19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.83 Compromising cryptographic codes<br />

When cryptographic procedures are used, the gain in security depends to a<br />

large extent on how confidential the secret cryptographic codes are. With<br />

knowledge of both the code and the cryptomethod used, it is normally easy to<br />

revert the encoding and obtain plain text. A potential perpetrator will therefore<br />

attempt to ascertain the code used. Possible points of attack are:<br />

- Unsuitable processes are used to produce the code, for example to<br />

determine random numbers or derive the code.<br />

- <strong>The</strong> codes that are produced are exported before they are stored using a<br />

safe medium.<br />

- During operation, codes from cryptomodules are exported through<br />

technical attacks .<br />

- Codes left as backup are stolen.<br />

- When cryptographic codes are entered, the codes cracked by perpetrators.<br />

- <strong>The</strong> cryptomethods in use are cracked. In the case of symmetric<br />

cryptographic techniques such as DES, for example, it is currently possible<br />

to determine the code using huge numbers of parallel computers (bruteforce<br />

attack).<br />

- Internal perpetrators give away cryptographic codes in use.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!