ACSD-News

Paper at GI Sicherheit 2024

On Criteria and Tooling for Cryptographic Inventories

 

Researchers from the  Applied Cyber Security Darmstadt (ACSD) and  User Center Security (UCS) research group successfully placed a paper at this year's GI Sicherheit conference.

Abstract:

When cryptography becomes insecure, a migration to new schemes is required. Often the migration process is very complicated, but the time available is very limited. Only if the used cryptographic algorithms, protocols and configurations are known can a system be efficiently and fully adapted to changed security situations. This creates the need for a crypto-inventory that gathers this knowledge. Consequently, the question arises what criteria a crypto-inventory must fulfill to support this adaptation. It also highlights the need for tools to assist compilation. We therefore conducted a literature survey and extracted key requirements. Missing content was supplemented by expanding existing requirements or adding new ones. Furthermore, appropriate metrics were assigned to assess the fulfillment of the requirements for a certain crypto-inventory implementation. Regarding the tooling, we identified five major areas of interest — installed software, connected hardware, communication, stored data and source code scanning — and provide prototypes for semi-automatic creation of crypto-inventories for three of them. This provides organizations with a starting point to understand their cryptographic landscape as a prerequisite for crypto-agility and crypto-migration. However, theoretical design and prototypes have not yet been evaluated. This will be done as a follow-up to this work. All types of organizations are invited to participate.

Kontakt

Leiter
Prof. Dr. Christoph Krauß

Kommunikation Schöfferstraße 10
64295 Darmstadt
Büro: D19, 3.07

+49.6151.533-60152
christoph.krauss@h-da.de

Leiter
Prof. Dr. Alexander Wiesmaier

Kommunikation Schöfferstraße 10
64295 Darmstadt
Büro: D19, 2.09

+49.6151.533-60185
alexander.wiesmaier@h-da.de

Lehrgebiet
Cyber Security