Page 606 - StudyBook.pdf
P. 606

590    Chapter 10 • Public Key Infrastructure


                  ■   The ?name of the key owner, along with information verifying that the
                      person requesting key recovery is authorized to recover the key on behalf of
                      that key owner. (Note that this is often a subset of the same credentials that
                      would have been used to create the key in the first place.)
                  ■   The time that the key was created.

                  ■   The issuing CA server.
                 Once the CA (or the key recovery agent) verifies the KRI, the key recovery
             process can begin.

             M of N Control

             As mentioned, some key recovery servers can break up the key recovery process
             between multiple key recovery agents.This type of key recovery security is known
             as m of n control. m of n works by splitting the PIN between n number of key
             recovery agents, then reconstructing the PIN only if m number of recovery agents
             provide their individual passwords. n must be an integer greater than 1 and m must
             be an integer less than or equal to n. Going back to the example of Drew, let’s say
             that we are using the m of n control and we have three separate key recovery
             agents.
                 To be able to recover Drew’s private key, at least two of the key recovery agents
             must be present. If Drew arrives in the office before the key recovery agents, he has
             to wait for two of the three to arrive. If only one of the key recovery agents tried
             to recover Drew’s key under m of n control, the recovery process would be denied.


              TEST DAY TIP

                  Here is an easy way to remember the m of n control. Think about a
                  door to a house. Now imagine the door has two locks, one on the
                  handle and the other a deadbolt lock. If both locks were locked, and
                  you only had the key to the handle, you would have to wait for
                  someone who has the other key before you could open the door. That
                  would be an example of a 2-of-2 control. You could build a 2-of-3 con-
                  trol by having three doors, each with two locks, covering each combina-
                  tion of two-out-of-three keys.











          www.syngress.com
   601   602   603   604   605   606   607   608   609   610   611