Crypto Key Management

Leverage best practices for crypto key management as defined by organization like NIST or the National Security Agency. Leverage only approved cryptographic algorithms, cryptographic key generation algorithms or key distribution techniques, authentication techniques, or evaluation criteria. Encryption key handling should be performed outside of the onboard software and protected using cryptography. Encryption keys should be restricted so that they cannot be read via any telecommands.

Sources

Best Segment for Countermeasure Deployment

  • Space Segment, Ground Segment, and Development Environment
ID: CM0030
NASA Best Practice Guide:  MI-AUTH-01 | MI-AUTH-02 | MI-INTG-01 | MI-DCO-02
ESA Space Shield Mitigation:  M2006 | M2006 | M2040 | M2058 | M2059 | M2073 | M2074 | M2075 | M2060
Created: 2022/10/19
Last Modified: 2023/11/29