19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

- Key generation: pairs of keys have to be generated for the certification<br />

body and, if appropriate, for users.<br />

- Key certification: the user data, the corresponding public keys and other<br />

data are combined to form a certificate, which is digitally signed by the<br />

certification body.<br />

- Personalisation: the certificate and, if appropriate, the public and private<br />

keys are transferred to a signature component (generally a chip card).<br />

- Identification and registration: the users are identified and registered on<br />

presentation of an identification document.<br />

- Directory service: certificates are held ready for retrieval in a public<br />

directory. In addition, the directory service must provide information on<br />

whether a certificate is blocked or not.<br />

- Time stamp service: it may be necessary to trustworthyly link certain data<br />

to a point of time. To do this, the time is appended to the data and the result<br />

is digitally signed by the time stamp service.<br />

Trust centres can also offer the safekeeping of keys as an additional service if<br />

it is intended to use the cryptographic keys for encryption. In order to ensure<br />

that encrypted data can still be accessed if a key is lost, the owner of the key<br />

(and no-one else) can be given a duplicate key, which is stored securely at the<br />

trust centre.<br />

Key distribution centres<br />

<strong>The</strong> security of symmetric encryption methods is dependent on whether the<br />

commonly used secret key is only known to the users who are authorised to<br />

access the protected information. In cases where it is necessary to protect<br />

stored data to which only the data’s owners are supposed to have access, this<br />

is relatively easy to guarantee because these owners merely have to protect the<br />

key in such a way that unauthorised users are unable to access it.<br />

<strong>The</strong> situation is different, however, if it is intended to use a symmetric<br />

encryption method to protect messages that are to be transmitted from a sender<br />

to a recipient via an insecure transmission medium. In this case the secret key<br />

must be available to both the sender and the recipient, i.e. there must be a<br />

possibility of engaging a protected exchange of information between the two<br />

parties. In practice this is often achieved by the encrypted distribution of<br />

communication keys through bodies known as key distribution centres<br />

(KDCs); this involves setting up entire hierarchies of keys that are mutually<br />

interdependent in security terms. <strong>The</strong> methods used in such instances are in<br />

some cases highly complex and are dependent on a large number of<br />

components for their security, in particular on the physical, organisational,<br />

staff-related and technical security of the KDCs and on the keys agreed for<br />

communication with the KDCs.<br />

If a secret key becomes compromised, in other words if it becomes known to<br />

an unauthorised third party, the result is that the confidentiality of all data is<br />

lost if it has been encrypted with that key or if encryption of the data is<br />

dependent on the key. This is particularly critical if one of the central keys of a<br />

key distribution hierarchy has become compromised.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!