19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

- Key generation is generally complex and time-consuming, because care<br />

must be taken not to generate "weak" key pairs.<br />

Hybrid procedures attempt to combine the advantages of both types of<br />

encryption: they use asymmetric encryption to transfer a session key for a<br />

symmetric procedure, and encrypt the bulk data with the symmetric procedure.<br />

<strong>The</strong> session key is usually used for only one session (transmission) and is then<br />

destroyed. <strong>The</strong> asymmetric key pair may be used for a long period, depending<br />

on the circumstances.<br />

II. <strong>Protection</strong> of integrity<br />

<strong>The</strong> objective of integrity protection is to enable the recipient of a message to<br />

establish whether he has received the message without it being corrupted. <strong>The</strong><br />

basic principle of integrity protection is to transmit the message unencrypted<br />

and unchanged, but at the same time to send certain checking information with<br />

the message, which enables the actual message to be checked to ensure that it<br />

is uncorrupted. <strong>The</strong> prerequisite for this, however, is that the recipient must<br />

receive the check data in an unmanipulated state. <strong>The</strong> check data therefore has<br />

to satisfy the following conditions:<br />

- <strong>The</strong> amount of check information must be kept as small a possible so as to<br />

minimise the amount of additional information to be transmitted.<br />

- It must be possible to detect virtually any manipulation, even of only a<br />

single bit of the message, on the basis of the check information.<br />

- It must be possible to transmit the check information in an unmanipulable<br />

form, or it must be possible to detect manipulations.<br />

Typically there are two methods that are used for the calculation of check<br />

information: hash functions and message authentication codes.<br />

A (one-way) hash function is a data transformation with the following<br />

characteristics:<br />

- Compression characteristic: bit sequences of any length are mapped to bit<br />

sequences of a fixed, generally shorter length (typically 128 - 160 bits).<br />

- "One-way" characteristic: for a specified hash value it must be "practically<br />

impossible" to find a message whose hash value is the specified hash value.<br />

- Collision resistance: it must be "practically impossible" to find two<br />

messages which lead to the same hash value.<br />

A and B can check the integrity of a message with the aid of a hash function<br />

known to both communication partners: Alice hashes her message, and<br />

transmits this and the hash value to Bob in such a way that the accuracy of the<br />

hash value is guaranteed. Similarly, Bob hashes the message he receives and<br />

compares his result with the hash value supplied by Alice. If the two values<br />

tally, he can assume that no bit of the message has been changed.<br />

A message authentication code (MAC) is a cryptographic checksum for<br />

message security, in other words a data transformation in which a secret key is<br />

additionally included in the calculation, with the following characteristics:<br />

- Compression characteristic: bit sequences of any length are mapped to bit<br />

sequences of a fixed, generally shorter length.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!