Skip to main content
Testing Your Cryptography: How Concealed Are You?

Testing Your Cryptography: How Concealed Are You?

Introduction

Why did the encryption algorithm go to see the doctor?
Because it had a bad case of ciphertext!
Jokes aside, we are living in an ever increasingly digitized world where data security is of paramount importance and protecting sensitive information has become a critical challenge for organizations. One of the essential components of securing data is the use of cryptography. Join us as we demystify this seemingly magical security practice.
Cryptography is the practice of securing communication from unauthorized access by converting the data into an unreadable format using various encryption techniques.
However, the use of cryptography alone is not enough to protect data. It is crucial to evaluate the cryptographic mechanisms used by organizations regularly to ensure their effectiveness and identify areas for improvement.

Evaluating Cryptographic Implementations

Evaluating cryptographic mechanisms involves analyzing various aspects of the cryptographic infrastructure, including encryption algorithms, key management, and digital signatures.

Secure Protocols and APIs:

Encryption Algorithms:

The strength of the encryption algorithm is one of the critical factors in evaluating cryptographic mechanisms. The cryptographic algorithm's strength must be evaluated against known attacks, and the algorithm's output should be indistinguishable from random data.
It is important to use the latest cryptographic algorithms, such as Advanced Encryption Standard (AES). AES is widely accepted and has no known vulnerabilities.

Key Management:

Cryptography involves using keys to encrypt and decrypt data. Therefore, key management is a critical component of the cryptographic infrastructure. Evaluating key management practices involves assessing key generation, distribution, storage, and revocation procedures. The cryptographic keys used should be random and unique.
Additionally, their distribution should be controlled and auditable. The keys should also be adequately protected from unauthorized access.

Digital Signatures:

Digital signatures are used to provide authenticity, integrity, and non-repudiation for messages. The effectiveness of digital signatures depends on the strength of the cryptographic algorithm used and the security of the signing keys.
It is crucial to ensure that the digital signature algorithms used comply with industry standards, such as the Digital Signature Algorithm (DSA) and the RSA algorithm.

Compliance:

Organizations must comply with industry standards and regulations regarding cryptographic implementations, such as those outlined in FedRAMP pertaining to FIPS 140-2. It is essential to review the company's compliance with these standards and regulations to ensure that the cryptographic mechanisms used meet the required security standards.

Testing:

Regular testing is important to evaluate the effectiveness of cryptographic mechanisms. This involves conducting gap assessments and penetration testing to identify vulnerabilities in the cryptographic infrastructure. Regular testing can help organizations identify weaknesses in their cryptographic mechanisms and take necessary actions to mitigate them.

Conclusion

Evaluating cryptographic mechanisms is a crucial aspect of ensuring the security of sensitive information. Organizations must regularly review and assess their cryptographic mechanisms to identify potential weaknesses and areas for improvement. Evaluating the strength of encryption algorithms, key management practices, compliance with industry standards, and regular testing can help organizations strengthen their cryptographic mechanisms and prevent data breaches.
By prioritizing the evaluation of cryptographic mechanisms, organizations can enhance their data security and safeguard their sensitive information.

Related FedRAMP Controls

  • AC-3 - ACCESS ENFORCEMENT
  • AC-6 (1) - LEAST PRIVILEGE | AUTHORIZE ACCESS TO SECURITY FUNCTIONS
  • AC-6 (10) - LEAST PRIVILEGE | PROHIBIT NON-PRIVILEGED USERS FROM EXECUTING PRIVILEGED FUNCTIONS
  • AC-17 (2) - REMOTE ACCESS | PROTECTION OF CONFIDENTIALITY / INTEGRITY USING ENCRYPTION
  • CM-7 (5) - LEAST FUNCTIONALITY | AUTHORIZED SOFTWARE / WHITELISTING
  • CP-9 - INFORMATION SYSTEM BACKUP
  • CP-9 (3) - INFORMATION SYSTEM BACKUP | SEPARATE STORAGE FOR CRITICAL INFORMATION
  • IA-2 - IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)
  • IA-5 (1) - AUTHENTICATOR MANAGEMENT | PASSWORD-BASED AUTHENTICATION
  • IA-7 - CRYPTOGRAPHIC MODULE AUTHENTICATION
  • MP-5 - MEDIA TRANSPORT
  • MP-5 (4) - MEDIA TRANSPORT | CRYPTOGRAPHIC PROTECTION
  • MP-6 - MEDIA SANITIZATION
  • SC-8 (1) - TRANSMISSION CONFIDENTIALITY AND INTEGRITY | CRYPTOGRAPHIC OR ALTERNATE PHYSICAL PROTECTION
  • SC-12 - CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT
  • SC-12 (2) - CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT | SYMMETRIC KEYS
  • SC-12 (3) - CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT | ASYMMETRIC KEYS
  • SC-13 - CRYPTOGRAPHIC PROTECTION
  • SC-20 - SECURE NAME /ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)
  • SC-28 - PROTECTION OF INFORMATION AT REST
  • SC-28(1) - PROTECTION OF INFORMATION AT REST | CRYPTOGRAPHIC PROTECTION
  • SI-7 SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY

 

Sources:

https://events.afcea.org/AFCEACyber19/CUSTOM/pdf/safelogic_tl.pdf 

Digital Signature Algorithm (DSA) in Cryptography: A Complete Guide | Simplilearn 

Cryptography | NIST 

What is Cryptography? Definition, Importance, Types | Fortinet 

What is an Encryption Algorithm? | Encryption Consulting 

What is Key Management? How does Key Management work? | Encryption Consulting