19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

When A and B want to establish a confidential connection, they proceed as<br />

follows:<br />

1. <strong>The</strong>y agree on an encryption procedure.<br />

2. <strong>The</strong>y agree on a key or a pair of keys.<br />

3. A encrypts a message and sends this to B.<br />

4. B decrypts the ciphertext sent from A.<br />

<strong>The</strong>re are two major classes of encryption procedures:<br />

Symmetrical encryption procedures use the same key both for encryption and<br />

decryption. Symmetrical techniques are therefore also occasionally referred to<br />

as "one-key" techniques, because knowledge of one key is sufficient to be able<br />

to encrypt and decrypt texts.<br />

Well-known symmetrical encryption procedures include DES, Triple-DES,<br />

IDEA and RC5, for example.<br />

Symmetrical procedures are further differentiated, distinguishing between<br />

stream ciphers and block ciphers.<br />

In the case of stream ciphers, a key is used to generate a bit sequence (or bit<br />

stream) with as random an appearance as possible, which is added to the plain<br />

bit sequence (modulo 2). <strong>The</strong> plain bit sequence is therefore encrypted bit by<br />

bit (by the addition of key stream bits). It is essential for the security of stream<br />

ciphers that two (different) messages are never encrypted with the same key<br />

stream – this must be ensured with the aid of special measures<br />

(synchronisation information in the form of a message key). Examples of<br />

stream ciphers are RC4 and SEAL.<br />

Stromchiffre: Blockchiffre:<br />

Bitstromgenerator<br />

0<br />

1<br />

Schlüsselstrombit<br />

Klarbit XOR Geheimbit<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

0<br />

1<br />

1<br />

0<br />

Klartextblock<br />

Schlüssel<br />

Verschlüsselungsfunktion<br />

1<br />

1<br />

1<br />

1<br />

0<br />

0<br />

Geheimtextblock<br />

In the case of block ciphers, on the other hand, an entire block of bits is<br />

encrypted in one encryption cycle; nowadays this typically comprises 64 bits.<br />

Most symmetrical encryption methods are block ciphers; these also include<br />

DES, IDEA and RC5. A range of operating modes have been defined (and<br />

standardised) for block ciphers. <strong>The</strong>se are:<br />

- ECB (Electronic Code Book) mode, where every block is encrypted<br />

separately – independently of the other blocks<br />

- CBC (Cipher Block Chaining) mode and CFB (Cipher Feed Back) mode;<br />

in these modes a dependence is established between the ciphertext blocks

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!