SC-12(3) - Cryptographic Key Establishment and Management | Asymmetric Keys

Produce, control, and distribute asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user’s private key; certificates issued in accordance with organization-defined requirements].


ID: SC-12(3)
Enhancement of : SC-12

Space Segment Guidance

For space platforms subject to CNSSP №12, asymmetric key establishment is often employed to streamline secure communications with multiple, potentially distributed ground stations or cross-links. However, these public-key exchanges must be designed with radiation-hard considerations, ensuring that the cryptographic module—and any associated "key handshake" processes—remain robust against single-event upsets. During mission planning, the security architecture should incorporate redundancy (e.g., fallback symmetric keys) if an asymmetric key negotiation fails or is compromised. Proper key lifecycle management likewise matters: keys need rotation or re-issuance procedures that can be securely executed in limited contact windows without straining mission bandwidth. Adhering to NSA-approved methods ensures that adversaries cannot easily exploit ephemeral or public keys, preserving the integrity and confidentiality of all subsequent data exchanges.