19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.32 Violation of basic legal conditions for the use<br />

of cryptographic procedures<br />

Various general legal conditions must be observed in relation to the use of<br />

cryptographic products. In some countries, for example, cryptographic<br />

procedures are not allowed to be used without approval. This can mean that, if<br />

encoded data records are sent to such countries, the recipient may not be able<br />

to read them because they cannot employ the necessary cryptomodules or may<br />

even commit an offence.<br />

In addition, there are severe restrictions on exporting products with strong<br />

cryptography in a large number of countries. This particularly applies to the<br />

USA. When export is restricted, the functionality of coding products which<br />

are strong in themselves is often intentionally reduced (by reducing the<br />

diversity of the code). Such intentionally-weakened procedures do not even<br />

offer sufficient protection for average protection requirements. This is for<br />

instance the case for standard PC software from the USA such as Internet<br />

browsers (SSL), in which the length of the code is reduced to only 40 bits.<br />

Some export rulings even require parts of the code to be deposited, so that the<br />

cryptomodules are in principle unrestricted but foreign intelligence still has<br />

the possibility of accessing the files if necessary.<br />

On the other hand, such restrictions, which are valid for use within certain<br />

countries or for export, can prevent data worth protecting from being encoded<br />

or cause it to be protected with low-quality cryptoproducts. This can both<br />

open the door to perpetrators and at the same time violate national law. For<br />

example, data protection laws may require the use of adequate cryptographic<br />

procedures for the protection of personal data.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!