19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- <strong>The</strong>re may be different cycles for changing keys.<br />

Distribution and exchange of keys<br />

Cryptographic communications relationships can only work if the<br />

communicating partners have matched cryptographic keys at their disposal.<br />

For this to be possible, all communicating partners must be provided with the<br />

necessary keys. Various procedures can be used for distributing keys and for<br />

exchanging keys. <strong>The</strong> differences arise from the use of different cryptographic<br />

techniques and mechanisms, or from the combination of such techniques and<br />

mechanisms (see S 2.164 Selection of a suitable cryptographic procedure). In<br />

this case the term key distribution refers to the initial provision of basic keys<br />

to communication partners. For this, the keys are transferred to the individual<br />

communication partners from a (usually central) key generation point, for<br />

example a Trust Center.<br />

<strong>The</strong> keys should be distributed on suitable data media (e.g. chip cards) or via<br />

communications links (e.g. LAN or WAN) in a form which ensures<br />

confidentiality (e.g. encrypted with a KEK - key encryption key), integrity<br />

(e.g. MAC-secured) and authentication (e.g. with a digital signature in<br />

accordance with the signature law). Gaining unauthorised knowledge of the<br />

keys or corruption of the keys must be prevented, or it must at least be<br />

possible to detect such an event.<br />

<strong>The</strong> exchange of keys refers to the key agreement procedure between two<br />

communication partners to generate a session key. <strong>The</strong> session key is a key<br />

that is used for only a limited time, such as for the duration of a<br />

communication connection. This length of time must be specified, because<br />

sessions can last a very long time. <strong>The</strong> time can be specified by relative<br />

timing, for example, or by a packet counter. A new session key is negotiated<br />

between the communication partners for every new connection.<br />

Advanced systems nowadays make use of asymmetric cryptographic<br />

procedures for key distribution and key exchange. A trustworthy certification<br />

body can be established to prove the authenticity of the public keys. <strong>The</strong><br />

communication partners must identify themselves to the certification body and<br />

have their public keys certified there by means of a digital signature from the<br />

certification body. <strong>The</strong> digital certificate generated in this way should contain<br />

at least the public key and an identification feature specific to the<br />

communication partner, the period of validity of the certificate and the digital<br />

signature from the certification body. Knowledge of the public signature key<br />

of the certification body puts every communication partner in a position to<br />

verify the authenticity of the public key of the other party with whom they are<br />

communicating.<br />

Installing and storing keys<br />

In the course of key installation it is necessary to check the authentic origin<br />

and integrity of the key data. As a general rule, keys should never be stored in<br />

the system in plain form but always in encrypted form. When using software<br />

encryption products, it must be borne in mind that keys are inevitably present<br />

in plain form on the PC system at least temporarily during the<br />

encryption/decryption process. If the <strong>IT</strong> systems on which the cryptographic<br />

product is being used do not offer adequate access protection for the keys,<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!