29.10.2014 Views

ACP 185

ACP 185

ACP 185

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

<strong>ACP</strong> <strong>185</strong><br />

505. There are three classes of algorithms typically used in PKI - hashing, encryption,<br />

and key agreement. Hashing and encryption are used for authentication and digital<br />

signature. Either an encryption or key agreement algorithm is used for data encryption.<br />

Additionally, encryption and key agreement algorithms may use different key sizes.<br />

ALGORITHM COORDINATION<br />

506. As algorithms deprecate, Participant nations are to review the level of assurance<br />

asserted in the CCA and notify the other Participant of any change it proposes to make in<br />

relation to OID mappings.<br />

507. In addition, Nations are required to declare in advance their intent with regards to<br />

algorithm migrations to provide the opportunity for all Nations to prepare for the<br />

potential change. This declaration should include a timeline for the transition, including<br />

the period of time where multiple algorithms (old and new) will be used and accepted by<br />

the Nation’s PKI and relying parties. If possible, the declaration should also include<br />

known or anticipated interoperability impacts.<br />

Uncontrolled copy when printed<br />

5-2<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!