19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

When A and B want to establish a confidential connection, they proceed as<br />

follows:<br />

1. <strong>The</strong>y agree on an encryption procedure.<br />

2. <strong>The</strong>y agree on a key or a pair of keys.<br />

3. A encrypts a message and sends this to B.<br />

4. B decrypts the ciphertext sent from A.<br />

<strong>The</strong>re are two major classes of encryption procedures:<br />

Symmetrical encryption procedures use the same key both for encryption and<br />

decryption. Symmetrical techniques are therefore also occasionally referred to<br />

as "one-key" techniques, because knowledge of one key is sufficient to be able<br />

to encrypt and decrypt texts.<br />

Well-known symmetrical encryption procedures include DES, Triple-DES,<br />

IDEA and RC5, for example.<br />

Symmetrical procedures are further differentiated, distinguishing between<br />

stream ciphers and block ciphers.<br />

In the case of stream ciphers, a key is used to generate a bit sequence (or bit<br />

stream) with as random an appearance as possible, which is added to the plain<br />

bit sequence (modulo 2). <strong>The</strong> plain bit sequence is therefore encrypted bit by<br />

bit (by the addition of key stream bits). It is essential for the security of stream<br />

ciphers that two (different) messages are never encrypted with the same key<br />

stream – this must be ensured with the aid of special measures<br />

(synchronisation information in the form of a message key). Examples of<br />

stream ciphers are RC4 and SEAL.<br />

Stromchiffre: Blockchiffre:<br />

Bitstromgenerator<br />

0<br />

1<br />

Schlüsselstrombit<br />

Klarbit XOR Geheimbit<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

0<br />

1<br />

1<br />

0<br />

Klartextblock<br />

Schlüssel<br />

Verschlüsselungsfunktion<br />

1<br />

1<br />

1<br />

1<br />

0<br />

0<br />

Geheimtextblock<br />

In the case of block ciphers, on the other hand, an entire block of bits is<br />

encrypted in one encryption cycle; nowadays this typically comprises 64 bits.<br />

Most symmetrical encryption methods are block ciphers; these also include<br />

DES, IDEA and RC5. A range of operating modes have been defined (and<br />

standardised) for block ciphers. <strong>The</strong>se are:<br />

- ECB (Electronic Code Book) mode, where every block is encrypted<br />

separately – independently of the other blocks<br />

- CBC (Cipher Block Chaining) mode and CFB (Cipher Feed Back) mode;<br />

in these modes a dependence is established between the ciphertext blocks

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!