Key Escrow System Glossary KES-NIST-SYS-GLSY-U-R1 3 October 1995 Key Escrow System Glossary of Terms (References and acronyms follow.) Access Control Process of limiting access to the resources of an automated information system only to authorized uses, programs, processes, or other systems. (1) Accreditation Formal declaration by a designated approving authority that an automated information system is approved to operate in a particular security mode using a prescribed set of safeguards. (1) Arbitrary Input (AI) A random variable used by the programming subsystem to generate the Key Components. Assurance A measure of confidence that the security features and architecture of an automated information system accurately mediate and enforce the security policy. (4) Audit Independent review and examination of system records and activities to assess the adequacy and effectiveness of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures. (1) (2) Audit Log Chronological record of system events. Authentication Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's eligibility to receive specific categories of information or perform some action. Automated Information System (AIS) An assembly of computer hardware, software, and/or firmware that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission or reception of data and information. Capstone A microcircuit chip that complies with the Escrowed Encryption Standard and also contains the Digital Signature Algorithm, the Secure Hash Algorithm and the Key Exchange Algorithm. Certification Certification consists of the technical evaluation of a sensitive application to see how well it meets the security requirements. (5) Certified Key Component Request Document that requests key components from the Escrow Agents in accordance with the "Attorney General's Procedures for Release of Encryption Key Components". Clipper A microcircuit chip that complies with the Escrowed Encryption Standard. Communications Security (COMSEC) Measures taken to deny unauthorized persons sensitive information derived from telecommunications and to ensure the authenticity of such telecommunications. Compromise The disclosure of information or data to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, may have occurred. Compromise Recovery Measures and procedures taken to restore the security in a system after a compromise or suspected compromise. Computer Security (COMPUSEC) Measures and controls that protect an automated information system against denial of service and unauthorized (accidental or intentional) disclosure, modification, or destruction of automated information systems and data. Automated information system security includes the consideration of all hardware and/or software functions, characteristics and/or features; accountability procedures, and access controls at the central computer facility, remote computer, and terminal facilities; management constraints; physical structures and devices. (1) Configuration Management The management of system and security features through the control of changes made to a system's hardware, software, firmware, documentation, test, test fixtures and test documentation throughout the development and operational life of the system. Confirmation A written verification from the supervising Federal attorney usually an Assistant U.S. Attorney to the Escrow Agents of the existence of legal authorization, normally a court order for electronic surveillance by the requesting Federal Law Enforcement Agent. Cryptographic Boundary Definable perimeter for telecommunications equipment or system within which all hardware, firmware, and software components that perform critical security functions are located. Data Integrity Assurance that data has not been altered or destroyed in an unauthorized manner. Decrypt Site Subsystem (DSS) Equipment used by authorized Government agencies to decrypt escrow encrypted communications (e.g., Key Escrow Decrypt Processor and Decrypt Key Escrow INFOSEC Device). Designated Approving Authority (DAA) Official with the authority to formally assume the responsibility for operating an automated information system or network at an acceptable level of risk. Device Unique Identifier (UID) An identifier unique to a particular device and used by the Key Escrow System. (3) Device Unique Key (KU) The cryptographic key unique to a particular device and used by the Key Escrow System. (3) Same as Unique Key. Digital Signature Process that operates on a message to assure message source authenticity and integrity, and source non-repudiation. (1) Digital Signature Standard U.S. Government standard algorithm for digital signatures. It is specified in National Institute for Standards and Technology, Federal Information Processing Standards Publication 186. Electronic Surveillance Statutorily-based process and the associated technical capability and activities of law enforcement agencies related to the interception and monitoring of wire and electronic communication. End-User Equipment Equipment which incorporates the programmed escrowed encryption devices. Encrypted Key Components (EKC) The Key Components that have been encrypted with a Key Component Enciphering Key for storage and transport. Escrow Agent Agency or organization charged with the responsibility for safeguarding the key components of the unique key. Escrow Agent Workstation (EAW) Equipment used by Key Escrow Officers to receive, to securely store, to release the key components and to maintain audit records of all critical system actions. Escrow Authenticator (EA) A binary pattern that is inserted in the LEAF to ensure that the LEAF is transmitted and received properly and has not been modified, deleted or replaced in an unauthorized manner. Escrow Officer Individual assigned to an Escrow Agent who is responsible for safeguarding the key components for the Key Escrow System. Escrow Programming Loads the device unique identifiers, the device unique keys and the family key into the escrowed encryption devices. Escrow Site Subsystem (ESS) Equipment used by Key Escrow Officers to receive, to securely store, and to release the Key Components (e.g., Escrow Agent Workstation and Escrow Key Escrow INFOSEC Device). Escrowed Encryption Device An electronic implementation of the encryption/decryption algorithm and the LEAF creation method as specified in FIPS 185. (3) Family The group of devices for which the same key is used to create the Law Enforcement Access Field in accordance with FIPS 185. Family Key (KF) The cryptographic key stored in all devices designated as a family that is used to create a Law Enforcement Access Field. (3) Family Key Agent Agency or organization charged with the responsibility of generating and safeguarding the Family Key components. Family Key Components (KFC) The two values from which a Family Key can be derived. Family Key Officer Individual assigned to a Family Key Agent who has the responsibility of safeguarding the Family Key components for the Key Escrow System. Hashing Iterative process that computes a value (referred to as a hashword or message digest) from a particular data unit in a manner that, when a hashword is protected, manipulation of the data is detectable. (1) Information Systems Security (INFOSEC) The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users. Also included are those measures necessary to detect, document and counter such threats. Interim Key Escrow System A collection of prototype trusted processes and procedures that provide for the programming of escrowed encryption devices and the escrowing and the release of key components. Key Information (usually a sequence of random or pseudorandom binary digits) used initially to set up and periodically change the operations performed in crypto-equipment for the purpose of encrypting or decrypting electronic signals, for determining electronic counter- countermeasures patterns, or for producing other key. (1) Key Components (KC) The two values from which a key can be derived. (3) Key Component Enciphering Key (KCK) A key used to encipher the key components after generation at the programming subsystem for transport or storage. Key Exchange Algorithm (KEA) U.S. Government algorithm programmed on CAPSTONE chips that permits public key exchanges. Key Escrow The processes of managing (e.g., generating, storing, transferring, auditing) the two components of a cryptographic key by at least two key component holders. (3) Key Escrow Decrypt Processor (KEDP) Equipment used by legally authorized law enforcement agencies to decrypt escrowed encryption chip-secured communications obtained via lawfully authorized interceptions. Key Escrow INFOSEC Device (KID) Equipment used to provide cryptographic protection of data exchanged between key escrow subsystems and to protect the chip key components stored at the Key Escrow Agent Workstations. The Key Escrow INFOSEC Device also provides digital signature capabilities used to sign messages between subsystems, audit data, etc. Key Escrow System (KES) A collection of trusted processes and procedures that provide for the programming of escrowed encryption devices and the escrowing and the release of key components. Key Escrow System Subsystems Any one of the pieces of equipment (e.g., Programming Subsystem, Key Escrow Agent Workstation, Key Escrow Decrypt Processor, or Key Escrow INFOSEC Device) and associated firmware and software which comprise the Key Escrow System. Key Numbers (KN) The two values from which a Key Component Enciphering Key can be derived for the Interim Key Escrow System. Law Enforcement Agent (LEA) This term encompasses Federal, State, and local law enforcement agencies. Law Enforcement AccessField (LEAF) The encrypted field containing the encrypted session key and the device unique identifier and the escrow authenticator. LEAF Type Code A 2-bit code within the Device Unique Identifier that indicates the LEAF type generated by the escrowed encryption device. National Program Manager for Key Escrowing Individual responsible for the overall specification, implementation, and operation of the KES. Need-to-know The necessity for access to, knowledge of, or possession of specific information required to carry out official duties. (4) Non-repudiation Method by which the sender of data is provided with proof of delivery and the recipient is assured of the sender's identity, so that neither can later deny having processed the data. (1) Object A passive entity that contains or receives information. Object Reuse The reassignment and reuse of a storage medium (e.g., page frame, disk sector, magnetic tape) that once contained one or more objects. Pre-programming Loads the common data (SKIPJACK algorithm, Key Exchange Algorithm, Secure Hash Algorithm, Digital Signature Algorithm, etc.) into the memory of raw manufactured chips. Programming Facility (PF) Sensitive compartmented information facility (SCIF) which meets the requirements specified in the Director for Central Intelligence Directive (DCID) 1/21 and is dedicated exclusively to the programming of escrowed encryption devices. Programming Site Subsystem (PSS) Equipment wherein an escrowed encryption device is securely loaded with a device unique identifier, the classified algorithm, the Family Key and a device unique key (e.g., a programming device and programming Key Escrow INFOSEC devices) Programming Site Code A 4-bit code within the Device Unique Identifier that indicates the facility that programmed the escrowed encryption device. Random Seeds (RS) Random values generated by the individual Escrow Agents and used by the device programming subsystem to generate key components. Risk Assessment Process of analyzing threats to and vulnerabilities of an information system, and the potential impact of the loss of information or capabilities of a system and using the analysis as a basis for identifying appropriate and cost-effective measures. Secure Area An area constructed in accordance with the specifications of DCID 1/21 and approved by the System Security Manager. Secure Hash Standard U.S. Government standard algorithm for hashing. It is specified in National Institute of Standards and Technology, Federal Information Processing Standards Publication 180, October 30, 1992. Security Policy The set of laws, rules, and practices that regulate how an organization protects, and distributes sensitive information. Seed Material Initial data used to start a key generation process. This includes Random Seeds, arbitrary input, and the range of device unique identification numbers for the devices to be programmed. Sensitive Information Information, the loss, misuse, or unauthorized access to or modification of, which could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. (1) Serial Number (SN) A unique alphanumeric value determined by the programming facility, stored in memory or physically affixed to each chip. Session Key (KS) The cryptographic key used by the chip to encrypt and decrypt data during a session. (3) Site Security Officer (SSO) An individual responsible for monitoring the secure operation of a specific Key Escrow System site. Site System Administrator An individual responsible for the proper operation of a specific Key (SSA) Escrow System site. Split Knowledge Separation of data or information into two or more parts, each part constantly kept under the control of separate authorized individuals or teams, so that no one individual or team will know the whole data. (1) System Security Manager An individual responsible for overseeing the secure operation of the (SSM) Key Escrow System. System Security Manager Site Subsystem (SSMSS) Equipment used by the System Security Manager to receive, review and analyze audit data from other KES subsystems, and to initialize and certify KES INFOSEC devices (e.g., System Security Manager Workstation and SSM Key Escrow INFOSEC Device). Technical Security (TECHSEC) The discovery, elimination, and mitigation of security vulnerabilities that can be exploited by technical means. It includes: all facets of security that involve the detection and/or neutralization of technical collection threats or the application of security technology; the traditional fields of TEMPEST and technical security countermeasures; and instrumentation, which may allow exploitation of security vulnerabilities by technical means. Two Person Integrity (TPI) System of storage and handling designed to prohibit individual access to certain sensitive key material, by requiring the presence of at least two authorized persons, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed. Unique Identification Number (UIN) A 26-bit number within the Device Unique Identifier which is assigned by an Escrow Agent and is unique to each device. Unique Key See Device Unique Key. Validation Process of applying specialized security test and evaluation procedures, tools, and equipment needed to establish the acceptance for joint usage of an AIS by one or more departments or agencies and their contractors. NOTE: This action will include, as necessary, the final development, evaluation, and testing, preparatory to acceptance by senior security test and evaluation staff specialists. (1) Verification The process of comparing two levels of an AIS specification for proper correspondence (e.g., security policy model with top-level specification, top-level specification with source code, or source code with object code). APPENDIX KES LIST OF ACRONYMS AI Arbitrary Input AIS Automated Information System COMSEC Communications Security COMPUSEC Computer Security DAA Designated Approving Authority DSS Digital Signature Standard DSS Decrypt Site Subsystem EA Escrow Authenticator EAW Escrow Agent Workstation EKC Encrypted Key Component EES Escrowed Encryption Standard ESS Escrow Site Subsystem INFOSEC Information Systems Security IV&V Independent Verification & Validation KC Key Components KCK Key Component Enciphering Key KEA Key Exchange Algorithm KEDP Key Escrow Decrypt Processor KES Key Escrow System KF Family Key KFC Family Key Component KID Key Escrow INFOSEC Device KN Key Number KS Session Key KU Unique Key LEA Law Enforcement Agent LEAF Law Enforcement Access Field PF Programming Facility PSS Programming Site Subsystem RS Random Seed SCIF Sensitive Compartmented Information Facility SHS Secure Hashing Standard SN Serial Number SSA Site System Administrator SSM System Security Manager SSMSS System Security Manager Site Subsystem SSO Site Security Officer TECHSEC Technical Security TPI Two-Person Integrity UID Device Unique Identifier UIN Unique Identification Number REFERENCES 1. National Security Telecommunications and Information Systems Security Instruction (NSTISSI) No. 4009, "National Information Systems Security (INFOSEC) Glossary", dated 05 June 1992. 2. Federal Standard 1037B (Superseding FED-STD-1037A, June 1986), "Telecommunication: Glossary of Telecommunication Terms", dated 03 June 1991. 3. Federal Information Processing Standards Publication 185, "Escrowed Encryption Standard", dated 09 February 1994. 4. National Computer Security Center, "Glossary of Computer Security Terms", 21 October 1988. 5. Federal Information Processing Standards Publication 102, "Guidelines for Computer Security Certification and Accreditation", dated 27 September 1983.