METHOD FOR LOGGING AND RETRIEVING SECURITY RELATED EVENTS AND AUDITING ENCRYPTION KEYS EMBEDDED IN A CRYPTOGRAPHIC MODULE
Original Publication Date: 2000-May-01
Included in the Prior Art Database: 2002-Sep-26
Under certain circumstances, it is desirable to be able to perform an audit on radios that use encryp~ tion to determine the IDs of certain variables (e.g. encryption keys) and the characteristics of those keys (e.g. age of keys, usage of keys). It is also desirable to ascertain the background of security related events that have taken place within the radio, for example the number of attempts at entering a password or the last N sequence of events such as power down, power up and rekey requests.