1. National Institute of Standards and Technology (NIST) FIPS 201-3
Personal Identity Verification (PIV) of Federal Employees and Contractors
January 2022. Section 6.2
"PIV Cryptographic Keys
" states
"Private keys are generated on the PIV card and are not exportable." This highlights the card's role as a secure
non-exportable container for private keys.
2. National Institute of Standards and Technology (NIST) SP 800-73-4
Interfaces for Personal Identity Verification - Part 1: PIV Card Application Namespace
Data Model
and Representation
January 2015. Section 3.1.1
"PIV Card
" specifies
"The PIV Card is used to store PIV identity credentials and to perform cryptographic computations." This directly supports the role of secure storage and application of keys.
3. Stallings
W.
& Brown
L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. Chapter 22
"Public-Key Cryptography and Message Authentication
" discusses the critical need to protect private keys
stating that hardware tokens like smartcards "provide tamper-resistant storage of private keys."
4. Microsoft Documentation
Smart Card Architecture. The documentation explains that a smart card's Cryptographic Service Provider (CSP) or Key Storage Provider (KSP) ensures that "authentication and other private key operations are performed on the smart card and not on the host computer
" reinforcing the principle of secure application and storage.