Skip to main content

2014 | OriginalPaper | Buchkapitel

6. Information Security Best Practices

verfasst von : Keith Mayes, Konstantinos Markantonakis

Erschienen in: Secure Smart Embedded Devices, Platforms and Applications

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We are increasingly reliant on the use of IT systems in our normal day- to-day business and personal activities. It is of paramount importance that these systems are sufficiently secure to protect sensitive, valuable and private data, and associated storage, communications and transactions. Therefore, the design and use of such systems should be in accordance with best practices for information security that have been developed by industry, government and the worldwide expert community. This chapter emphasises the need for system security and goes on to explain technical choices such as algorithms, key size and trust management, and concludes with a real-world case study.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Side-channel security is the ability for an implementation to prevent information leakage (e.g. from timing and power consumption variations and radio emissions) when running critical functions. Attackers may analyse leakage to recover sensitive information and cryptographic keys [15].
 
2
In this case, the example calculation results in the same effective keysize as appears in the recommendations. However, in the more general case, other considerations of positive or negative impact may be taken into account when defining effective keysizes.
 
3
In modular division the result of a mod (b) would be the remainder after dividing the integer a by integer b, so for example \(1 = 13\) mod 6.
 
4
gcd means greatest common divisor.
 
5
Note that the ’+’ such as in EAL4+ means that EAL4 is satisfied, plus some extra requirements from higher levels.
 
Literatur
3.
Zurück zum Zitat K. Mayes, K. Markantonakis, “Smart Cards, Tokens, Security and Applications”, Springer Verlag, 2007 K. Mayes, K. Markantonakis, “Smart Cards, Tokens, Security and Applications”, Springer Verlag, 2007
6.
Zurück zum Zitat Rivest, R.; A. Shamir; L. Adleman (1978). “Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM 21 (2): 120–126. Rivest, R.; A. Shamir; L. Adleman (1978). “Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM 21 (2): 120–126.
8.
Zurück zum Zitat SP 800-57 Recommendation for Key Management - Part 1: General, and Part 2: Best Practices for Key Management Organizations, NIST, March 2007 SP 800-57 Recommendation for Key Management - Part 1: General, and Part 2: Best Practices for Key Management Organizations, NIST, March 2007
9.
Zurück zum Zitat SP 800-131, Recommendations for the Transitioning of Cryptographic Algorithms and Key Lengths. NIST, drafted June 2010 SP 800-131, Recommendations for the Transitioning of Cryptographic Algorithms and Key Lengths. NIST, drafted June 2010
10.
Zurück zum Zitat ECRYPT II Yearly Report on Algorithms and key-sizes (2009–2010), Revision 1.0, ECRYPT II, 30th March 2010 ECRYPT II Yearly Report on Algorithms and key-sizes (2009–2010), Revision 1.0, ECRYPT II, 30th March 2010
11.
Zurück zum Zitat Diffie, Whitfield; Hellman, Martin E. (June 1977). “Exhaustive Cryptanalysis of the NBS Data Encryption Standard”. Computer 10 (6): 74–84 Diffie, Whitfield; Hellman, Martin E. (June 1977). “Exhaustive Cryptanalysis of the NBS Data Encryption Standard”. Computer 10 (6): 74–84
12.
Zurück zum Zitat Ralph Merkle, Martin Hellman: On the Security of Multiple Encryption (PDF), Communications of the ACM, Vol 24, No 7, pp 465–467, July 1981 Ralph Merkle, Martin Hellman: On the Security of Multiple Encryption (PDF), Communications of the ACM, Vol 24, No 7, pp 465–467, July 1981
13.
Zurück zum Zitat Paul van Oorschot, Michael J. Wiener, A known-plaintext attack on two-key triple encryption (PDF), EUROCRYPT’90, LNCS 473, 1990, pp 318–325 Paul van Oorschot, Michael J. Wiener, A known-plaintext attack on two-key triple encryption (PDF), EUROCRYPT’90, LNCS 473, 1990, pp 318–325
14.
Zurück zum Zitat Auguste Kerckhoffs, “La cryptographie militaire”, Journal des sciences militaires, vol. IX, pp. 5–83, Jan. 1883, pp. 161–191, Feb. 1883 Auguste Kerckhoffs, “La cryptographie militaire”, Journal des sciences militaires, vol. IX, pp. 5–83, Jan. 1883, pp. 161–191, Feb. 1883
15.
Zurück zum Zitat P. Kocher, J. Jaffe, B. Jun, “Differential Power Analysis”, technical report, 1998; later published in Advances in Cryptology - Crypto 99 Proceedings, Lecture Notes In Computer Science Vol. 1666, M. Wiener, ed., Springer-Verlag, 1999 P. Kocher, J. Jaffe, B. Jun, “Differential Power Analysis”, technical report, 1998; later published in Advances in Cryptology - Crypto 99 Proceedings, Lecture Notes In Computer Science Vol. 1666, M. Wiener, ed., Springer-Verlag, 1999
17.
Zurück zum Zitat M. Bellare, P. Rogaway. Optimal Asymmetric Encryption - How to encrypt with RSA. Extended abstract in Advances in Cryptology - Eurocrypt’94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed, Springer-Verlag, 1995 M. Bellare, P. Rogaway. Optimal Asymmetric Encryption - How to encrypt with RSA. Extended abstract in Advances in Cryptology - Eurocrypt’94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed, Springer-Verlag, 1995
19.
Zurück zum Zitat FIPS 180–2: Secure Hash Standard (SHS) (PDF,) - Current version of the Secure Hash Standard (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512), 1 August 2002, amended 25 February 2004. FIPS 180–2: Secure Hash Standard (SHS) (PDF,) - Current version of the Secure Hash Standard (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512), 1 August 2002, amended 25 February 2004.
21.
Zurück zum Zitat NIST SP 800–90. Recommendation for Random Number Generation, March 2007. NIST SP 800–90. Recommendation for Random Number Generation, March 2007.
26.
Zurück zum Zitat Nohl K, Starbug, Plotz H. MIFARE, little security, despite obscurity. Presentation on the 24th Congress of the Chaos Computer Club (CCC); December 2007 Nohl K, Starbug, Plotz H. MIFARE, little security, despite obscurity. Presentation on the 24th Congress of the Chaos Computer Club (CCC); December 2007
27.
28.
Zurück zum Zitat Gans GK, Hoepman JH, Garcia FD. A practical attack on the MIFARE Classic. Proceedings of the 8th Smart Card Research and Advanced Application Workshop (CARDIS 2008). LNCS 5189, pp. 267–282. Heidelberg: Springer; 2008. Gans GK, Hoepman JH, Garcia FD. A practical attack on the MIFARE Classic. Proceedings of the 8th Smart Card Research and Advanced Application Workshop (CARDIS 2008). LNCS 5189, pp. 267–282. Heidelberg: Springer; 2008.
29.
Zurück zum Zitat Garcia FD, Gans GK, Muijrers R, Rossum P, Verdult R, Schreur RW, et al. Dismantling MIFARE Classic. Proceedings of ESORICS 2008, LNCS 5283. Springer; 2008. pp. 97–114. Garcia FD, Gans GK, Muijrers R, Rossum P, Verdult R, Schreur RW, et al. Dismantling MIFARE Classic. Proceedings of ESORICS 2008, LNCS 5283. Springer; 2008. pp. 97–114.
Metadaten
Titel
Information Security Best Practices
verfasst von
Keith Mayes
Konstantinos Markantonakis
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-7915-4_6