22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

encryption is often referred to as bulk encryption, because it is effective on large<br />

data volumes.<br />

Disadvantages of symmetric key algorithms<br />

The key disadvantage of symmetric ciphers are that there is inherent difficulty<br />

with the administration of the symmetric keys used for encryption. More<br />

specifically, how can you safely get them into the hands of your counterparts<br />

without getting them compromised?<br />

In the next section we show how this key management problem is resolved with<br />

the use of asymmetric key algorithms, but there are shortcomings with the use of<br />

asymmetric keys that still require the use of symmetric key algorithms and<br />

symmetric keys.<br />

Commercial and export considerations<br />

Before we go on to the topic of asymmetric keys, let’s complete the review of<br />

important details about symmetric key algorithms.<br />

The algorithms are published openly and there are no commercial licensing<br />

issues to be considered in implementing them.<br />

They all fall under the control of the US National Security Agency export<br />

restrictions. The precise operation of these restrictions is not a simple matter, but<br />

in essence that means that:<br />

► Any software incorporating cryptographic technology that is exported by a US<br />

company has to have a special export license.<br />

► If the product includes symmetric encryption code that can be used for<br />

encrypting an arbitrary data stream, the license will only allow unrestricted<br />

export if the key size is smaller than a given, NSA-specified, value.<br />

What this means is that to export full-strength cryptography, a company has to<br />

have a special license for each customer. Such licenses are only issued for<br />

customers that the US government considers to be friendly, such as major banks<br />

and subsidiaries of US companies.<br />

When the previous redbook was written, the threshold key size for a general<br />

export license was 40 bits. Since then, several challenges have shown that a<br />

brute force attack can be mounted against a 40-bit key with relatively modest<br />

computing power. A government announcement opened the door to the use of<br />

larger keys, initially up to 56 bits, with the promise of unlimited key sizes when the<br />

computer industry develops effective key re<strong>cover</strong>y technology. (Key re<strong>cover</strong>y<br />

means that the key for a session can be dis<strong>cover</strong>ed, given the knowledge of<br />

some other, master, key). 56 bits may not sound a lot better than 40, but in fact it<br />

is 2 to the power 16, or 65,536 times more difficult to crack.<br />

Chapter 1. Fundamentals of IT security 29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!