Cryptographic Key Management

The module supports the following critical security parameters (CSPs):

 

 

 

 

Table 2

Critical Security Parameters

 

 

 

 

 

 

 

 

#

CSP Name

Description

Storage

 

 

 

 

 

 

 

1

CSP 1

This is the seed key for X9.31 PRNG. This

DRAM

 

 

 

 

 

 

 

key is stored in DRAM and updated

(plaintext)

 

 

 

 

 

 

 

periodically after the generation of 400

 

 

 

 

 

 

 

 

bytes; hence, it is zeroized periodically.

 

 

 

 

 

 

 

 

Also, the operator can turn off the router to

 

 

 

 

 

 

 

 

zeroize this key.

 

 

 

 

 

 

 

 

2

CSP2

The private exponent used in Diffie-Hellman

DRAM

 

 

 

 

 

 

 

(DH) exchange. Zeroized after DH shared

(plaintext)

 

 

 

 

 

 

 

secret has been generated.

 

 

 

 

 

 

 

 

3

CSP3

The shared secret within IKE exchange.

DRAM

 

 

 

 

 

 

 

Zeroized when IKE session is terminated.

(plaintext)

 

 

 

 

 

 

 

4

CSP4

Same as above

DRAM

 

 

 

 

 

 

 

 

(plaintext)

 

 

 

 

 

 

 

5

CSP5

Same as above

DRAM

 

 

 

 

 

 

 

 

(plaintext)

 

 

 

 

 

 

 

6

CSP6

Same as above

DRAM

 

 

 

 

 

 

 

 

(plaintext)

 

 

 

 

 

 

 

7

CSP7

The IKE session encrypt key. The

DRAM

 

 

 

 

 

 

 

zeroization is the same as above.

(plaintext)

 

 

 

 

 

 

 

8

CSP8

The IKE session authentication key. The

DRAM

 

 

 

 

 

 

 

zeroization is the same as above.

(plaintext)

 

 

 

 

 

 

 

9

CSP9

The RSA private key. “crypto key zeroize”

NVRAM

 

 

 

 

 

 

 

command zeroizes this key.

(plaintext)

 

 

 

 

 

 

 

10

CSP10

The key used to generate IKE skeyid during

NVRAM

 

 

 

 

 

 

 

preshared-key authentication. The no crypto

(plaintext)

 

 

 

 

 

 

 

isakmp key command zeroizes it. This key

 

 

 

 

 

 

 

 

can have two forms based on whether the key

 

 

 

 

 

 

 

 

is related to the hostname or the IP address.

 

 

 

 

 

 

 

 

11

CSP11

This key generates keys 3, 4, 5 and 6. This

DRAM

 

 

 

 

 

 

 

key is zeroized after generating those keys.

(plaintext)

 

 

 

 

 

 

 

12

CSP12

The RSA public key used to validate

DRAM

 

 

 

 

 

 

 

signatures within IKE. These keys are

(plaintext)

 

 

 

 

 

 

 

expired either when CRL (certificate

 

 

 

 

 

 

 

 

revocation list) expires or 5 secs after if no

 

 

 

 

 

 

 

 

CRL exists. After above expiration happens

 

 

 

 

 

 

 

 

and before a new public key structure is

 

 

 

 

 

 

 

 

created this key is deleted. This key does not

 

 

 

 

 

 

 

 

need to be zeroized because it is a public key;

 

 

 

 

 

 

 

 

however, it is zeroized as mentioned here.

 

 

 

 

 

 

 

 

13

CSP13

The fixed key used in Cisco vendor ID

NVRAM

 

 

 

 

 

 

 

generation. This key is embedded in the

(plaintext)

 

 

 

 

 

 

 

module binary image and can be deleted by

 

 

 

 

 

 

 

 

erasing the Flash.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10

 

 

 

 

 

OL-3959-01

 

 

 

 

 

 

 

 

Page 10
Image 10
Cisco Systems 7206VXR NPE-400 manual CSP Name Description Storage