19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Key length<br />

Various cryptographic algorithms with different key lengths can be used with<br />

SSL, for example RC2 or RC4 with a 40-bit or 128-bit key length, DES with a<br />

56-bit key length, triple-DES with a 112-bit key length, or IDEA with a 128bit<br />

key length, as well as hash functions such as MD5 or SHA-1 (see also<br />

S 3.23 Introduction to Basic Cryptographic Terms in this connection). <strong>The</strong><br />

client and server must agree on the procedures to be used in the session at the<br />

time when the connection is established.<br />

Some browsers from US vendors the integrated encryption procedures have<br />

only extremely short key lengths (40-bit), on account of the US export<br />

restrictions. <strong>The</strong>se cannot withstand a brute-force attack for long, i.e. an attack<br />

involving simply trying out all possible keys. If the protection requirements<br />

for the transmitted data are low, this short key length may be adequate, and it<br />

at least protects against opportunist offenders. Otherwise, browser versions<br />

which offer encryption procedures based on at least an 80-bit key length<br />

should be used. International versions of the commonly used browsers which<br />

support 128-bit key lengths are now available.<br />

Alternatively, add-on products developed by German companies which<br />

likewise permit the use of longer keys inside standard browsers should be<br />

used. Public domain software such as SSLeay or OpenSSL can also be used<br />

for this purpose.<br />

Certificates<br />

One difficult problem with data communication across open networks is how<br />

to check the identity of communication partners, because one cannot rely on<br />

the stated name actually being correct. With SSL, the identity of<br />

communication partners is checked by means of certificates. Certificates<br />

contain their public keys together with confirmation provided from another<br />

authority of the correct assignment of the public key to its "owner", in this<br />

case therefore a server or client. <strong>The</strong> value of a certificate is therefore<br />

dependent not least on the trustworthiness of this verification entity (also<br />

known as a trust centre or certification body). <strong>The</strong> genuineness of the<br />

certificate can, in turn, be checked using the public key of the verification<br />

entity.<br />

Three different types of certificates may be distinguished with SSL:<br />

- user certificates, which are required for client authentication,<br />

- certificates from certification bodies, although some certification bodies<br />

have several certificates, depending on their underlying security policy,<br />

and<br />

- Certificates from software producers or from operators of Web pages<br />

All browsers come supplied with SSL certificates from certain certification<br />

bodies when they are installed. <strong>The</strong>se certification bodies have very different<br />

security guidelines and conditions under which they grant certificates.<br />

Initially, therefore, all certificates should be deactivated, and only reactivated<br />

when you are convinced that their security policy satisfies your own security<br />

needs.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Minimum key length 80<br />

bits

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!