18.1
Generation.-(1) The subscriber's key pair shall be generated by the subscriber or on a key generation system in the presence of the subscriber.
(2)
The key generation process shall generate statistically random key values that are resistant to know attacks.
18.2
Distribution of Keys.-Keys shall be transferred from the key generation system to the storage device (if the keys are not stored on the key generation system) using a secure mechanism that ensures confidentiality and integrity.
18.3
Storage.-(1) Certifying Authority's keys shall be stored in tamper-resistant devices and can only be activated under split-control by parties who are not involved in the set-up and maintenance of the systems and operations of the Certifying Authority. The key of the Certifying Authority may be stored in a tamper-resistant cryptographic module or split into sub-keys stored in tamper-resistant devices under the custody of the key custodians.
(2)
The Certifying Authority's key custodians shall ensure that the Certifying Authority's key component or the activation code is always under his sole custody. Change of key custodians shall be approved by the Certifying Authority's management and documented.
18.4
Usage.-(1) A system and software integrity check shall be performed prior to Certifying Authority's key loading.
(2)
Custody of and access to the Certifying Authority's keys shall be under split control. In particular, Certifying Authority's key loading shall be performed under split control.
18.5
Certifying Authority's Public key delivery to users.-The Certifying Authority's public verification key must be delivered to the prospective Digital Signature Certificate holder in an on-line transaction in accordance with PKIX-3 Certificate Management Protocol, or via an equally secure manner.