- •Classification of threats
- •Types and classification of ciphers
- •4 Distributing of the keys
- •2 Generation of the keys
- •2 Digital signature on the basis of El-Gamal cipher
- •Approaches to systems creation of information protection
- •1 Determination
- •7 Realization of control of integrity and management of protection system
- •3 Secret communication systems
- •1 Feistel Network and spn networks
- •3 General characteristic of des
- •4 Requirements to cryptosystems
- •Diffi-Hellman algorithm
- •2 General description of гост 28147-89 algorithm
- •1 Management a key sequence
- •1 Passing of secret messages by asymmetric cryptosystems
- •3 Storage of the keys
- •4 Electronic-digital signature
- •3 Encipherement in the mode of simple replacements
3 Storage of the keys
Under the function of storage of the keys understand organization of their safe storage, account and delete.
The key is the most attractive object for a user violator, opening to him a way to confidential information. Therefore it follows to spare the special attention for the questions of safe storage of the keys.
The secret keys never must be written down in an obvious kind on a medium which can be counted or copied. Any information about the in-use keys must be protected, in particular kept, in an in cipher kind.
A necessity for storage and transmission of the keys, ciphered by other keys, results in conception of hierarchy of the keys. In the standard of ISO 8532 (Banking-key Management) the method of master/session keys is expounded in detail. Essence of method consists of that is entered hierarchy of the keys: master key (MK), key of cipherement of the keys (KK), key of cipherement of data (KD).
A hierarchy of the keys can be:
- two-level (KK / KD);
- three-level (MK / KK / KD).
A lowermost level are work or session KD, which are utillized for the cipherement of information, personal identification numbers (PIN) and authentification of message. When these keys are necessary to be ciphered for purpose of protection at a transmission or storage, utillize the keys of next level - keys of cipherement of the keys. The keys of cipherement of the keys never must be utillized as session (work) KD, and vice versa.
Such division of functions is needed for providing of maximal protection. A standard sets actually, that the different types of the work keys (for example, for the cipherement of information, for authentification et cetera) must be always ciphered by the different versions of the keys of cipherement of the keys.
In particular, keys the cipherements of the keys, in-use for sending of the keys between two nodes of network, are known also as keys of exchange between the nodes of network (cross domain keys). Usually in a channel two keys are utillized for an exchange between the nodes of network, one by one in every direction. Therefore every node of network will have the key of sending, for an exchange with the nodes of network and key of receipt for every channel, supported other node of network.
At top level of hierarchy of the keys a major key - master-key is disposed. This key is used for the cipherement of KK, when it is required to save them on a disk. Usually only one master-key is utillized in every computer.
Master-key spreads between the participants of exchange by an unelectronic method - at the personal contact, to eliminate his intercept and/or compromising. Opening of value of master - key by an opponent is fully destroys protection of computer.
A value is master-key fixed on great time (to a few weeks or months). Therefore generation and storage master-keys are the critical questions of cryptographic protection. In practice master- key of the computer is created by a random selection from all of possible values of the keys. Master-key is placed in a block which protects it from a read-out and record, and also from mechanical influences. However there must be a method of verification, whether a value of the key is correct.
A problem of authentification of master-key can be decided in various ways. One of methods of authentification is shoed on a figure 2.
Ekn
(M)
Result
Figure
2 -
Chart of authentification of master-key of khost-computer
An administrator, getting a new value of master-key Kn of khost-computer, ciphers some message M with the key Kn. A pair (a cryptogram and a message M) is placed in memory of computer. Every time, when authentification is required of master-key of khost-computer, message M undertakes from memory and given in the cryptographic system. The got cryptogram is compared to the cryptogram, kept in memory. If they coincide, it is considered that this key is correct.
The work keys (for example, session) are usually created by a pseudo-random generator, and can be kept in an unprotected place. It is possible, as such keys are generated in form the proper cryptograms, i.e. the generator of PRN gives out in place of the key Ks its cryptogram, got with a help master-key of computer. Decryption of such cryptogram is executed only before the use of the key Ks.
Thus, safety of the session keys depends on safety of the cryptographic system. A cryptographic block can be projected as a single system and placed in the physically protected place.
If on some reasons the key is lost, for example, a key carrier is physically destroyed, for renewal of capacity of cryptosystem it is necessary to foresee the mechanism of renewal of the lost key. For this purpose it is possible to take advantage of depositing of the key - storage of key copy (better in an in cipher kind) at the trusted person. Reliability of this method rises, if a few trusted persons and chart of division of secret are used. In this case for depositing of the keys it is possible to use smart cards, kept at the trusted person.
Time of «life» of the key must be limited. What the more durational use of the key, then the higher probability of his compromising and anymore temptation for a cryptanalysist to engage in its opening, because opening of the key will allow to expose all of messages, ciphered this key. Especially as the presence of large number of messages, ciphered one key, gives for cryptanalysist an additional chance.
Elimination of the keys must carry irreversible character, to eliminate possibility of renewal of the keys fully.
Archiving of the keys - conservation of copies of the keys which during some temporal period can be claimed is used.
