Cryptography for a High-Assurance Web-Based Enterprise
INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA
Pagination or Media Count:
Each web service and each infrastructure service has a need for symmetric and asymmetric encryption, as well as signature processing and other cryptographic processes. This profile does not include electrical requirements for Multi-Level Systems MLS. A number of specialized cryptographic functions have been developed for hardware and network operations. Their use is appropriate for network level operations. For purposes of this paper, the discussion is limited to NSA Type 3 for IP enabled communications and similar algorithms. Cryptography is used by most of the services in an enterprise. Asymmetric encryption is performed in suitably security hardened stores and symmetric encryption is performed in most bi-lateral operations. Signatures for integrity and trust use are pervasive. Key management is required throughout the enterprise. The crypto services may be used through all of the Open Systems Interconnection OSI model layers, however, this document concentrates on layers 4 and above.
- Computer Systems
- Computer Systems Management and Standards