Connected: An Internet Encyclopedia
5.2.2 IK Cryptoperiod Issues

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1421
Up: 5. Key Management
Up: 5.2 Interchange Keys (IKs)
Prev: 5.2.1.3 Version/Expiration Subfield
Next: 6. User Naming

5.2.2 IK Cryptoperiod Issues

5.2.2 IK Cryptoperiod Issues

An IK component's cryptoperiod is dictated in part by a tradeoff between key management overhead and revocation responsiveness. It would be undesirable to delete an IK component permanently before receipt of a message encrypted using that IK component, as this would render the message permanently undecipherable. Access to an expired IK component would be needed, for example, to process mail received by a user (or system) which had been inactive for an extended period of time. In order to enable very old IK components to be deleted, a message's recipient desiring encrypted local long term storage should transform the DEK used for message text encryption via re-encryption under a locally maintained IK, rather than relying on IA maintenance of old IK components for indefinite periods.


Next: 6. User Naming

Connected: An Internet Encyclopedia
5.2.2 IK Cryptoperiod Issues