6
» 2
-80
, a random attempt is very unlikely to succeed. At
least 80 bits of data must be transmitted for one attempt. (The actual number of bits that need to be transmitted for
one attempt is much greater than 80. We are considering the worst case scenario.) The processor used by the module
has a working frequency of 3.0 gigabytes, hence, at most 60×3.0×10
9
bits of data can be transmitted in 60 seconds.
Since 80 bits are necessary for one attempt, at most (60×3.0×10
9
)/80 = 2.25×10
9
attempts are possible in 60 seconds.
However, there exist 2
80
possibilities. (2.25×10
9
)/2
80
= 1.86×10
-15
« 10
-5
. The probability of a successful certificate
attempt in 60 seconds is considerably less than 10
-5
.
Passwords in the module must consist of eight or more characters from the set of 90 human-readable numeric,
alphabetic (upper and lower case), and special character symbols. Excluding those combinations that do not meet
password constraints (see Section 2.7.1 – Keys and CSPs), the size of the password space is about 60
8
. The
probability of a successful random guess is 60
-8
. Since 10
-6
» 60
-8
, a random attempt is very unlikely to succeed.
After six unsuccessful attempts, the module will be locked down for 60 seconds; i.e., at most six trials are possible