14.07.2013 Views

Understanding Security APIs - CrySyS Lab

Understanding Security APIs - CrySyS Lab

Understanding Security APIs - CrySyS Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2<br />

Origins of <strong>Security</strong> <strong>APIs</strong><br />

There are probably several hundred API designers at work today, and this figure will<br />

grow as <strong>Security</strong> <strong>APIs</strong> become ubiquitous. However, their origins were in the hands<br />

of only a few people: small teams of engineers and scientists, first in the US military,<br />

and then in Automated Teller Machine (ATM) security. This brief survey attempts<br />

to show a unifying logic behind the development of <strong>Security</strong> <strong>APIs</strong> (of course, history<br />

is not as simple as this, and the individual motivations and perspectives of the<br />

parties involved will not necessarily conform).<br />

2.1 Beginnings<br />

<strong>Security</strong> <strong>APIs</strong> were born in an age when dedicated hardware was necessary in order<br />

to do cryptography. The major algorithm of the 70s and 80s – DES – was designed<br />

to be efficient to implement in hardware. The computers of the day needed a simple<br />

command set to govern communication with this hardware: it might consist of a<br />

command to set the key, a command to encrypt, and one to decrypt. Here was the<br />

first cryptographic API, though it could not yet be considered a <strong>Security</strong> API, as<br />

there was no policy on usage to enforce.<br />

As digital cryptographic equipment became smaller and more portable, the military<br />

adopted in increasing numbers of roles, such as to secure battlefield communications<br />

links. Whilst cipher rooms in embassies abroad would have good physical security,<br />

the dynamic environment of the battlefield could not offer crypto equipment or the<br />

keys within it any long-term safety. Tamper-resistance provided a partial solution<br />

to the problems of battlefield capture.<br />

The principle of tamper-resistance was part of military thinking for some time.<br />

Military analogue and digital equipment was built with custom-marked components<br />

for many years, which made reverse-engineering and re-commissioning of stolen or<br />

damaged equipment harder. Tamper-resistance found further applications in nuclear<br />

command and control. This was an issue of particular concern in the late 1960s;<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!