|Previous||Table of Contents||Next|
Comparing File-Level and Driver-Level Encryption
|File-Level Encryption||Driver-Level Encryption|
|Ease of implementation and use.|
Relatively small performance penalty.
Users can move files between different machines without problems.
Users can back files up without problems.
|Temporary files, work files, and so forth can be kept on the secure drive.|
Its harder to forget to re-encrypt something on this kind of system.
|Potential leakage through security-unconscious programs. (Program may write file to disk for temporary storage, for example.)|
Bad implementations may always re-encrypt with same key for same password.
|Lots of things can go wrong with a device-driver or memory-resident program.|
Bad implementations will allow chosen-plaintext, or even chosen-ciphertext attacks.
If whole system is master-keyed under one password, loss of that password means that the attacker gets everything.
A more limited set of ciphers can reasonably be used for this kind of application. For example, OFB stream ciphers would not work.
|User has to figure out what to do.|
There may be different passwords for different files.
Manual encryption of selected files is the only access control.
|There will be a performance penalty.|
The driver may interact in weird ways with Windows, OS/2 DOS emulation, device drivers, and so on.
The first is speed. As we will see in Part III, encryption algorithms consist of many complicated operations on plaintext bits. These are not the sorts of operations that are built into your run-of-the-mill computer. The two most common encryption algorithms, DES and RSA, run inefficiently on general-purpose processors. While some cryptographers have tried to make their algorithms more suitable for software implementation, specialized hardware will always win a speed race.
Additionally, encryption is often a computation-intensive task. Tying up the computers primary processor for this is inefficient. Moving encryption to another chip, even if that chip is just another processor, makes the whole system faster.
The second reason is security. An encryption algorithm running on a generalized computer has no physical protection. Mallory can go in with various debugging tools and surreptitiously modify the algorithm without anyone ever realizing it. Hardware encryption devices can be securely encapsulated to prevent this. Tamperproof boxes can prevent someone from modifying a hardware encryption device. Special-purpose VLSI chips can be coated with a chemical such that any attempt to access their interior will result in the destruction of the chips logic. The U.S. governments Clipper and Capstone chips (see Sections 24.16 and 24.17) are designed to be tamperproof. The chips can be designed so that it is impossible for Mallory to read the unencrypted key.
IBM developed a cryptographic system for encrypting data and communications on mainframe computers [515,1027]. It includes tamper-resistant modules to hold keys. This system is discussed in Section 24.1.
Electromagnetic radiation can sometimes reveal what is going on inside a piece of electronic equipment. Dedicated encryption boxes can be shielded, so that they leak no compromising information. General-purpose computers can be shielded as well, but it is a far more complex problem. The U.S. military calls this TEMPEST; its a subject well beyond the scope of this book.
The final reason for the prevalence of hardware is the ease of installation. Most encryption applications dont involve general-purpose computers. People may wish to encrypt their telephone conversations, facsimile transmissions, or data links. It is cheaper to put special-purpose encryption hardware in the telephones, facsimile machines, and modems than it is to put in a microprocessor and software.
Even when the encrypted data comes from a computer, it is easier to install a dedicated hardware encryption device than it is to modify the computers system software. Encryption should be invisible; it should not hamper the user. The only way to do this in software is to write encryption deep into the operating system. This isnt easy. On the other hand, even a computer neophyte can plug an encryption box between his computer and his external modem.
The three basic kinds of encryption hardware on the market today are: self-contained encryption modules (that perform functions such as password verification and key management for banks), dedicated encryption boxes for communications links, and boards that plug into personal computers.
Some encryption boxes are designed for certain types of communications links, such as T-1 encryption boxes that are designed not to encrypt synchronization bits. There are different boxes for synchronous and asynchronous communications lines. Newer boxes tend to accept higher bit rates and are more versatile.
Even so, many of these devices have some incompatibilities. Buyers should be aware of this and be well-versed in their particular needs, lest they find themselves the owners of encryption equipment unable to perform the task at hand. Pay attention to restrictions in hardware type, operating system, applications software, network, and so forth.
PC-board encryptors usually encrypt everything written to the hard disk and can be configured to encrypt everything sent to the floppy disk and serial port as well. These boards are not shielded against electromagnetic radiation or physical interference, since there would be no benefit in protecting the boards if the computer remained unaffected.
More companies are starting to put encryption hardware into their communications equipment. Secure telephones, facsimile machines, and modems are all available.
Internal key management for these devices is generally secure, although there are as many different schemes as there are equipment vendors. Some schemes are more suited for one situation than another, and buyers should know what kind of key management is incorporated into the encryption box and what they are expected to provide themselves.
Any encryption algorithm can be implemented in software. The disadvantages are in speed, cost, and ease of modification (or manipulation). The advantages are in flexibility and portability, ease of use, and ease of upgrade. The algorithms written in C at the end of this book can be implemented, with little modification, on any computer. They can be inexpensively copied and installed on many machines. They can be incorporated into larger applications, such as communications programs or word processors.
|Previous||Table of Contents||Next|