ACP 185
ACP 185
ACP 185
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
UNCLASSIFIED<br />
<strong>ACP</strong> <strong>185</strong><br />
505. There are three classes of algorithms typically used in PKI - hashing, encryption,<br />
and key agreement. Hashing and encryption are used for authentication and digital<br />
signature. Either an encryption or key agreement algorithm is used for data encryption.<br />
Additionally, encryption and key agreement algorithms may use different key sizes.<br />
ALGORITHM COORDINATION<br />
506. As algorithms deprecate, Participant nations are to review the level of assurance<br />
asserted in the CCA and notify the other Participant of any change it proposes to make in<br />
relation to OID mappings.<br />
507. In addition, Nations are required to declare in advance their intent with regards to<br />
algorithm migrations to provide the opportunity for all Nations to prepare for the<br />
potential change. This declaration should include a timeline for the transition, including<br />
the period of time where multiple algorithms (old and new) will be used and accepted by<br />
the Nation’s PKI and relying parties. If possible, the declaration should also include<br />
known or anticipated interoperability impacts.<br />
Uncontrolled copy when printed<br />
5-2<br />
UNCLASSIFIED