----- Original Message ----- From: "Kyle Hamilton" <aerow...@gmail.com>
To: "openssl-users" <openssl-users@openssl.org>
Sent: Friday, February 27, 2009 1:14 AM
Subject: Re: FIPS


Take everything I say here with a grain of salt: I'm not a FIPS
expert, and it's entirely possible that I am misinterpreting something
that I read.  If Steve M wants to weigh in and verify or debunk my
interpretation, I would not object! :)

<snip>

*: You actually can use other FIPS-validated modules to provide
cryptographic services to your application, but if you want to move
key data from one module to another you must first export it, with
encryption, from the one module that has it -- and then import it into
the other module and only then decrypt it.  With OpenSSL, no
key-storage facilities are present, so you don't have much to worry
about on this score -- just remember that FIPS mandates that any
key-storage facilities only release their private and symmetric keys
once they've been encrypted.

Kyle,

Sorry to butt in on this thread. That was an excellent explanation, thanks. Where, in FIPS140-2, does it mandate this level of key protection for security level 1 or 2? Or, are you talking about the envelope of the process using the crypto module rather than the crypto module envelope? NIST SP 800-57 has recommendations, but I couldn't see this in 140-2.

Thanks,

Carl

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to