background image

©2003 IDC 

#3577 

nature of computer operating environments, DES slows down data flow considerably 
when executed in software, and Triple DES slows down the system three times more. 

Thus, in the late 1990s, the National Institute of Standards Technology (NIST), 
formerly the National Bureau of Standards, put out a call for new algorithms, and a 
competition ensued. The specification for the new standard, called Advanced 
Encryption Standard (AES), required that it be easily implemented in software, that 
the key length be bumped up from 56 to 128 or 256 bits, and that the block size be 
increased to 128 bits. With these specifications, AES would be far too large for 
anyone using any method to search the key space. After several years, the 
competition was narrowed to a few finalists. IBM championed an algorithm called 
MARS; cryptographers in Cambridge, England, put forth Serpent; and Schneier 
produced a viable competitor, as did RSA Labs. All the finalists' algorithms were 
considered more than secure enough, but one written by a couple of cryptographers 
in Belgium, Joan Daemen and Vincent Rijmen, called Rijndael (a euphonious, if not 
cryptographic, mixing of their names) was chosen partly because it was both fast, 
even in software environments, and small. 

 

P U B L I C   K E Y   —   S T I L L   B E T T E R

 

Despite the speed issue, symmetric key methods are relatively fast because they are 
computationally less intensive than other more secure methods. Because they have 
relatively less impact on the data rate, they are desirable for encrypting bulk data for 
storage and transmission. However, the problem of the shared secret is left unsolved, 
even with AES. And so, the best encryption techniques involve doing three things, 
which are a combination of technology and procedures: wrapping the shared AES 
secret in a much more robustly encrypted envelope, encoding the main message with 
AES, and throwing the whole thing away after a single use. One-time usage makes 
the value of decryption low to an interceptor, even as the cost is high. As a matter of 
jargon, a one-time key is called "ephemeral." 

The more robust method used to encode the AES keys is called asymmetric or public 
key cryptography. The asymmetry refers to the fact that mathematically related but 
different keys are used for encoding and decoding. When the private key is used to 
encrypt a message, only the associated public key can be used to decrypt it. When 
the public key is used to encrypt a message, only the associated private key can be 
used to decrypt it.

 

The public key can be shared with anyone, but the private key 

must be kept secret and should only be available to the owner of the key. Knowledge 
of the public key does not disclose any information about the private key. The first 
asymmetric encryption method to reach commercial usage was brought to market in 
the late 1970s by three MIT professors, Ron Rivest, Adi Shamir, and Leonard 
Adleman, whose initials just happened to combine to make the name RSA, which is 
now the moniker for the de facto standard in public key encryption. 

Here are two illustrations of how this type of encryption can be useful. Let's say that 
sometime in the near future, you'll be able to vote over the Internet. If every voter has 
a pair of private keys safely tucked away in his or her computer, and for every voter a 
pair of public keys resides at the statehouse, the courthouse, and the White House, 
then when an encrypted vote from you comes in, only the public key associated with 
you and only you will be able to decrypt it. Thus, if a vote purports to come from you, 
and the vote counter pops it open with your key, then that vote can be guaranteed to 
have come from you — assuming your client node is inviolate, which underscores the 
need to secure the network at the client end. Going the other way, if I want to send 
you a secret note that only you can open, I can encrypt it with your public key, which I 
can get because it is public, and only you can open the message. These examples 
illustrate two important aspects of security: authentication and privacy. 

Rijndael was  
chosen partly 
because it was both 
fast, even in software 
environments,  
and small. 

When the private key 
is used to encrypt a 
message, only the 
associated public key 
can be used to 
decrypt it. 

Summary of Contents for Desktop

Page 1: ... sophisticated organizations are vulnerable In one incident widely reported in the press that had an impact of major but unknown proportions the degree of penetration was difficult to assess a hacker from St Petersburg the intellectual seat of the old Soviet Union broke into Microsoft s network and absconded with a large number of important files including purportedly an unknown quantity of Window...

Page 2: ...ugh IBM acted unilaterally to design and implement its hardware solution key players in the industry have acknowledged the design point The TCPA was inaugurated with IBM Hewlett Packard Compaq Intel and Microsoft as founding members Since its inception in October 1999 more than 190 firms have signed up including Dell TCPA wants its security technology to be universal in the computing industry and ...

Page 3: ...issues How the PC client can be the weak point in the security perimeter The rise in the value of data stored in insecure computing systems The scope of security measures Security history and current technology Client security implementations The advantages of IBM s hardware security implementation The evolution of industry standards for client security U S A G E L A G S B E H I N D T E C H N O L ...

Page 4: ... to the corporation financial personnel and proprietary technical data whether it lies in the mainframe on the network or in clients at the low level of client protection most of the focus has shifted to ensuring that the cordon sanitaire is unbroken at the access point and that user files are secured Good mainframe security implementations particularly at the procedural level have been in place f...

Page 5: ...ter more now than it has in the past Until recently few organizations had a need for systematic data security Banks and other financial institutions had to ensure end to end security for storing and moving money around over wires Certain government agencies could only operate in an impregnable data fortress But the volume of valuable data being stored and transmitted by most firms was relatively l...

Page 6: ...ted But until that moment they had been engaged in an operation that had hacked into banks and ecommerce sites and extorted the operators for money with the promise of not revealing the hacks to the public Sometimes the value of reputation damage is difficult to assess but it may represent the entire value of the business Another Russian hacker was monitored for years as he downloaded millions of ...

Page 7: ...ublic key encryption and its associated infrastructure address the issue of trust at the global level Of the many elements that make up a total security solution however PKI is the most dependent on completeness that is any two parties participating in secure transactions must both agree to rely on a third party a trusted authority sometimes called a certificate authority It is because of the comp...

Page 8: ... break this code without the key a decipherer has to try 2 56 or 72 057 594 037 927 936 combinations 72 quadrillion for those intimidated by the sight of large numerals and because of the dynamism of the DES algorithm it is extremely difficult to reduce the size of the search space search space reduction being one of the more important techniques at the disposal of decipherers other than by luck U...

Page 9: ...atter of jargon a one time key is called ephemeral The more robust method used to encode the AES keys is called asymmetric or public key cryptography The asymmetry refers to the fact that mathematically related but different keys are used for encoding and decoding When the private key is used to encrypt a message only the associated public key can be used to decrypt it When the public key is used ...

Page 10: ... encode the symmetric key i e the AES key used for bulk data encryption The result of encoding the symmetric key with an asymmetric public key is called a digital envelope and the process is referred to as PKI key exchange IDENTIFYING THE SENDER AND GUARANTEEING DATA INTEGRITY We now have an infrastructure robust enough to guarantee the identity of the sender The sender is fairly confident of the ...

Page 11: ...we utilize this powerful math C L I E N T S E C U R I T Y I M P L E M E N T A T I O N S Because of the unresolved procedural issues involved with implementing a fully secure infrastructure some of the grander visions of secure computing have been scaled back at least in the short term Companies need not wait until all parties agree on all aspects in order to shore up their security perimeters Even...

Page 12: ...o commandeer a PC will let the intruder scan the contents of main memory and find the user s private key Back Orifice is good at masking itself encrypts its own outgoing traffic and was released in source code about two years ago at a hackers conference The nCipher program can find a 1 024 bit private key the best in commercial use And if a malicious hacker can get your private key he can get your...

Page 13: ...he authorized user and that his or her local data is protected from intruders A HIERARCHY OF KEYS One of the greatest strengths of hardware security architecture is the hierarchical nature of its key management system The first key pair generated is used to protect another key pair called the platform identity key pair This key pair is created under the system owner s control and can be used by th...

Page 14: ...st a virus that can wipe the hard disk clean Firewalls and antivirus software are required for that type of defense The chip just keeps data private and confidential and provides for PKI operations IBM and other vendors offer suites of interrelated security products to create a fully secure environment For example IPSec protects communications links by securing the Ethernet controller Another key ...

Page 15: ...code named Palladium now being created by Microsoft Palladium which will incorporate TCPA s work will handle a wide variety of content and client security functions including many such as digital rights management for copyrighted material outside the scope of the TCPA specification Version 1 2 will be implemented in conjunction with future processor and chipset families from Intel and others and w...

Page 16: ... user chooses Wireless Application Protocol WAP encryption the Wireless Transport Layer Security WTLS protocol which is a derivative of Secure Sockets Layer SSL is invoked This protocol begins with a secure certificate exchange between wireless nodes Within a single node the chip can be used at will for individual local file and folder encryption Files and folders can also be encrypted or decrypte...

Reviews: