Given the previous definitions and descriptions, IoT vendors and system integrators should also consider the following recommendations with regard to key management:
- Ensure that validated cryptographic modules securely store provisioned keys within IoT devices; the physical and logical protection of keys in a secure trust store will pay security dividends.
- Ensure that cryptographic keys are sufficiently long. An excellent guide is to refer to NIST SP 800-131A (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdff), which provides guidance on appropriate key lengths to use for FIPS-approved cryptographic algorithms. If interested in equivalent strengths (computational resistance ...