You are here: Home > National
All posts from

nicca.nic.in Encryption Key Backup Procedure : NIC Certifying Authority

Organization : NIC Certifying Authority
Facility : Encryption Keys Backup Procedure
Download Procedure Here : https://www.statusin.in/uploads/22471-EncrBack.pdf
Home Page : http://nicca.nic.in/

Sponsored Links:
Want to ask a question / comment on this post?
Go to bottom of this page.

Encryption Keys Backup Procedure :

1. Need for Backup Policy for the Organisation :
1.1. Encryption :

Related : NIC Certifying Authority Sending Digitally Signed Mail in Outlook Express : www.statusin.in/22468.html

Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key; the reverse is called decryption.

Sponsored Links:

In case of Public Key Cryptography where a key pair is generated for encryption, the clear text is encrypted using one key and complementary key is used for decryption.

1.2. Necessity to backup :
Following are some situations when it is necessary to recover encryption keys :
** An employee loses the private encryption key and cannot read encrypted mail/documents (tender etc.).
** An employee is on an extended leave, and someone needs to access an encrypted document.

** An employee leaves the company, and company officials need to perform an audit that requires gaining access to the employee’s encrypted data. Therefore, if data is being encrypted, somebody must manage the keys and there must be a key backup/recovery procedure in place.

2. Backup Procedure :
2.1. Encryption key pair given by NICCA :
NICCA has a dual key pair policy, i.e. two key pairs are given – one for Digital Signature and one for Encryption. After the request for certificate issuance of Encryption key pair is processed, the user is asked to download the certificate. The certificate is downloaded as a password protected file.

2.2. Taking backup :
The file which is downloaded from the NICCA website needs to be backed up securely in case of contingencies mentioned at 1.2 above.
2.2.1. Different media to take backup :
Backup of the file can be taken in different media like CD, pen drive, smart card etc. A comprehensive list of all the storage media and their pros and cons are given in Annexure I.

2.2.2. Backup procedure
:
Choose the appropriate media from the above-mentioned in Annexure I.
a. In case the media chosen is from Sr no. 1 to 4. then copy the file downloaded from NICCA website into the media and store it securely.
b. In case the media chosen is Sr. no. 5 or 6 then the file downloaded from NICCA website has to be imported into the media as per the manual given along with the media.

After ensuring that the file has been created in the media chosen, the downloaded file has to be destroyed from the computer (in this case deleted). The password pertaining to should be written and kept in a tamper proof sealed envelope.

3. Safekeeping of the Backups :
3.1. Backups have to be kept in a fire proof safe, preferably with split control. This means that the key should not be accessible by a single individual.

4. Key Recovery Procedures :
4.1. Procedures must be in place to ensure that the keys can be recovered only after the requisite permission from the competent authority has been obtained. The key recovery must be done in the presence of witnesses.

The key may be needed to be recovered in the following cases :
a. Loss of the key
b. Unable to use the key stored in the Crypto device because of loss of pin to access the device.

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.statusin.in © 2021 Contact Us   Privacy Policy   Site Map
Status Check, Procedures, Facilities