19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.68 Use of encryption procedures for network<br />

communications<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Communication networks transport data between <strong>IT</strong> systems. <strong>The</strong> data is<br />

rarely transmitted via a dedicated communications line between the parties<br />

communicating with each other. Instead, the data is routed via a number of<br />

intermediate stations. Depending on the communication medium and the<br />

technology used, the data can be intercepted by the intermediate stations<br />

without authority, or also by third parties residing in the respective switching<br />

network (for example when using the Ethernet protocol without point-to-point<br />

networking). As the data being transmitted should not be tapped or modified<br />

by unauthorised third parties, nor used by them for subsequent reloading into<br />

the network (replay attacks), a suitable mechanism must be used to prevent<br />

this happening. Encryption of the data with – if necessary – mutual<br />

authentication of the communication partners can reduce this risk (depending<br />

on the strength of the chosen encryption procedure and the security of the keys<br />

used; see also Section 3.7 Crypto concept).<br />

As a rule, applications communicate with each other in order to exchange<br />

application-related information. Encryption of the data can then be carried out<br />

at several levels:<br />

- At the application level: the communicating applications each have to have<br />

the relevant encryption and decryption mechanisms available to them.<br />

- At the operating system level: encryption is performed by the local<br />

operating system. All communication via the network is encrypted either<br />

automatically or on request.<br />

- At the network switching element level: encryption takes place between the<br />

network switching elements (e.g. routers).<br />

<strong>The</strong> individual mechanisms each have specific advantages and disadvantages.<br />

Encryption at the application level has the advantage that encryption is fully<br />

subject to the control of the respective application. One disadvantage is that<br />

the only partner applications that can be considered for encrypted<br />

communication are those that are equipped with the same encryption<br />

mechanism. It is also possible to use authentication mechanisms between the<br />

two partner applications.<br />

In contrast with this, in the case of encryption at the operating system level<br />

encryption takes place transparently for every application. Each application<br />

can carry out encrypted communication with every other application, provided<br />

the operating system on which the partner application is running has the<br />

appropriate encryption mechanism. A drawback in this instance is that, with<br />

regard to authentication, only the computers can be authenticated to each<br />

other, not the respective partner applications.<br />

Using encrypting network switching elements has the advantage that there do<br />

not have to be any encryption mechanisms on the application or computer<br />

side; in this case, too, encryption is transparent for the communication<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!