Study on the Use of Cryptographic Techniques in Europe
Total Page:16
File Type:pdf, Size:1020Kb
Study on the use of cryptographic techniques in Europe [Deliverable – 2011-12-19] Updated on 2012-04-20 II Study on the use of cryptographic techniques in Europe Contributors to this report Authors: Edward Hamilton and Mischa Kriens of Analysys Mason Ltd Rodica Tirtea of ENISA Supervisor of the project: Rodica Tirtea of ENISA ENISA staff involved in the project: Demosthenes Ikonomou, Stefan Schiffner Agreements or Acknowledgements ENISA would like to thank the contributors and reviewers of this study. Study on the use of cryptographic techniques in Europe III About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU leg- islation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact details For contacting ENISA or for general enquiries on cryptography, please use the following de- tails: E-mail: [email protected] Internet: http://www.enisa.europa.eu Legal notice Notice must be taken that this publication represents the views and interpretations of the au- thors and editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC) No 460/2004 as lastly amended by Regulation (EU) No 580/2011. This publication does not necessarily represent state-of the-art and ENISA may update it from time to time. Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources including external websites referenced in this publication. This publication is intended for information purposes only. It must be accessible free of charge. Neither ENISA nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication. Reproduction is authorised provided the source is acknowledged. © European Network and Information Security Agency (ENISA), 2011 IV Study on the use of cryptographic techniques in Europe Contents 1 Executive Summary .......................................................................................................... 1 2 Introduction ..................................................................................................................... 3 2.1 Terminology ............................................................................................................... 4 2.2 Scope ......................................................................................................................... 4 2.3 Methodology ............................................................................................................. 4 2.4 Limitations ................................................................................................................. 5 2.5 Target audience ......................................................................................................... 5 2.6 Short overview of findings .......................................................................................... 5 2.7 Structure of the study ................................................................................................ 6 3 Survey results ................................................................................................................... 7 3.1 Availability of cryptographic policies .......................................................................... 8 3.2 Surveyed cryptographic policies (by type of application) ............................................ 9 3.3 Data recommended to be encrypted ........................................................................ 10 3.4 Encryption of data between the citizens and e-government services ....................... 10 3.5 Encryption of data shared between government systems ........................................ 12 3.6 Protection of data at rest ......................................................................................... 12 3.7 Recommended cryptographic techniques ................................................................ 14 3.7.1 Key exchange algorithms ................................................................................... 14 3.7.2 Signature schemes ............................................................................................ 15 3.7.3 Data encryption algorithms ............................................................................... 16 3.7.4 Hash functions .................................................................................................. 17 3.8 Consistency of cryptography specifications .............................................................. 18 3.9 Key management ..................................................................................................... 18 3.10 Auditing ................................................................................................................ 19 3.11 Maintaining policies and guidelines ...................................................................... 19 3.12 Information resources used for defining recommendations and policies .............. 20 3.13 Perceptions of the IT industry ............................................................................... 21 3.13.1 General level of expertise and knowledge of specific standards ........................ 21 3.13.2 How cryptographic parameters are selected ..................................................... 22 Study on the use of cryptographic techniques in Europe V 3.13.3 Common errors in the configuration of cryptography ....................................... 22 3.13.4 What should European governments do to improve the deployment of cryptography? ................................................................................................................ 23 4 Cryptographic specifications beyond MS borders ........................................................... 24 4.1 Cryptographic specifications in USA and Japan......................................................... 24 4.1.1 USA and NIST standards .................................................................................... 24 4.1.2 Japan and CRYPTREC IPA research project ........................................................ 25 4.2 EU-funded initiatives related to the use of cryptographic techniques ...................... 25 4.2.1 ECRYPT ............................................................................................................. 26 4.2.2 NESSIE .............................................................................................................. 26 4.2.3 Action Plan on e-signatures and e-identification and ESI ................................... 27 5 Concluding remarks ........................................................................................................ 29 6 List of recommendations ................................................................................................ 32 7 References ..................................................................................................................... 34 Annex A Cryptographic specifications and recommended standards .................................. 36 Annex B Simplified lists of questions .................................................................................. 41 Annex C Background information ....................................................................................... 43 Annex D Terminology and abbreviations ............................................................................ 46 VI Study on the use of cryptographic techniques in Europe List of Tables Figure 3.1: Map of participation in the study ............................................................................ 8 Figure 3.2: Survey results regarding encryption policies (by covered population of EU) ............ 9 Figure 3.3: Type of application for the cryptographic policy (all that apply) .............................. 9 Figure 3.4: Types of data to be encrypted when transferred using public networks (from the citizen to e-government applications) .................................................................................... 10 Figure 3.5: Use of SSL and TLS encryption ............................................................................... 11 Figure 3.6: System-to-system encryption, recommended encryption solutions ...................... 12 Figure 3.7: Data to be protected while stored in an e-government application....................... 13 Figure 3.8: Solutions used to encrypt data at rest ................................................................... 13 Figure 3.9: Use of protocols to secure key exchange .............................................................. 14 Figure 3.10: Use of signature algorithms ................................................................................ 15 Figure 3.11: Recommended encryption ciphers ...................................................................... 16 Figure 3.12: Hash