19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

requirements have to be satisfied by the technical components that are used for<br />

digital signatures, and what tasks are to be performed by certification<br />

authorities which issue verification key certificates. In addition it governs how<br />

the required security of the components and certification authorities is to be<br />

checked. As a result, digital signatures conforming to the Signature law are<br />

accorded a high level of security, also in court.<br />

Key management<br />

Whenever encryption is used, the problem arises of ensuring appropriate<br />

management of the keys. <strong>The</strong> question is raised as to how the following tasks<br />

are performed throughout the lifecycle of the keys:<br />

- Generation/initialisation<br />

- Agreement/establishment<br />

- Distribution/transport<br />

- Changing/updating<br />

- Storage<br />

- Authentication/certification<br />

- Recall<br />

- Recovery in the event of destruction or loss<br />

- Destruction/deletion<br />

- Archiving<br />

- Escrow (storage in trust)<br />

Key management can, and usually does, also make use of cryptographic<br />

techniques. It must be performed for all of the crypto modules of a<br />

cryptographically based protection system. Secret keys must be protected<br />

against unauthorised disclosure, modification and replacement. Public keys<br />

must be protected against unauthorised modification and replacement.<br />

Appropriate key management is a necessary precondition if it is to be at all<br />

possible to protect information by cryptographic methods. Key management<br />

requires its own resources, dedicated specifically to this task.<br />

Certification bodies<br />

Trust centres or certification bodies are required whenever it is considered<br />

necessary to use asymmetric crypto algorithms for digital signatures or for<br />

encryption and the number of users has risen so much as to be difficult to<br />

manage. <strong>The</strong>se procedures require a different key for signature generation or<br />

encryption than they do for signature checking or decryption. A pair of<br />

corresponding keys is generated for this purpose on a user-related basis. One<br />

key, known as the public key, is made known publicly. <strong>The</strong> other key, known<br />

as the private key, must be kept absolutely secret. A digital signature can be<br />

generated or a text encrypted with the private key – and only with that key –<br />

and the signature can be verified or the text decrypted with the associated<br />

public key – again, only with that key. In order to ascertain whether the public<br />

keys are genuine and to check that keys are reliably allotted to individuals, it<br />

is necessary to use the trust centres or certification bodies mentioned above,<br />

which confirm the attribution of a person to a public key by issuing a<br />

certificate.<br />

Typically, the following tasks are undertaken at certification bodies such as<br />

these:<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!