On Criteria and Tooling for Cryptographic Inventories
dc.contributor.author | Schmitt, Nicolai | |
dc.contributor.author | Henrich, Johanna | |
dc.contributor.author | Heinz, Dominik | |
dc.contributor.author | Alnahawi, Nouri | |
dc.contributor.author | Wiesmaier, Alexander | |
dc.contributor.editor | Wendzel, Steffen | |
dc.contributor.editor | Wressnegger, Christian | |
dc.contributor.editor | Hartmann, Laura | |
dc.contributor.editor | Freiling, Felix | |
dc.contributor.editor | Armknecht, Frederik | |
dc.contributor.editor | Reinfelder, Lena | |
dc.date.accessioned | 2024-04-19T12:54:03Z | |
dc.date.available | 2024-04-19T12:54:03Z | |
dc.date.issued | 2024 | |
dc.description.abstract | When cryptography becomes insecure, a migration to new schemes is required. Often the migration process is very complicated, but the time available is very limited. Only if the used cryptographic algorithms, protocols and configurations are known can a system be efficiently and fully adapted to changed security situations. This creates the need for a crypto-inventory that gathers this knowledge. Consequently, the question arises what criteria a crypto-inventory must fulfill to support this adaptation. It also highlights the need for tools to assist compilation. We therefore conducted a literature survey and extracted key requirements. Missing content was supplemented by expanding existing requirements or adding new ones. Furthermore, appropriate metrics were assigned to assess the fulfillment of the requirements for a certain crypto-inventory implementation. Regarding the tooling, we identified five major areas of interest — installed software, connected hardware, communication, stored data and source code scanning — and provide prototypes for semi-automatic creation of crypto-inventories for three of them. This provides organizations with a starting point to understand their cryptographic landscape as a prerequisite for crypto-agility and crypto-migration. However, theoretical design and prototypes have not yet been evaluated. This will be done as a follow-up to this work. All types of organizations are invited to participate. | en |
dc.identifier.doi | 10.18420/sicherheit2024_003 | |
dc.identifier.isbn | 978-3-88579-739-5 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/43967 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2024 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings Volume P-345 | |
dc.subject | Crypto-Inventory | |
dc.subject | Crypto-Agility | |
dc.subject | Automated | |
dc.subject | Tooling | |
dc.subject | Requirements | |
dc.subject | Metrics | |
dc.subject | PQC | |
dc.subject | Migration | |
dc.subject | Cryptography | |
dc.title | On Criteria and Tooling for Cryptographic Inventories | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 63 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 49 | |
gi.conference.date | 09.-11.04.2024 | |
gi.conference.location | Worms | |
gi.conference.sessiontitle | Full Paper Session 2 – Kryptographie |
Dateien
Originalbündel
1 - 1 von 1