Infosecurity News Reel

Loading...

Help Net Security - News

IEEE Spectrum Computing Channel

Nov 24, 2014

Algorithms, key size and parameters report 2014 — ENISA

The “Algorithms, key size and parameters” report of 2014 is a reference document providing a set of guidelines to decision makers, in particular specialists designing and implementing cryptographic solutions for personal data protection within commercial organisations or governmental services for citizens. This report provides an update of the 2013 cryptographic guidelines report (link below) on security measures required to protect personal data in online systems. Compared with the 2013 edition, the report has been extended to include a section on hardware and software side-channels, random number generation, and key life cycle management, while the part on protocols, for 2014 is extended and is a stand-alone study on cryptographic protocols (link included below). The EC Regulation 611/2013 (link below) references ENISA as a consultative body, in the process of establishing a list of appropriate cryptographic protective measures for personal data protection
 Nov 21, 2014
Read more . .
Algorithms, key size and parameters report 2014 — ENISA: Algorithms, key size and parameters report 2014 — ENISA

Study on cryptographic protocols — ENISA

Cryptographic algorithms, when used in networks, are used within a cryptographic protocol. Even if the cryptographic primitives and schemes (discussed in the “Algorithms, key size and parameters” report of 2014, see link below) are deemed secure, their use within a protocol can result in a vulnerability which exposes the supposedly secured data. The report focuses on the current status in cryptographic protocols and encourages further research. A quick overview is presented on protocols which are used in relatively restricted application areas such as wireless, mobile communications or banking (Bluetooth, WPA/WEP, UMTS/LTE, ZigBee, EMV) and specific environments focusing on Cloud computing. The main emphasis of the report is on guidelines to researchers and organisations in the field. The key problem with protocols today is that many result from cryptographic design many years (even decades) ago. Thus cryptographic protocols suffer more from legacy issues than the underlying cryptographiccomponents. The goal should be to work towards a better cryptographic protocol infrastructure which does not exhibit such problems. Thus we provide in this report guidelines to organisations which are developing new protocols.
 Nov 21, 2014
Read more . .
Study on cryptographic protocols — ENISA: Study on cryptographic protocols — ENISA

intelNews.org Latest News

The Register - Security

Slashdot: Your Rights Online

HISTORY OF COMPUTING VIDEOS

Loading...

WIRED - Threat Level

European Public Policy Blog