SAE INTERNATIONAL
6.2.3 Requirements
6.2.3.1 Types
of
Keys
[MANDATORY] REQ_6.2.3.1_ 10:
[OPTIONAL] REQ_6.2.3.1_20:
6.2.3.2 Key Storage: Required
J3101 TM FEB2020
Page 15
of
80
The hardware protected security environment shall support digital certificates if
public keys (asymmetric cryptography) are employed. The digital certificates should
be X.509 or IEEE 1609.2 compatible formats.
The hardware protected security environment shall support either ephemeral or long-
term symmetric keys, or
both
This aspect
of
key management defines the rules and processes associated with secure persistent and/or ephemeral
storage
of
cryptographic keys. Proper key storage ensures protection
of
key material at rest.
[MANDATORY] REQ_6.2.3.2_ 10:
[MANDATORY] REQ_6.2.3.2_20:
[OPTIONAL] REQ_6.2.3.2_30:
A hardware protected security environment must securely store all cryptographic
keys and explicitly control access to each.
A keystore may be direct storage of the keys within the hardware protected security
environment, or use
of
external storage external to the hardware protected security
environment that
is
protected by encryption and integrity mechanisms implemented
within the hardware protected security environment.
Key storage capacities should only be constrained by the physical limits
of
the
underlying hardware. Allocation of storage between differing uses should
be
defined
under each application specified for the hardware protected security environment,
both
in
maximums and minimums. Denial
of
service due to exhaustion
of
available
resource should be mitigated by a resource manager implemented
in
either
hardware or firmware as a part
of
the hardware protected security environment.
NOTE: The hardware protected security environment
is
responsible for protecting both long-term and short-term
asymmetric and symmetric keys. Short term keys are sometimes referred
to
as ephemeral keys.
[MANDATORY] REQ_6.2.3.2_ 40: The hardware protected security environment keystore and its cryptographic key
contents shall be separately managed from any other nonvolatile data protection.
This includes other non-volatile data both within the hardware protected security
environment and in the normal environment.
[MANDATORY) REQ_6.2.3.2_50: The hardware protected security environment shall distinctly manage the
cryptographic integrity of the keystore from other components of the hardware
protected security environment.
[MANDATORY) REQ_6.2.3.2_60: The hardware protected security environment shall manage and maintain the
integrity of the entire keystore during any updates
to
the keystore
(add
巾
on
,
modification, or deletion
of
a key).
[MANDATORY) REQ_6.2.3.2_70: The hardware protected security environment shall check the integrity of the keystore
before any transaction which makes use of a stored key, as well as
in
response to
any conditions that warrant a check
of
the integrity of the keystore specified by the
system design (e.g
.,
no
「
mal
or abnormal changes to power mode).
[MANDATORY] REQ_6.2.3.2_ 100: The hardware protected security environment keystore shall maintain the
identification and association
of
each cryptographic key to its authorized calling
application (called key-entity association), whether the application
is
located internal
or external to the
hardwa
「
e
protected security environment, and whether the key is
stored within or outside the protected hardware protected security environment
boundary.