beautypg.com

HP FIPS 140-2 User Manual

Page 14

background image

Security Policy, version 1.0

January 31, 2008

HP StorageWorks Secure Key Manager

Page 14 of 26

© 2008 Hewlett-Packard Company

This document may be freely reproduced in its original entirety.

Service

Description

Keys/CSPs

Zeroize all keys/CSPs

Zeroize all keys/CSPs in the module

All keys/CSPs – delete

2.4.4

Cluster Member Role

The Cluster Member role is associated with other SKMs that can connect to this SKM and access cluster services.
See Table 9 – Cluster Member Services. The keys and CSPs in the rightmost column correspond to the keys and
CSPs introduced in Section 2.7.1.

Table 9 – Cluster Member Services

Service

Description

Keys/CSPs

Authenticate Cluster
Member

Authenticate to SKM via TLS

Cluster Member passwords –
read; Cluster key – read; Cluster
Member RsaPub – read

Receive Configuration
File

Update the module’s configuration settings

None

Zeroize Key

Delete a specific key

Cluster key – delete

Backup Configuration
File

Back up a configuration file

None

2.4.5 Authentication

The module performs identity-based authentication for the four roles. Two authentication schemes are used:
authentication with certificate in TLS and authentication with password. See Table 10 – Roles and Authentications
for a detailed description.

Table 10 – Roles and Authentications

Role

Authentication

Crypto Officer

Username and password with optional digital certificate

User

Username and password and/or digital certificate

HP User

Digital certificate

Cluster Member

Digital certificate over TLS

The 1024-bit RSA signature on a digital certificate provides 80-bits of security. There are 2

80

possibilities. The

probability of a successful random guess is 2

-80

. Since 10

-6

» 2

-80

, a random attempt is very unlikely to succeed. At

least 80 bits of data must be transmitted for one attempt. (The actual number of bits that need to be transmitted for
one attempt is much greater than 80. We are considering the worst case scenario.) The processor used by the module
has a working frequency of 3.0 gigabytes, hence, at most 60Ч3.0Ч10

9

bits of data can be transmitted in 60 seconds.

Since 80 bits are necessary for one attempt, at most (60Ч3.0Ч10

9

)/80 = 2.25Ч10

9

attempts are possible in 60 seconds.

However, there exist 2

80

possibilities. (2.25Ч10

9

)/2

80

= 1.86Ч10

-15

« 10

-5

. The probability of a successful certificate

attempt in 60 seconds is considerably less than 10

-5

.

Passwords in the module must consist of eight or more characters from the set of 90 human-readable numeric,
alphabetic (upper and lower case), and special character symbols. Excluding those combinations that do not meet
password constraints (see Section 2.7.1 – Keys and CSPs), the size of the password space is about 60

8

. The

probability of a successful random guess is 60

-8

. Since 10

-6

» 60

-8

, a random attempt is very unlikely to succeed.

After six unsuccessful attempts, the module will be locked down for 60 seconds; i.e., at most six trials are possible