19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

Symmetric and asymmetric encryption algorithms have advantages and<br />

disadvantages which in some cases complement each other.<br />

Advantages of (good) symmetric algorithms:<br />

- <strong>The</strong>y are fast, i.e. they have a high data throughput.<br />

- <strong>The</strong> level of security is largely determined by the length of the key, i.e.<br />

with good symmetric procedures there should be no attacks which are<br />

considerably better than trying out all keys (brute-force attacks).<br />

- <strong>The</strong>y offer a high level of security with a relatively short key.<br />

- It is easy to generate keys, because usually any bit sequence of a fixed<br />

length is allowed as the key and a random number can be chosen as the<br />

key.<br />

Disadvantages of symmetric algorithms:<br />

- All users have to keep all keys belonging to their communication partners<br />

secret.<br />

- <strong>The</strong>y are less well suited to key distribution than asymmetric procedures,<br />

especially if there are a large number of communication partners.<br />

- <strong>The</strong>y are less practicable than asymmetric procedures for non-repudiation<br />

purposes, because when symmetric keys are used it is not easy to detect<br />

which of the two communication partners has encrypted the message. This<br />

can only be ensured by an intermediate third party, which is integrated into<br />

the message flow by means of corresponding cryptographic protocols.<br />

Advantages of (good) asymmetric procedures:<br />

- Every party in a confidential communication process only has to keep his<br />

own private key secret.<br />

- <strong>The</strong>y can easily be used for digital signatures.<br />

- <strong>The</strong>y offer elegant solutions for the distribution of keys in networks,<br />

because the public keys or key certificates can be stored in freely<br />

accessible form on central servers without imparing the security of the<br />

procedure.<br />

- <strong>The</strong>y are well suited for non-repudiation purposes.<br />

Disadvantages of asymmetric procedures:<br />

- <strong>The</strong>y are slow, i.e. they generally have a low data throughput.<br />

- Security: the following applies to all well-known public key procedures:<br />

- <strong>The</strong>re are considerably better attacks than trying all keys one after<br />

the other, which is why (in comparison with symmetric methods)<br />

relatively long keys are required in order to achieve an equally high<br />

degree of security.<br />

- Security is based "only" on the presumed (but recognised among the<br />

experts) algorithmic difficulty of a mathematical problem (for<br />

example decomposing a large number into its prime factors).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!