19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

- In the application of cryptographic processes, random numbers are often<br />

required. Poor generators of random numbers could cause the values<br />

produced to be predictable. This could, for example, cause cryptographic<br />

check sums, which are supposed to guarantee the integrity of a message, to<br />

become worthless.<br />

For example, these criteria affect the DES algorithm for symmetric coding,<br />

which is used frequently world-wide. This uses an effective code length of 56<br />

bits. <strong>The</strong> so-called triple DES algorithm, carried out three times in a row with<br />

two codes, has an effective code length of 112 bits and can be considered<br />

sufficiently secure at the moment. <strong>The</strong> RSA algorithm, an asymmetric<br />

procedure based on the factorisation problem, is also affected. If this is<br />

operated with a code length of under 512 bits, potential insecurities are to be<br />

expected. For the next few years, a code length of over 1024 bits is seen to be<br />

sufficiently secure.<br />

A common example of an insecure but extremely fast algorithm is what is<br />

known as the XOR function, which uses a simple method of linking constant<br />

values to the original plain text. This is a high-performance algorithm which,<br />

however, can be cracked extremely quickly. <strong>The</strong> XOR function can, on the<br />

other hand, be the most secure coding algorithm there is, if the data to be<br />

encoded are XOR-ed with unpredictable random values (One-Time-Pad).<br />

For inexperienced users it is practically impossible to determine whether a<br />

cryptographic algorithm is sufficiently secure. <strong>The</strong>refore, you should only use<br />

algorithms that are known to have been developed by experts or have<br />

undergone years of scientific investigations.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!