Code breaking new ground

Connect with state & local government leaders
 

Connecting state and local government leaders

Today, the need to protect data'and the existence of forces trying to steal it'is perhaps greater than ever before. To keep pace with those who would try and break modern codes, the Defense Department and the National Security Agency's Information Assurance Directorate have an ongoing effort called the Cryptographic Modernization Initiative, an effort is to transform and modernize information assurance capabilities.

Tens of thousands of Nazi tactical messages were encrypted during World War II using the Enigma machine. It came to light years later that most of those messages were read by the allied forces after cryptologists 'broke' the cipher machine.

Today, the need to protect data'and the existence of forces trying to steal it'is perhaps greater than ever before.

To keep pace with those who would try and break modern codes, the Defense Department and the National Security Agency's Information Assurance Directorate have an ongoing effort called the Cryptographic Modernization Initiative. The initiative's goal is to transform and modernize information assurance capabilities for the 21st century.

'In the encryption world'probably on a time frame of every seven to 10 years'there's a need for new encryption algorithms,' Anthony Caputo, chairman and CEO of SafeNet Inc. of Belcamp, Md. 'Because every year the enemy or hackers' tools are getting better, so periodically you have to increase the strength of the encryption algorithms. That's what the Cryptographic Modernization does.'

Encryption focuses on three areas: Keeping data confidential, authenticating who sends data and ensuring data hasn't been tampered with, said Dr. Alan Sherman, associate professor of computer science at the University of Maryland, Baltimore County.

'For encryption, one of the major changes was the adoption of the advanced encryption standard [in 2001] by the National Institute of Standards and Technology,' Sherman said. 'The old system [the Dataq Encryption Standard] was based on 56-bit technology, which had become insecure. I think improving encryption is a continuing process.'

The Advanced Encryption Standard has a fixed block size of 128 bits and a key size of 128, 192 or 256 bits.

In DOD and intelligence agencies' world, encryption often is focused on standalone hardware units that encrypt data from a sender, and translates data for the recipient.

SafeNet, for example, has the SafeEnterprise Synchronous Optical Networking Type 1 Encryptor, an encryption appliance designed to secure Synchronous Optical Networking, and Synchronous Digital Hierarchy networks at speeds up to 10 Gbps. Speed is important because stronger encryption requires a computer to make more computations.

The National Security Agency gave approval for SafeNet's development of the classified version of the 10-Gigabit SafeEnterprise Sonet Encryptor. Under NSA's Commercial COMSEC Evaluation Program, SafeNet has been approved to develop the encryptor for deployment within the federal intelligence communities, DOD and civilian agencies.

The special-purpose computers sit at the end points of a communications link. The primary difference is the new devices have stronger encryption algorithms than the devices in the field now.

While software-based encryption is common in the IP world, it's an accepted fact in the crypto community that hardware encryption is much stronger. With hardware, you can protect both the algorithm and the encryption key. It's much more difficult to do that in software.

Besides top-secret data, other areas in government require encryption, such as health information and tax records.

An emerging area is encryption used in electronic voting, UMBC's Sherman said.

Get out the vote

'Electronic voting systems are a very interesting application of cryptology, one that affects the critical national infrastructure of voting,' he said. 'There are emerging technologies called cryptographic receipt-based voting systems that offer tremendous potential for significantly enhanced security over other systems that are in use today.'

Part of the NSA's modernization initiative was to encourage companies to offer commercial software that incorporates a form of cryptography called elliptical curve, based on the algebra structure of elliptic curves, said Kathy Kriese, senior product manager for RSA Security.

The company's BSAFE Encryption, Signature and Privacy solutions incorporates the specifications put forth by NSA.

'We don't develop hardware; we are strictly focused on software,' Kriese said. 'So our software can be used by a developer as the software incorporated in special-purpose hardware device.'

RSA has a product, for example, that provides digital certificate information. A government agency is using it as part of a solution to show what type of roles and responsibilities various employees have to determine what type of access they should have to certain data.

The tool is used to determine what satellite photos certain employees can see, or the level of detail they can see in those photos.

'So people with the right combination of their security clearance, and other information on their digital certificate, would see different types of information when looking up the same satellite image,' Kriese said.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.