19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

quality, all of the equipment along a transmission path has to be examined<br />

and assessed. Although looking at a single component in isolation should<br />

not be considered justified on account of the coupling of all relevant<br />

individual effects, it is nevertheless important to be aware of the<br />

influencing factors applying to each component (such as the crypto<br />

component). <strong>The</strong> basic conditions for both implementation and selection<br />

can be derived from this knowledge. <strong>The</strong> behaviour of an encryption<br />

component is mainly characterised by the following factors:<br />

- <strong>The</strong> period of time elapsing during encryption of a data block<br />

(generally results in delays)<br />

- <strong>The</strong> control information inserted additionally into the data stream for<br />

synchronisation purposes (may result in fluctuations)<br />

- <strong>The</strong> maximum data throughput to be achieved by the crypto<br />

component (also results in fluctuations if buffer storage is necessary)<br />

- <strong>The</strong> error propagation resulting from encryption (generally results in<br />

an increase in the error rate)<br />

In the case of voice encryption (real-time service), in particular, the above<br />

influencing factors have a negative effect in the form of an increase in endto-end<br />

propagation time, fluctuations in propagation time and a higher<br />

error rate, i.e. in a reduction in quality which can be measured and can be<br />

attributed to the crypto component.<br />

- Other influencing factors<br />

Some cryptographic algorithms (such as IDEA) are patented; licence fees<br />

may have to be paid to enable them to be used in commercial applications<br />

(to which the field of government agencies etc. also belongs). This must be<br />

noted in particular when using methods such as PGP, of which there are<br />

also implementations which can otherwise be used as public domain<br />

software.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!