19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

- Proof of identity (authentication of communications partners): a<br />

communicating party (e.g. a person, organisation or <strong>IT</strong> system) must<br />

be able to prove its identity beyond doubt to another party.<br />

- Proof of origin (authentication of messages): A must be able prove<br />

to B that a message originates from A and has not been altered.<br />

4. Non-repudiation: the emphasis here in comparison with message<br />

authentication is placed on verifiability with respect to third parties.<br />

- Non-repudiation of origin: it should be impossible for A to deny<br />

having sent a certain message to B after the event.<br />

- Non-repudiation of receipt: it should be impossible for B to deny<br />

having received a message sent by A after the event.<br />

It is plain that there are connections between these objectives, but one<br />

fundamental understanding of modern cryptography is as follows: the<br />

guaranteeing of confidentiality and of authenticity are separate basic aims of a<br />

cryptographic system: authentication restricts the circle of potential senders of<br />

a message, while confidentiality restricts the circle of potential recipients.<br />

<strong>The</strong> primary cryptographic method for preserving confidentiality is<br />

encryption, and the primary methods of guaranteeing integrity, authenticity<br />

and non-repudiation are hash functions, message authentication codes<br />

(MACs), digital signatures and cryptographic protocols. <strong>The</strong> individual<br />

cryptographic concepts are described briefly in the following.<br />

I. Encryption<br />

Encryption (encipherment) transforms a plaintext, in accordance with an item<br />

of additional information known as the key, into an associated secret text<br />

(ciphertext or enciphered text) that should not be decryptable for anyone who<br />

does not know the key. <strong>The</strong> reverse transformation – reclaiming the plaintext<br />

from the ciphertext – is known as decryption or decipherment. In all state-ofthe-art<br />

encryption algorithms, plaintexts, ciphertexts and keys are each<br />

represented as sequences of bits.<br />

For them to be useable in practice, encryption algorithms must satisfy the<br />

following minimum requirements:<br />

- <strong>The</strong>y should be resistant to deciphering, i.e. it must be impossible to<br />

decrypt the ciphertext without knowledge of the key; in particular, the<br />

quantity of possible keys must be "sufficiently large", because otherwise it<br />

would simply be possible to try out all keys.<br />

- <strong>The</strong>y must be easy to use.<br />

- Encryption and decryption must be "fast enough".<br />

<strong>The</strong> requirement for resistance to deciphering must always be considered<br />

relative to current technical and mathematical possibilities. An important<br />

factor in the assessment of encryption algorithms is that it must be practically<br />

impossible at the time of use to decrypt the ciphertext without knowledge of<br />

the key, i.e. impossible with the technology available at the time within an<br />

acceptable timescale.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!