background image

8 #3577 ©2003 

IDC 

For many years, encryption algorithms were quite simple. The offsets used by Mary 
Queen of Scots relied on the slowness of human decipherers, who were often as 
much psychologists as mathematicians. If every letter in the encrypted message was, 
say, five letters up the alphabet from the original (wrapping around again at Z), then 
decoding one word was enough to break the whole text. A bit more complicated 
would be incrementing the offset by a fixed amount, which would take a little more 
doing on the part of the decipherer but would still yield to trial and error.  

These types of techniques were supplanted by the use of "key texts," a method a notch 
further up the complexity chain. The offsets to the clear text were determined by the 
value of the letters of another text, which could be any written document agreed upon 
by both sender and receiver. The document was usually a book, and the key could start 
anywhere in the text (say, on the 23rd letter of page 23). This method worked pretty 
well, except when the encrypted message was intercepted along with one or the other 
of the concealing parties, at which point the shared secret could be "coaxed" out of the 
unfortunate soul. These algorithms all depended on the absence of computing power, 
which in today's world can perform, in a relatively short period, "brute force" trial-and-
error sequences that a human could never hope to produce in a lifetime.  

F R O M  D E S   T O   A E S  

One of the first big improvements in security came in 1970, when IBM scientists 
developed the Data Encryption Standard (DES). DES starts with something like 
offsets but uses complex permutations. The algorithm itself is in the public domain, 
but, without the key, the result of any particular instance of usage is nearly opaque. 
Essentially, the clear text is broken into groups or blocks of 64 bits and then 
transformed using an algorithm dependent on both the message bits and a key, which 
is 56 bits long (8 bits being reserved for parity check). This stuff is pretty thorough. As 
a rule of thumb, changing one bit of input in the clear text changes the values of half 
the output bits in the encoded text. To break this code without the key, a decipherer 
has to try 2

56

 or 72,057,594,037,927,936 combinations (72 quadrillion, for those 

intimidated by the sight of large numerals), and because of the dynamism of the DES 
algorithm, it is extremely difficult to reduce the size of the search space (search-space 
reduction being one of the more important techniques at the disposal of decipherers) 
other than by luck. Until the mid-1990s, only the National Security Agency had the 
computational power to crack a 56-bit DES-encoded message with brute force.  

In the mid-1990s, commercially available computing reached a level of performance 
sufficient to break DES in a matter of hours, and privacy seekers started using Triple 
DES, which essentially runs clear text through the DES washing machine three times, 
using a different key on each pass. Triple DES was considered quite secure, requiring 
a code breaker to cover a search space of 2

112

 combinations. The only reason the 

search space is not 2

168

 is that by that time complex cryptoanalytic techniques had 

been discovered that reduced the maximum search space. Nonetheless, Triple DES 
represented a reprieve for the existing standard. It would still take all the computers 
on the Internet more time to crack than the earth is likely to last, not to mention the 
human race or something as geologically transient as electricity. 

However, even Triple DES had a couple of major weaknesses. It was a symmetric 
key encryption method, an Achilles' heel that in some ways makes it no stronger than 
the old key-text method. The algorithm is called symmetric because the math to 
encrypt a message is simply run backward to decrypt it. This scheme requires both 
the sender and recipient to have the same key

Both parties have to share a secret, 

and they must be able to exchange that secret secretly. And so the possibility exists 
that clever Internet sniffers or bad men with pointy sticks can extract the secret at 
either end of the transmission or even in the middle and pop open the message. After 
all, the key is just a series of numbers, albeit long ones. In addition, because of the 

These algorithms  
all depended on the 
absence of computing 
power, which in 
today's world can 
perform, in a relatively 
short period, "brute 
force" trial-and-error 
sequences that a 
human could never 
hope to produce in  
a lifetime. 

Содержание Desktop

Страница 1: ... sophisticated organizations are vulnerable In one incident widely reported in the press that had an impact of major but unknown proportions the degree of penetration was difficult to assess a hacker from St Petersburg the intellectual seat of the old Soviet Union broke into Microsoft s network and absconded with a large number of important files including purportedly an unknown quantity of Window...

Страница 2: ...ugh IBM acted unilaterally to design and implement its hardware solution key players in the industry have acknowledged the design point The TCPA was inaugurated with IBM Hewlett Packard Compaq Intel and Microsoft as founding members Since its inception in October 1999 more than 190 firms have signed up including Dell TCPA wants its security technology to be universal in the computing industry and ...

Страница 3: ...issues How the PC client can be the weak point in the security perimeter The rise in the value of data stored in insecure computing systems The scope of security measures Security history and current technology Client security implementations The advantages of IBM s hardware security implementation The evolution of industry standards for client security U S A G E L A G S B E H I N D T E C H N O L ...

Страница 4: ... to the corporation financial personnel and proprietary technical data whether it lies in the mainframe on the network or in clients at the low level of client protection most of the focus has shifted to ensuring that the cordon sanitaire is unbroken at the access point and that user files are secured Good mainframe security implementations particularly at the procedural level have been in place f...

Страница 5: ...ter more now than it has in the past Until recently few organizations had a need for systematic data security Banks and other financial institutions had to ensure end to end security for storing and moving money around over wires Certain government agencies could only operate in an impregnable data fortress But the volume of valuable data being stored and transmitted by most firms was relatively l...

Страница 6: ...ted But until that moment they had been engaged in an operation that had hacked into banks and ecommerce sites and extorted the operators for money with the promise of not revealing the hacks to the public Sometimes the value of reputation damage is difficult to assess but it may represent the entire value of the business Another Russian hacker was monitored for years as he downloaded millions of ...

Страница 7: ...ublic key encryption and its associated infrastructure address the issue of trust at the global level Of the many elements that make up a total security solution however PKI is the most dependent on completeness that is any two parties participating in secure transactions must both agree to rely on a third party a trusted authority sometimes called a certificate authority It is because of the comp...

Страница 8: ... break this code without the key a decipherer has to try 2 56 or 72 057 594 037 927 936 combinations 72 quadrillion for those intimidated by the sight of large numerals and because of the dynamism of the DES algorithm it is extremely difficult to reduce the size of the search space search space reduction being one of the more important techniques at the disposal of decipherers other than by luck U...

Страница 9: ...atter of jargon a one time key is called ephemeral The more robust method used to encode the AES keys is called asymmetric or public key cryptography The asymmetry refers to the fact that mathematically related but different keys are used for encoding and decoding When the private key is used to encrypt a message only the associated public key can be used to decrypt it When the public key is used ...

Страница 10: ... encode the symmetric key i e the AES key used for bulk data encryption The result of encoding the symmetric key with an asymmetric public key is called a digital envelope and the process is referred to as PKI key exchange IDENTIFYING THE SENDER AND GUARANTEEING DATA INTEGRITY We now have an infrastructure robust enough to guarantee the identity of the sender The sender is fairly confident of the ...

Страница 11: ...we utilize this powerful math C L I E N T S E C U R I T Y I M P L E M E N T A T I O N S Because of the unresolved procedural issues involved with implementing a fully secure infrastructure some of the grander visions of secure computing have been scaled back at least in the short term Companies need not wait until all parties agree on all aspects in order to shore up their security perimeters Even...

Страница 12: ...o commandeer a PC will let the intruder scan the contents of main memory and find the user s private key Back Orifice is good at masking itself encrypts its own outgoing traffic and was released in source code about two years ago at a hackers conference The nCipher program can find a 1 024 bit private key the best in commercial use And if a malicious hacker can get your private key he can get your...

Страница 13: ...he authorized user and that his or her local data is protected from intruders A HIERARCHY OF KEYS One of the greatest strengths of hardware security architecture is the hierarchical nature of its key management system The first key pair generated is used to protect another key pair called the platform identity key pair This key pair is created under the system owner s control and can be used by th...

Страница 14: ...st a virus that can wipe the hard disk clean Firewalls and antivirus software are required for that type of defense The chip just keeps data private and confidential and provides for PKI operations IBM and other vendors offer suites of interrelated security products to create a fully secure environment For example IPSec protects communications links by securing the Ethernet controller Another key ...

Страница 15: ...code named Palladium now being created by Microsoft Palladium which will incorporate TCPA s work will handle a wide variety of content and client security functions including many such as digital rights management for copyrighted material outside the scope of the TCPA specification Version 1 2 will be implemented in conjunction with future processor and chipset families from Intel and others and w...

Страница 16: ... user chooses Wireless Application Protocol WAP encryption the Wireless Transport Layer Security WTLS protocol which is a derivative of Secure Sockets Layer SSL is invoked This protocol begins with a secure certificate exchange between wireless nodes Within a single node the chip can be used at will for individual local file and folder encryption Files and folders can also be encrypted or decrypte...

Отзывы: