|
COMMERCE BUSINESS DAILY ISSUE OF JUNE 2,1997 PSA#1857National Institute of Standards & Technology, Acquisition & Assistance
Div., Bldg. 301, Rm B117, Gaithersburg, MD 20899 70 -- SUPPORT DATA ENCRYPTION IN FEDERAL GOVERNMENT APPLICATIONS SOL
52SBNB7C1208 DUE 071197 POC Marsha Rodgers (301)975-6398, FAX
(301)963-7732 WEB: NIST Contracts Homepage,
http://www.nist.gov/admin/od/contract/contract.htm. E-MAIL: NIST
Contracts Office, Contract@nist.gov. BROAD AGENCY ANNOUNCEMENT -- The
National Institute of Standards and Technology (NIST) is soliciting
proposals for products and services which will demonstrate the
viability of the recovery of keys that are used to support data
encryption in Federal government applications. BACKGROUND: In May 1996,
the Office of Management and Budget (OMB) released a white paper
entitled "Enabling Privacy, Commerce, Security, and Public Safety in
the Global Information Infrastructure". This paper stated that
"government and industry must work together to create a security
management infrastructure and attendant products that incorporate
robust cryptography without undermining national security and public
safety". Recently, a task group was formed for the purpose of testing
the feasibility of implementing emergency key recovery capabilities in
Federal Government applications. Approximately ten Federal agencies
will participate in a Key Recovery Demonstration Project (KRDP),
formerly known as the Emergency Access Demonstration Project (EADP), to
demonstrate the viability of key recovery. In this Broad Agency
Announcement (BAA), NIST is soliciting products and services to support
this project. GOALS: Specific goals of the KRDP include the following
: (a) demonstrate the practicality of key recovery in Federal
Government applications; (b) determine to what extent Commercial
Off-The-Shelf ( COTS) products or commercially available services
currently exist to support key recovery. Products that can be modified
with minimum difficulty will also be considered; (c) determine how
these products and services can be integrated into existing
applications; (d) identify, implement, test and evaluate diverse key
recovery technologies; and (e) identify barriers to interoperability
among applications that use different key recovery technologies and
make recommendations for lessening or removing those barriers.
OBJECTIVES: Different methods of key recovery will be demonstrated .
Encryption keys will be recovered by Key Recovery Agents upon receipt
of an authorized request; keys used for digital signatures will not be
recovered. Off-the-shelf technology is being sought for use on this
project; there are no restrictions on standards compliance or algorithm
usage. The KRDP will include a Public Key Infrastructure (PKI) which
consists of a root Certification Authority (CA) and several dependent
Certification Authorities. CAs certify the public keys of particular
user communities and provide certification paths to other CAs so that
public keys in other CA domains may be verified. The root CA will be
located at and be operated by NIST. The remaining CAs will be located
either at the sites of agencies participating in the project or at
third party sites. Other components of the KRDP that will be procured
under this BAA include Organization Registration Authorities (ORAs) and
Key Recovery Agents (KRAs). ORAs authenticate users, validate requests,
and interact with the Certification Authorities; ORAs may also request
key recovery from a KRA. KRAs areused to recover keys, key components
or plaintext messages upon the receipt of an authorized request. The
infrastructure imposes no implementation constraints. An example of the
services provided by a CA and a KRA could be included in a single
product. An example infrastructure which illustrates three possible
methods for accomplishing key recovery in a PKI environment can be
found at the web site specified in this BAA. PROPOSAL CONTENT: NIST is
seeking the following information about off-the-shelf products and/or
services that can be used in the Key Recovery Demonstration Project:
the functionality of the product or service (e.g., CA, ORA, KA, user);
whether a product or a service is being offered; a list of all
features (e.g., key generation) provided by the product or service; a
description of the proposed key recovery methodology to be used, if
appropriate; whether the proposed product or service is currently
available and, if not, the expected date of availability; the
requirements for operating or communicating with the proposed product
or service; information which specifies how the product or service can
be integrated with the product(s) and service(s) provided by other
vendors or with other project elements (e.g., CA, ORA), if applicable;
any constraints on product integration, such as dependence on a
particular cryptographic algorithm, cryptographic product,
communication interface etc.; and the extent to which additional
negotiated enhancements to the product and/or service can be made .
Since the enhancements that may be requested cannot be specified at
this time, a general statement about the capability of responding to
such a request is all that is required. The following information about
the KRDP elements should be provided when being proposed by a vendor:
(1) Certification Authority -- A Certification Authority system
certifies public keys and optionally generates public/private key pairs
and may act as a certificate repository. If a Certification Authority
system is provided as a service, specify the services provided and the
cost of each service. Explain any factors that will cause the cost to
vary and the method of obtaining the services that are provided. If a
Certification Authority can be purchased, explain the impact of any
factors that will affect the initial procurement cost and provide the
cost of operating the system.Vendors who provide only a certificate
repository service should specify the cost and the method of accessing
this service . (2) Key Recovery Agent -- If key recovery is provided
as a service, specify the cost of registering with the key recovery
service and the costs of key recovery operations. Indicate how these
costs will vary, depending upon the number of users that are registered
and the number of key recoveries that are performed. Specify the key
archival services provided, if applicable, and the cost of these
services. List and specify the costs of cryptographic products that
must be used in conjunction with the key recovery service. If a key
recovery product canbe procured for operation by the user or user's
representative, list all factors that will affect pricing. List and
specify the costs of cryptographic products that must be used in
conjunction with the key recovery service. (3) Organization
Registration Authority -- Specify all costs associated with the
procurement and operation of an Organization Registration Authority.
Explain the method of interaction with the Certification Authority and
the Key Recovery Agent,wherever applicable. (4) User Software --
Specify the functionality and cost of all user software that is
required to perform encryption/decryption, key generation, key
recovery, certificate path acquisition and verification and to interact
with other system elements (e.g., Certification Authority, Key Recovery
Agent). Responders should also provide any additional information about
the functional capabilities, performance and cost of their product or
service that will assist Federal agencies participating in the Key
Recovery Demonstration Project in evaluating the offerings. Where
cryptographic functions are performed, responders should state the
degree to which their offered product or service complies with FIPS
140-1 . Where applicable, responders should specify the degree to which
their offered product or service complies with the NIST draft " Minimum
Interoperability Specification for PKI Components". SUBMISSIONS --
Offerors are encouraged to submit concise, but descriptive proposals
which will be accepted until 5:00 P. M., EST on JULY 11, 1997. Five (5)
copies of the proposal shall be submitted to the following address:
Marsha Rodgers, Acquisition and Assistance Division, National Institute
of Standards and Technology, Building 301 Room B117, Gaithersburg,
Maryland 20899. PROPOSALS SENT BY FAX OR E-MAIL WILL BE REJECTED.
Proposals will be selected through a technical/scientific/business
decision process with technical and scientific considerations being
most important. Individual proposal evaluations will be based on
acceptability or nonacceptability without regard to other proposals
submitted under the announcement. HOWEVER, DUE TO BUDGETARY
CONSTRAINTS, ALL ACCEPTABLE PROPOSALS MAY NOT BE FUNDED. No award will
be made without a proposal to perform the specific effort within an
estimated cost and time framework. PROPOSAL FORMAT- Proposals shall
consist of two separate parts. Part 1 shall provide the technical
proposal and Part 2 shall address costs. The proposal must not exceed
the number of pages stated below (a "page" is defined to be a sheet of
paper no greater than 8 x 11 inches, in type not smaller than 12
pitch) . Part 1 shall include: (1) Cover Page (1 Page) (a) Title: Key
Recovery Demonstration Project Proposal; (b) Name of organization
submitting proposal; (c) Contracting Official (Name, Title, Address,
Telephone Number, Electronic Mail Address); (d) Technical Contact
(Name, Title, Address, Telephone Number, Electronic Mail Address); (2)
Organization Description (1 page)- (a) Principal business of
organization; (b) Major qualifications and past achievements in data
encryption/key recovery technology;(c) KRDP system elements for which
proposal is being submitted.(3) Offered Products and/or Services (1-3
pages per offered product or service) -- For each offered product
and/or service, responders should provide the corresponding information
requested in the Proposal Content Section of this BAA. Part 2, Costs,
shall be supported by detailed breakdowns of labor hours by labor
category and tasks/subtasks, materials, travel, computer and other
direct and indirect costs. ADDITIONAL INFORMATION: The following
documents can be accessed at World Wide Web site
http://csrc.nist.gov/krdp: KRDP Project Summary, FIPS -- 140-1,
Implementation Evaluation Criteria for the KRDP, "Enabling Privacy,
Commerce, Security, and Public Safety in the Global Information
Infrastructure", referenced on Page 1, draft Minimum Operability
Specification for PKI Compontents, and example Methods of Key Recovery.
Any further technical questions relating to the BAA should be directed
to : Jerry Mulvenna, Phone -- (301) 975-3631, E-Mail Address --
jerry.mulvenna@nist.gov. Any contractual questions should be directed
to Marsha Rodgers at (301)975-6398. The period of performance of the
BAA is six months from the date of each award. This announcement
constitutes a Broad Agency Announcement as contemplated in FAR
6.102(d)(2). There will be no formal request for proposals or other
solicitations regarding this announcement. Proposals shall be valid for
a periodof twelve (12) months after submission. Where the effort
consists of multiple portions which could reasonably be partitioned for
purposes of funding, these should be identified with separate cost
estimates for each. The Government reserves the right to select for
award any, all, part, or none of the proposals received in response to
this announcement. This BAA is an expression of interest only, and
does not commit the Government to pay any pre-proposal or proposal
preparation costs. All responsible sources may submit a proposal which
shall be considered. EVALUATION CRITERIA/AWARD PROCESS : Proposals
will be evaluated based on acceptability or unacceptability using the
following criteria which are listed in decreasing order of priority:
(1) Utility for Meeting Project Goals -- For data recovery systems, the
offered products and/or services should provide a method of
implementing key recovery in Federal Government applications or the
means to be integrated with the products and services offered by other
contractors to provide this service. Reference the Implementation
Evaluation Criteria for the KRDP at the above-mentioned web site. (2)
Availability of Offered Products and/or Services -- The offered
products or services should be able to be integrated within a timeframe
that will allow testing to commence as soon as possible.(3) Compliance
with Applicable Standard or Specification- Where applicable, the
degree to which the offered product or service complies with FIPS 140-1
or the draft "Minimum Interoperability Specification for PKI
Components" shall be considered a positive factor in the proposal
evaluation.(4)Diversity of Key Recovery Solutions- A primary project
goal is to implement, demonstrate and evaluate different solutions for
key recovery. Accordingly, products and/or services providing
differing solutions will be preferred.(5) Past Performance -- the
offeror's capabilities, related experience, facilities, techniques, or
unique combinations thereof which are integral factors for achieving
the proposed objectives; and (6) Cost and cost realism -- Cost realism
will be used only as an evaluation criterion in proposals which have
significantly under-or-over-estimated the cost to complete their
effort. All awards made in response to this BAA shall be subject to
availability of Government funds. Proposals will be evaluated and
ranked by a Source Selection Evaluation Panel (SSEP) composed of
representatives of Federal Agencies participating in the KRDP. (0149) Loren Data Corp. http://www.ld.com (SYN# 0364 19970602\70-0009.SOL)
70 - General Purpose ADP Equipment Software, Supplies and Support Eq. Index Page
|
|