19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.164 Selection of a suitable cryptographic<br />

procedure<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

<strong>The</strong> selection of a cryptographic procedure is divided into two subsidiary<br />

tasks:<br />

- Selection of the cryptographic algorithm<br />

- Selection of a means of technical implementation<br />

Before users commit themselves to a particular procedure, they should have a<br />

precise conception of their requirements in terms of the confidentiality and<br />

authenticity of the processed data at every point of the information-processing<br />

system.<br />

Selection of cryptographic algorithms<br />

When selecting cryptographic algorithms it is first necessary to clarify which<br />

type of cryptographic procedures are required, in other words symmetrical,<br />

asymmetrical or hybrid procedures, and then to select suitable algorithms, i.e.<br />

those with the requisite mechanism strength.<br />

Encryption techniques<br />

- Symmetrical encryption: <strong>The</strong> advantages and disadvantages of symmetrical<br />

techniques are described in S 3.23. Suitable algorithms include triple DES,<br />

IDEA and RC 5 for example; in the case of RC 5 the key length should be<br />

at least 80 bits.<br />

- Asymmetrical encryption: <strong>The</strong> advantages and disadvantages of<br />

asymmetrical techniques are described in S 3.23. Suitable algorithms<br />

include RSA, for example, or encryption techniques based on elliptical<br />

curves (see below for key length).<br />

Authentication techniques<br />

- Authentication of messages<br />

Various techniques can be used for the authentication of messages, such as<br />

a message authentication code (MAC) or a digital signature procedure. It is<br />

advantageous to use a MAC if extremely high throughput rates are required<br />

(or if only low computing capacity is available) and the risk of key<br />

disclosure is very low at both ends. It is advantageous to use a digital<br />

signature procedure if the risk of (signature) key disclosure is considerably<br />

higher at one end than it is at the other; generally it is imperative if nonrepudiation<br />

services are required. It should be noted once again that an<br />

infrastructure of trusted third parties must be in place for a non-repudiation<br />

service.<br />

<strong>The</strong> best known MAC algorithm is the encryption of a message with DES<br />

or another block encryption technique in CBC or CFB mode. This involves<br />

appending the last encrypted block to the message as the MAC. Variants<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!