<section title="17.7. OpenPGP Message Format"><subsection title="Objective"><paragraph
    title="17.7.1."


><![CDATA[<p>OpenPGP Message Format is implemented correctly as an Approved Cryptographic Protocol.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.7.2."


><![CDATA[<p>This section covers information on the conditions under which the OpenPGP Message Format can be used as an approved cryptographic protocol. &nbsp;It applies to the protocol as specified in <a title="IETF - RFC 2440" rel="noopener noreferrer" href="https://www.ietf.org/rfc/rfc2440.txt" target="_blank">IETF’s RFC 2440</a> and <a title="IETF - RFC 4880" rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc4880" target="_blank">RFC 4880</a>, which supersedes RFC 2440.</p>]]></paragraph>
<paragraph
    title="17.7.3."


><![CDATA[<p>When using a product that implements the OpenPGP Message Format, requirements for using approved cryptographic protocols will also need to be referenced from the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
<paragraph
    title="17.7.4."


><![CDATA[<p>Information relating to the development of password selection policies and password requirements can be found in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 - Identification and Authentication</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.7.5."


><![CDATA[<p>Further information on the OpenPGP Message Format can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;RFC 4880</strong></td>
<td>
<p><strong>OpenPGP Message Format specification</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td>
<p><a title="OpenPGP Message Format" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4880" target="_blank">https://datatracker.ietf.org/doc/html/rfc4880</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using OpenPGP Message Format"><paragraph
    title="17.7.6.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>If the private certificate and associated key used for encrypting messages is suspected of being compromised i.e. stolen, lost or transmitted over the Internet, then no assurance can be placed in the integrity of subsequent messages that are signed by that private key.  Likewise no assurance can be placed in the confidentiality of a message encrypted using the public key as third parties could intercept the message and decrypt it using the private key.</p>]]></paragraph>
<paragraph
    title="17.7.6.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2806"
><![CDATA[<p>Agencies MUST immediately revoke key pairs when a private certificate is suspected of being compromised or leaves the control of the agency.</p>]]></paragraph>
</block>
</subsection>
</section>
