22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

28 Lotus Security Handbook<br />

cipher that does not require much memory. Yet, the structure of the cipher is<br />

very complex and hence difficult to analyze.<br />

► IDEA (International Data Encryption Algorithm, by Xuejia Lai and James<br />

Massey) - Originally this was called PES - Proposed Encryption Standard. It<br />

was later improved and named IPES and then named IDEA, or International<br />

Data Encryption Algorithm; its claim to fame is that it is part of PGP. It is a<br />

64-bit iterative block cipher with a 128-bit key. The encryption process<br />

requires eight complex rounds, but the speed of IDEA in software is similar to<br />

that of DES.<br />

► CAST (Canadian Algorithm by Carlisle Adams and Stafford Tavares) - This is<br />

a popular 64-bit cipher that allows key sizes up to 128 bits. The name CAST<br />

stands for Carlisle Adams and Stafford Tavares, the original inventors of<br />

CAST. CAST-128 is owned by Entrust Technologies but is free for<br />

commercial as well as non-commercial use. CAST-256 is a freely available<br />

extension of CAST-128 that accepts up to 256 bits of key size and that has a<br />

128-bit block size. CAST-256 was one of the original candidates for the AES.<br />

Common stream ciphers<br />

► RC4 (variable-key-size encryption algorithm created by Ron Rivest of RSA<br />

Security) - RC4 is used for secure communications, as in the encryption of<br />

traffic to and from secure web sites using the SSL protocol. RC4 is a cipher<br />

with a key size of up to 2048 bits (256 bytes).<br />

► SEAL (Software Efficient ALgorithm, by Phil Rogaway and Don Coppersmith<br />

of <strong>IBM</strong> in 1993) - This algorithm is <strong>cover</strong>ed by US Patent 5,454,039. The<br />

cipher is based on 32-bit words, encrypts at about 4 cycles per byte, and uses<br />

a 160 bit key for encryption. It is considered very safe.<br />

► WAKE (World Auto Key Encryption algorithm by David J Wheeler). This is an<br />

encryption system for medium speed encryption of blocks and it offers high<br />

security. It is intended to be fast on most computers and relies on repeated<br />

table use and having a large state space.<br />

Note: An interesting bit of trivia is that RC1 never went further than Rivest's<br />

notebook and RC3 was broken at RSADSI during development.<br />

Advantages of symmetric key algorithms<br />

As we have shown, there are a number of symmetric key ciphers in use. In<br />

addition to those already mentioned, we describe those used in Notes, Domino<br />

and other Lotus collaboration products later in this document. For now, let’s talk<br />

about the advantages that all these Symmetric Key Algorithms share in common.<br />

They are fast and need relatively little system overhead because of the short<br />

keys which provide relatively high security. For this reason, symmetric key

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!