19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

S 3.23 Introduction to basic cryptographic terms<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security management<br />

Implementation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security management<br />

As far as the user is concerned, the use of crypto products may mean<br />

additional effort or -- depending on the complexity of the products used – may<br />

even require a greater depth of knowledge. All staff who are supposed to make<br />

use of cryptographic procedures and products should therefore be made aware<br />

of the usefulness and necessity of the cryptographic techniques and be given<br />

an introduction to basic cryptographic terminology. This applies in particular<br />

of course to staff whose role it is to draw up a crypto concept or select, install<br />

or manage crypto products.<br />

<strong>The</strong> following sections are intended to provide an elementary understanding of<br />

the fundamental cryptographic mechanisms. Examples are described as a<br />

means of explaining which cryptographic technique can be used in which<br />

situation.<br />

Elements of cryptography<br />

<strong>The</strong> term cryptographic refers to mathematical methods and techniques that<br />

can be used for protecting information against unauthorised disclosure and/or<br />

intentional manipulation. <strong>The</strong> protection of information by cryptographic<br />

methods – in contrast with infrastructural and technical safeguards – is a<br />

mathematical-logical form of protection.<br />

Cryptographic procedures entail the implementation of a mathematical<br />

calculation process – an algorithm – through specific techniques. <strong>The</strong>ir<br />

effectiveness is based on the assumption that a potential attacker will be<br />

unable to solve a certain mathematical problem - and not because of a lack of<br />

particular skills but because of not having knowledge of quite specific "key"<br />

information.<br />

Cryptographic methods always relate to the following situation: a sender A<br />

(commonly referred to in cryptography as "Alice") sends a message via a nonsecure<br />

channel to a recipient B (referred to as "Bob").<br />

<strong>The</strong> sender and recipient may also be identical in this case, and the term<br />

"channel" may refer to any transport medium. When it is a matter of<br />

encrypting local data, the sender and recipient are of course identical, and the<br />

"channel" is taken to be the storage medium.<br />

Basic cryptographic objectives<br />

<strong>The</strong>oretical and practical considerations lead to a distinction being drawn<br />

between four basic cryptographic objectives:<br />

1. Confidentiality/secrecy: no unauthorised third party E (let her name be<br />

"Eve") is to gain access to the contents of the message or file.<br />

2. Integrity: It must be possible to detect unauthorised manipulation of the<br />

message or file (e.g. the insertion, omission or replacement of parts).<br />

3. Authenticity:<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!