Cryptography tools. What is skzi, and what types they are. Software cryptographic protection systems

💖 Do you like it? Share the link with your friends

CIPF (means cryptographic protection information) is a program or device that encrypts documents and generates an electronic signature (ES). All operations are performed using a key electronic signature, which cannot be selected manually, since it is a complex set of characters. This ensures reliable information protection.

How CIPF works

  1. The sender creates a document
  2. Using CIPF and a private key, the electronic signature adds a signature file, encrypts the document and combines everything into a file that is sent to the recipient
  3. The file is sent to the recipient
  4. The recipient decrypts the document using CIPF and private key your electronic signature
  5. The recipient checks the integrity of the electronic signature, making sure that no changes have been made to the document

Types of CIPF for electronic signature

There are two types of cryptographic information protection tools: installed separately and built into the media.

CIPF installed separately is a program that is installed on any computer device. Such CIPF are used everywhere, but have one drawback: they are strictly tied to one workplace. You will be able to work with any number of electronic signatures, but only on the computer or laptop on which CIPF is installed. To work for different computers, you will have to buy an additional license for each.

When working with electronic signatures, the cryptoprovider CryptoPro CSP is most often used as the installed CIPF. The program runs on Windows, Unix and other operating systems, and supports domestic security standards GOST R 34.11-2012 and GOST R 34.10-2012.

Other cryptographic information protection systems are used less frequently:

  1. Signal-COM CSP
  2. LISSI-CSP
  3. VipNet CSP

All listed CIPFs are certified by the FSB and FSTEC and comply with security standards adopted in Russia. For full operation they also require the purchase of a license.

CIPF built into the media, are encryption tools built into the device that are programmed to work independently. They are convenient due to their self-sufficiency. Everything you need to sign an agreement or report is already on the media itself. There is no need to buy licenses or install additional software. A computer or laptop with Internet access is sufficient. Encryption and decryption of data is carried out within the media. Media with built-in CIPF include Rutoken EDS, Rutoken EDS 2.0 and JaCarta SE.

The term "cryptography" comes from the ancient Greek words "hidden" and "write". The phrase expresses the main purpose of cryptography - the protection and preservation of the secrets of transmitted information. Information protection can occur different ways. For example, by limiting physical access to data, hiding the transmission channel, creating physical difficulties in connecting to communication lines, etc.

Purpose of Cryptography

Unlike traditional methods of secret writing, cryptography assumes full accessibility of the transmission channel for attackers and ensures the confidentiality and authenticity of information using encryption algorithms that make the information inaccessible to outsiders. Modern system cryptographic information protection (CIPF) is a software and hardware computer system that provides information protection according to the following basic parameters.

  • Confidentiality- impossibility of reading information by persons who do not have appropriate access rights. The main component of ensuring confidentiality in CIPF is the key, which is a unique alphanumeric combination for user access to a specific CIPF block.
  • Integrity- impossibility of unauthorized changes, such as editing and deleting information. To do this, redundancy is added to the original information in the form of a verification combination, calculated using a cryptographic algorithm and depending on the key. Thus, without knowing the key, adding or changing information becomes impossible.
  • Authentication- confirmation of the authenticity of information and the parties sending and receiving it. Information transmitted over communication channels must be uniquely authenticated by content, time of creation and transmission, source and recipient. It should be remembered that the source of threats can be not only the attacker, but also the parties involved in the exchange of information with insufficient mutual trust. To prevent such situations, CIPF uses a system of time stamps to prevent repeated or reverse sending of information and changing its order.

  • Authorship- confirmation and impossibility of refusing actions performed by the user of the information. The most common method of authentication is the EDS system consists of two algorithms: for creating a signature and for verifying it. When working intensively with ECC, it is recommended to use software certification centers to create and manage signatures. Such centers can be implemented as a CIPF tool that is completely independent of the internal structure. What does this mean for the organization? This means that all transactions are processed by independent certified organizations and falsification of authorship is almost impossible.

Encryption algorithms

Currently, open encryption algorithms using symmetric and asymmetric keys with a length sufficient to provide the required cryptographic complexity predominate among CIPF. The most common algorithms:

  • symmetric keys - Russian R-28147.89, AES, DES, RC4;
  • asymmetric keys - RSA;
  • using hash functions - R-34.11.94, MD4/5/6, SHA-1/2.

Many countries have their own national standards. In the USA, a modified AES algorithm with a key length of 128-256 bits is used, and in the Russian Federation, the electronic signature algorithm R-34.10.2001 and the block cryptographic algorithm R-28147.89 with a 256-bit key. Some elements of national cryptographic systems are prohibited for export outside the country; activities to develop CIPF require licensing.

Hardware cryptographic protection systems

Hardware CIPF is physical devices, containing software for encrypting, recording and transmitting information. Encryption devices can be made in the form of personal devices, such as ruToken USB encryptors and IronKey flash drives, expansion cards for personal computers, specialized network switches and routers, on the basis of which it is possible to build fully protected computer networks.

Hardware cryptographic information protection systems are quickly installed and work with high speed. Disadvantages - high, compared to software and hardware-software CIPF, cost and limited upgrade capabilities.

CIPF units built into the hardware can also be classified as hardware. various devices registration and transmission of data where encryption and restriction of access to information is required. Such devices include automobile tachometers that record vehicle parameters, some types of medical equipment, etc. For full operation of such systems, separate activation of the CIPF module by the supplier’s specialists is required.

Software cryptographic protection systems

Software CIPF is a special software package for encrypting data on storage media (hard and flash drives, memory cards, CD/DVD) and when transmitted over the Internet ( emails, files in attachments, protected chats, etc.). There are quite a lot of programs, including free ones, for example, DiskCryptor. Software CIPF can also include protected virtual networks exchange of information operating “on top of the Internet” (VPN), an extension of the HTTP Internet protocol with support for HTTPS and SSL encryption - a cryptographic information transfer protocol widely used in IP telephony systems and Internet applications.

Software cryptographic information protection systems are mainly used on the Internet, on home computers and in other areas where the requirements for the functionality and stability of the system are not very high. Or as is the case with the Internet, when you have to create many different secure connections at the same time.

Software and hardware cryptographic protection

Combines best qualities hardware and software systems CIPF. This is the most reliable and functional way to create secure systems and data networks. All options for user identification are supported, both hardware (USB drive or smart card) and “traditional” - login and password. Software and hardware CIPFs support all modern encryption algorithms, have a wide range of functions for creating secure document flow based on digital signatures, and all required government certificates. The installation of CIPF is carried out by qualified developer personnel.

Company "CRYPTO-PRO"

One of the leaders of the Russian cryptographic market. The company develops a full range of information protection programs with using digital signature based on international and Russian cryptographic algorithms.

The company's programs are used in electronic document management of commercial and government organizations, for filing accounting and tax reports, in various city and budget programs, etc. The company has issued more than 3 million licenses for the CryptoPRO CSP program and 700 licenses for certification centers. Crypto-PRO provides developers with interfaces for embedding cryptographic protection elements into their own and provides a full range of consulting services for the creation of CIPF.

Crypto provider CryptoPro

When developing CIPF CryptoPro CSP built into the operating room was used Windows system cryptographic architecture Cryptographic Service Providers. The architecture allows you to connect additional independent modules that implement the required encryption algorithms. With the help of modules working through CryptoAPI functions, cryptographic protection can be implemented by both software and hardware CIPF.

Key carriers

Various types of private keys can be used:

  • smart cards and readers;
  • electronic locks and readers that work with Touch Memory devices;
  • various USB keys and removable USB drives;
  • system files Windows registry, Solaris, Linux.

Cryptoprovider functions

CIPF CryptoPro CSP is fully certified by FAPSI and can be used for:

2. Complete confidentiality, authenticity and integrity of data using encryption and simulation protection in accordance with Russian encryption standards and the TLS protocol.

3. Integrity checks and controls program code to prevent unauthorized modification and access.

4. Creation of system protection regulations.

Definition 1

Cryptographic information protection is a protection mechanism by encrypting data to ensure information security society.

Cryptographic methods of information protection are actively used in modern life for storing, processing and transmitting information over communication networks and on various media.

The essence and goals of cryptographic information protection

Today, the most reliable method of encryption when transmitting information data over long distances is cryptographic information protection.

Cryptography is a science that studies and describes models of information security (hereinafter referred to as information security) of data. It allows you to solve many problems that are inherent in network information security: confidentiality, authentication, control and integrity of interacting participants.

Definition 2

Encryption is the transformation of information data into a form that will be unreadable for software systems and a person without an encryption-decryption key. Thanks to cryptographic methods of information protection, information security means are provided, therefore they are a fundamental part of the information security concept.

Note 1

The key goal of cryptographic information protection is to ensure the confidentiality and protection of computer network information data during its transmission over the network between system users.

Confidential information protection, which is based on cryptographic protection, encrypts information data through reversible transformations, each of which is described by a key and order, which determines the order in which they are applied.

An important component of cryptographic information protection is the key, which is responsible for the choice of transformation and the order of its implementation.

Definition 3

A key is a specific sequence of characters that configures the encryption and decryption algorithm of the information cryptographic protection system. Each transformation is determined by a key that specifies a cryptographic algorithm that ensures the security of the information system and information as a whole.

Each cryptographic information protection algorithm operates in different modes, which have both a number of advantages and a number of disadvantages, which affect the reliability of the state’s information security and information security tools.

Means and methods of cryptographic information protection

The main means of cryptographic protection of information include software, hardware and software-hardware that implement cryptographic algorithms for information with the purpose of:

  • protection of information data during their processing, use and transmission;
  • ensuring the integrity and reliability of information during its storage, processing and transmission (including using digital signature algorithms);
  • generating information that is used to authenticate and identify subjects, users and devices;
  • generating information that is used to protect authenticating elements during their storage, generation, processing and transmission.

Currently, cryptographic methods of information protection to ensure reliable authentication of parties to information exchange are basic. They provide for encryption and coding of information.

There are two main methods of cryptographic information protection:

  • symmetric, in which the same key, which is kept secret, is used for both encryption and decryption of data;
  • asymmetrical.

In addition, there are very effective methods symmetric encryption is fast and reliable. Similar methods in Russian Federation there is a state standard “Information processing systems. Cryptographic information protection. Cryptographic conversion algorithm" - GOST 28147-89.

Asymmetric methods of cryptographic information protection use two keys:

  1. Unclassified, which can be published along with other information about the user that is public. This key is used for encryption.
  2. Secret, which is known only to the recipient, is used for decryption.

Among the asymmetric ones, the most famous method of cryptographic information protection is the RSA method, which is based on operations with large (100-digit) prime numbers, as well as their products.

Thanks to the use of cryptographic methods, it is possible to reliably control the integrity of individual pieces of information data and their sets, guarantee the impossibility of refusing actions taken, and also determine the authenticity of data sources.

The basis of cryptographic integrity control is two concepts:

  1. Electronic signature.
  2. Hash function.

Definition 4

A hash function is a one-way function or data transformation that is difficult to reverse, implemented by symmetric encryption by chaining blocks. The result of encrypting the last block, which depends on all previous ones, is the result of the hash function.

In commercial activities, cryptographic information protection is becoming increasingly important. In order to transform information, a variety of encryption tools are used: documentation encryption tools (including for portable execution), encryption tools telephone conversations and radio communications, as well as means of encrypting data transmission and telegraph messages.

In order to protect trade secrets on the domestic and international markets, sets of professional encryption equipment and technical devices cryptographic protection of telephone and radio conversations, as well as business correspondence.

In addition, maskers and scramblers, which replace the speech signal with digital data transmission, have also become widespread. Cryptographic means of protecting faxes, telexes and teletypes are produced. For the same purposes, encryptors are also used, which are made in the form of attachments to devices, in the form of separate devices, and also in the form of devices that are built into the design of fax modems, telephones and other communication devices. Electronic digital signature widely used to ensure the reliability of transmitted electronic messages.

Cryptographic information protection in the Russian Federation solves the issue of integrity by adding a certain checksum or verification combination in order to calculate the integrity of the data. The information security model is cryptographic, that is, it depends on the key. According to information security assessments, which is based on cryptography, the dependence of the probability of reading data on the secret key is the most reliable tool and is even used in government information security systems.

Cryptography (from the ancient Greek κρυπτος - hidden and γραϕω - I write) is the science of methods for ensuring the confidentiality and authenticity of information.

Cryptography is a set of data transformation methods aimed at making the data useless to an attacker. Such transformations allow us to solve two main issues regarding information security:

  • privacy protection;
  • integrity protection.

The problems of protecting confidentiality and information integrity are closely related, so methods for solving one of them are often applicable to solving the other.

There are various approaches to the classification of methods for cryptographic transformation of information. Based on the type of impact on the original information, methods of cryptographic transformation of information can be divided into four groups:

The sender generates plaintext original message M, which must be transmitted to the rightful recipient over an insecure channel. An eavesdropper monitors the channel with the goal of intercepting and revealing the transmitted message. To prevent an interceptor from learning the contents of a message M, the sender encrypts it using a reversible transform Ek and receives the ciphertext (or cryptogram) C=Ek(M), which is sent to the recipient.

The legitimate recipient by accepting the ciphertext WITH, decrypts it using the inverse transform Dk(C) and receives the original message in plaintext M.

Conversion Ek is selected from a family of cryptographic transformations called cryptoalgorithms. The parameter by which a particular transformation is selected is called the cryptographic key TO.

The cryptosystem has different implementation options: a set of instructions, hardware, a set of programs that allow you to encrypt the plaintext and decrypt the ciphertext in various ways, one of which is selected using a specific key TO.

The encryption conversion can be symmetrical And asymmetrical regarding the decryption transformation. This important property defines two classes of cryptosystems:

  • symmetric (single-key) cryptosystems;
  • asymmetric (two-key) cryptosystems (with public key).

Symmetric encryption

Symmetric encryption, often called secret key encryption, is primarily used to ensure data confidentiality. To ensure data confidentiality, users must jointly select a single mathematical algorithm that will be used to encrypt and decrypt data. In addition, they need to select a shared (secret) key to be used with their adopted encryption/decryption algorithm, i.e. the same key is used for both encryption and decryption (the word "symmetric" means the same for both sides).

An example of symmetric encryption is shown in Fig. 2.2.

Today, widely used encryption algorithms include Data Encryption Standard (DES), 3DES (or “triple DES”), and International Data Encryption Algorithm (IDEA). These algorithms encrypt messages in 64-bit blocks. If the message is larger than 64 bits (as it usually is), you need to break it up into blocks of 64 bits each and then somehow combine them together. Such a merger typically occurs using one of the following four methods:

  • electronic code book (Electronic Code Book, ECB);
  • chains of encrypted blocks (Cipher Block Changing, CBC);
  • x-bit encrypted feedback(Cipher FeedBack, CFB-x);
  • output feedback (Output FeedBack, OFB).

Triple DES (3DES)– a symmetric block cipher created on the basis of the DES algorithm in order to eliminate the main disadvantage of the latter - the small key length (56 bits), which can be cracked by brute force. The speed of 3DES is 3 times lower than that of DES, but the cryptographic strength is much higher. The time required to cryptanalyze 3DES can be much longer than the time required to break DES.

Algorithm AES(Advanced Encryption Standard), also known as Rijndael - a symmetric block encryption algorithm - encrypts messages in blocks of 128 bits, using a key of 128/192/256 bits.

Secret key encryption is often used to maintain data confidentiality and is implemented very effectively using immutable firmware. This method can be used for authentication and maintaining data integrity.

The following problems are associated with the symmetric encryption method:

  • it is necessary to change secret keys frequently, since there is always a risk of their accidental disclosure (compromise);
  • It is quite difficult to ensure the security of secret keys during their generation, distribution and storage.

1.1. This Policy for the Application of Cryptographic Information Protection Tools ( Further - Policy ) determines the procedure for organizing and ensuring the functioning of encryption ( cryptographic) means intended to protect information that does not contain information constituting a state secret ( Further - CIPF, crypto-means ) in case of their use to ensure the security of confidential information and personal data during their processing in information systems.

1.2. This Policy has been developed in pursuance of:

  • Federal Law "About personal data" , regulations of the Government of the Russian Federation in the field of ensuring the security of personal data;
  • Federal Law No. 63-FZ "About electronic signature" ;
  • Order of the FSB of the Russian Federation No. 378 "On approval of the composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems using cryptographic information protection tools necessary to fulfill the requirements established by the Government of the Russian Federation for the protection of personal data for each level of security";
  • FAPSI Order No. 152 “ On approval of the Instructions on organizing and ensuring the security of storage, processing and transmission via communication channels using means of cryptographic protection of information with limited access that does not contain information constituting a state secret»;
  • Order of the FSB of the Russian Federation N 66 " On approval of the Regulations on the development, production, sale and operation of encryption (cryptographic) information security means (PKZ-2005 Regulations) »;

1.3. This Policy applies to crypto tools designed to ensure the security of confidential information and personal data when processed in information systems;

1.4. Cryptographic means information protection ( Further - CIPF ), implementing encryption and electronic signature functions are used to protect electronic documents transmitted over public communication channels, for example, the public Internet, or via dial-up communication channels.

1.5. To ensure security, it is necessary to use CIPF, which:

  • allow embedding into technological processes processing electronic messages, ensure interaction with application software at the level of processing requests for cryptographic transformations and issuing results;
  • are supplied by the developers with a full set of operational documentation, including a description of the key system, rules for working with it, as well as justification for the necessary organizational and staffing support;
  • support the continuity of logging processes of CIPF operation and ensuring integrity software for the CIPF operating environment, which is a set of hardware and software, together with which the CIPF operates normally and which can affect the fulfillment of the requirements for CIPF;
  • certified by an authorized state body or have permission from the FSB of Russia.

1.6. CIPF used to protect personal data must have a class of at least KS2.

1.7. CIPF is implemented on the basis of algorithms that comply with the national standards of the Russian Federation and the terms of the agreement with the counterparty.

1.8. CIPF, licenses, accompanying key documents, instructions for CIPF are purchased by the organization independently or can be obtained from a third party that initiates secure document flow.

1.9. CIPF, including installation media, key documents, descriptions and instructions for CIPF, constitute a trade secret in accordance with the Regulations on Confidential Information.

  1. Procedure for using CIPF

2.1. Installation and configuration of cryptographic information protection tools is carried out in accordance with operational documentation, instructions of the FSB of Russia and other organizations participating in secure electronic document flow. Upon completion of installation and configuration, the readiness of the CIPF for use is checked, conclusions are drawn up on the possibility of their operation, and the CIPF is put into operation.

The placement and installation of CIPF, as well as other equipment operating with crypto-assets, in secure premises should minimize the possibility of uncontrolled access of unauthorized persons to these funds. Maintenance of such equipment and change of crypto keys are carried out in the absence of persons not authorized to work with CIPF data. It is necessary to provide organizational and technical measures to exclude the possibility of using CIPF by unauthorized persons. The physical placement of CIPF must ensure the security of CIPF and prevent unauthorized access to CIPF. Access of persons to the premises where protective equipment is located is limited in accordance with official needs and is determined by a list approved by the director.

The embedding of crypto funds of class KS1 and KS2 is carried out without control by the FSB of Russia ( if this control is not provided for in the terms of reference for the development (modernization) of the information system).

The embedding of cryptocurrencies of class KS3, KB1, KB2 and KA1 is carried out only under the control of the FSB of Russia.

Embedding of crypto-tools of class KS1, KS2 or KS3 can be carried out either by the user of the crypto-tool himself if he has the appropriate license from the FSB of Russia, or by an organization that has the appropriate license from the FSB of Russia.

The embedding of cryptocurrencies of class KV1, KV2 or KA1 is carried out by an organization that has the appropriate license from the FSB of Russia.

Decommissioning of CIPF is carried out subject to procedures ensuring guaranteed deletion of information, unauthorized use which can cause damage to the business activities of the organization, and information used by information security tools from permanent memory and from external media ( with the exception of archives of electronic documents and protocols electronic interaction, the maintenance and preservation of which for a certain period are provided for by the relevant regulatory and (or) contractual documents) and is formalized by the Act. CIPF is destroyed ( dispose of) by decision of the owner of the crypto-fund, and with notification of the organization responsible in accordance with the organization of copy-by-instance accounting of crypto-funds.

Destined for destruction ( recycling) CIPF are subject to removal from the hardware with which they functioned. In this case, crypto-tools are considered removed from the hardware if the procedure for removing the software of crypto-tools, provided for in the operational and technical documentation for CIPF, has been completed and they are completely disconnected from the hardware.

General-purpose hardware components and parts suitable for further use, not specifically designed for hardware implementation of cryptographic algorithms or other CIPF functions, as well as equipment working together with crypto-tools ( monitors, printers, scanners, keyboards, etc.), may be used after the destruction of CIPF without restrictions. In this case, information that may remain in the equipment memory devices ( for example, in printers, scanners), must be securely removed ( erased).

2.2. The operation of CIPF is carried out by persons appointed by order of the director of the organization and who have been trained to work with them. If there are two or more CIPF users, responsibilities are distributed between them taking into account personal responsibility for the safety of crypto funds, key, operational and technical documentation, as well as for assigned areas of work.

Users of crypto funds are required to:

  • not disclose information to which they are authorized, including information about CIPF and other protection measures;
  • do not disclose information about key documents;
  • do not allow copies to be made of key documents;
  • prevent key documents from being displayed ( monitor) personal computer or printer;
  • do not allow extraneous information to be recorded on the key media;
  • do not allow installation of key documents on other personal computers;
  • comply with the requirements for ensuring the security of information, the requirements for ensuring the security of CIPF and key documents thereto;
  • report about attempts by unauthorized persons that have become known to them to obtain information about the CIPF used or key documents for them;
  • immediately notify about the facts of loss or shortage of CIPF, key documents for them, keys to premises, storage facilities, personal seals and other facts that may lead to the disclosure of protected information;
  • submit CIPF, operational and technical documentation for them, key documents upon dismissal or removal from duties related to the use of cryptocurrencies.

The security of information processing using CIPF is ensured by:

  • compliance by users with confidentiality when handling information that is entrusted to them or has become known through their work, including information about the functioning and procedure for ensuring the security of the CIPF used and key documents to them;
  • accurate compliance by CIPF users with information security requirements;
  • reliable storage of operational and technical documentation for CIPF, key documents, limited distribution media;
  • timely detection of attempts by unauthorized persons to obtain information about the protected information, about the CIPF used or key documents to them;
  • immediate adoption of measures to prevent the disclosure of protected information, as well as its possible leak when facts of loss or shortage of CIPF, key documents for them, certificates, passes, keys to premises, storage facilities, safes are identified ( metal cabinets), personal seals, etc.

If necessary, transfer by technical means communication of restricted access service messages related to the organization and operation of CIPF, these messages must be transmitted only using crypto-means. Transfer of cryptokeys via technical means of communication is not permitted, with the exception of specially organized systems with a decentralized supply of cryptokeys.

CIPF are subject to accounting using indices or conventional names and registration numbers. The list of indices, code names and registration numbers of crypto-assets is determined by the Federal Security Service of the Russian Federation.

CIPF used or stored, operational and technical documentation for them, key documents are subject to copy-by-copy recording. The form of the CIPF Logbook is given in Appendix No. 1, Logbook key media in Appendix No. 2 to this Policy. In this case, software cryptographic information protection systems must be taken into account together with the hardware with which their normal operation is carried out. If hardware or hardware-software CIPF is connected to the system bus or to one of the internal hardware interfaces, then such crypto-measures are also taken into account together with the corresponding hardware.

The unit of copy-by-copy accounting of key documents is considered to be a reusable key media, a key notepad. If the same key medium is used repeatedly to record crypto keys, then it should be registered separately each time.

All received copies of crypto-assets, operational and technical documentation for them, key documents must be issued against receipt in the appropriate copy-by-copy register to users of crypto-assets who are personally responsible for their safety.

The transfer of CIPF, operational and technical documentation for them, and key documents is allowed only between users of crypto-assets and (or) the responsible user of crypto-assets against a receipt in the appropriate journals for individual accounting. Such transfer between users of crypto funds must be authorized.

Storage of CIPF installation media, operational and technical documentation, key documents is carried out in cabinets ( boxes, storage) for individual use under conditions that preclude uncontrolled access to them, as well as their unintentional destruction.

The hardware with which the CIPF operates normally, as well as hardware and hardware-software CIPF, must be equipped with means of control over their opening ( sealed, sealed). Place of sealing ( sealing) cryptocurrencies, hardware must be such that it can be visually monitored. In the presence of technical feasibility During the absence of users of crypto-funds, these funds must be disconnected from the communication line and placed in sealed storage facilities.

Changes to the CIPF software and technical documentation for the CIPF are carried out on the basis of received from the CIPF manufacturer and documented updates with recording of checksums.

Operation of CIPF involves maintaining at least two backup copies of software and one backup copy key media. Restoring the functionality of the CIPF in emergency situations is carried out in accordance with the operational documentation.

2.3. The production of key documents from the initial key information is carried out by responsible users of CIPF, using standard crypto-tools, if such a possibility is provided for in the operational and technical documentation in the presence of a license from the FSB of Russia for the production of key documents for crypto-tools.

Key documents can be delivered by courier ( including departmental) communication or with specially designated responsible users of crypto funds and employees, subject to measures to prevent uncontrolled access to key documents during delivery.

To send key documents, they must be placed in durable packaging that excludes the possibility of physical damage and external influence. The packaging indicates the responsible user for whom the packaging is intended. Such packages are marked “Personally”. The packages are sealed in such a way that it is impossible to remove the contents from them without breaking the packages and seals.

Before initial deportation ( or return) the addressee is informed in a separate letter of the description of the packages sent to him and the seals with which they can be sealed.

To send key documents, a covering letter is prepared, which must indicate: what is being sent and in what quantity, document registration numbers, as well as, if necessary, the purpose and procedure for using the item being sent. The covering letter is included in one of the packages.

The received packages are opened only by the responsible user of the crypto funds for which they are intended. If the contents of the received package do not correspond to what is indicated in the cover letter or the packaging itself and the seal do not correspond to their description ( imprint), and also if the packaging is damaged, resulting in free access to its contents, then the recipient draws up a report, which is sent to the sender. Key documents received with such shipments are not permitted to be used until instructions are received from the sender.

If defective key documents or crypto keys are detected, one copy of the defective product should be returned to the manufacturer to establish the causes of the incident and eliminate them in the future, and the remaining copies should be stored until additional instructions are received from the manufacturer.

Receipt of key documents must be confirmed to the sender in the manner specified in the cover letter. The sender is obliged to control the delivery of his items to the recipients. If the appropriate confirmation is not received from the addressee in a timely manner, the sender must send him a request and take measures to clarify the location of the items.

The order for the production of the next key documents, their production and distribution to places of use for the timely replacement of existing key documents is made in advance. The instruction to put into effect the next key documents is given by the responsible user of crypto funds only after receiving confirmation from them that the next key documents have been received.

Unused or deactivated key documents must be returned to the responsible user of crypto funds or, at his direction, must be destroyed on site.

Destruction of crypto keys ( initial key information) can be done by physically destroying the key media on which they are located, or by erasing ( destruction) crypto keys ( initial key information) without damaging the key media ( to ensure its reusability).

Cryptokeys ( initial key information) are washed using the technology adopted for the corresponding key reusable media ( floppy disks, compact discs (CD-ROM), Data Key, Smart Card, Touch Memory, etc.). Direct actions to erase crypto keys ( initial key information), as well as possible restrictions on the further use of the corresponding reusable key media are regulated by the operational and technical documentation for the relevant CIPF, as well as instructions from the organization that recorded the crypto keys ( initial key information).

Key media are destroyed by causing irreparable physical damage to them, excluding the possibility of their use, as well as by restoring key information. Direct actions to destroy a specific type of key media are regulated by the operational and technical documentation for the relevant CIPF, as well as instructions from the organization that recorded the crypto keys ( initial key information).

Paper and other combustible key media are destroyed by burning or using any paper cutting machines.

Key documents are destroyed within the time limits specified in the operational and technical documentation for the relevant CIPF. The fact of destruction is recorded in the corresponding copy-by-instance journals.

Destruction according to the act is carried out by a commission consisting of at least two people. The act specifies what is destroyed and in what quantity. At the end of the act, a final record is made (in numbers and in words) about the number of items and copies of key documents being destroyed, installation of CIPF media, operational and technical documentation. Corrections in the text of the act must be agreed upon and certified by the signatures of all members of the commission who took part in the destruction. About the destruction carried out, notes are made in the appropriate journals for individual records.

Cryptokeys that are suspected of being compromised, as well as other cryptokeys operating in conjunction with them, must be immediately taken out of action, unless a different procedure is specified in the operational and technical documentation of the CIPF. In emergency cases, when there are no crypto keys to replace compromised ones, it is allowed, by the decision of the responsible user of crypto funds, agreed with the operator, to use compromised crypto keys. In this case, the period of use of compromised crypto keys should be as short as possible, and the protected information should be as valuable as possible.

About violations that may lead to compromise of cryptokeys, their components or transmitted ( stored) with their use of data, users of crypto funds are obliged to inform the responsible user of crypto funds.

Inspection of reusable key media by unauthorized persons should not be considered as a suspicion of compromise of crypto keys, if this excludes the possibility of their copying ( reading, reproduction).

In cases of shortage, non-presentation of key documents, as well as uncertainty of their location, the responsible user takes urgent measures to find them and localize the consequences of compromising key documents.

  1. Key system management procedure

Registration of persons with rights to manage keys is carried out in accordance with the operational documentation for the CIPF.

Key management is an information process that includes three elements:

— key generation;

— accumulation of keys;

— distribution of keys.

Organizational information systems use special hardware and software methods for generating random keys. As a rule, pseudo random number sensors are used ( Further - PSCH ), with a fairly high degree of randomness in their generation. Software key generators that calculate the PFR as a complex function of the current time and ( or) number entered by the user.

The accumulation of keys refers to the organization of their storage, accounting and removal.

Private keys must not be written explicitly on a medium that can be read or copied.

All information about the keys used must be stored in encrypted form. Keys that encrypt key information are called master keys. Each user must know master keys by heart; storing them on any tangible media is prohibited.

To ensure information security, it is necessary to periodically update key information in information systems. In this case, both regular keys and master keys are reassigned.

When distributing keys, the following requirements must be met:

— efficiency and accuracy of distribution;

— secrecy of distributed keys.

An alternative is for two users to obtain a shared key from a central authority, the Key Distribution Center (KDC), through which they can communicate securely. To organize the exchange of data between the CRC and the user, the latter is allocated a special key during registration, which encrypts messages transmitted between them. Each user is allocated a separate key.

KEY MANAGEMENT BASED ON PUBLIC KEY SYSTEMS

Before using a public key cryptosystem to exchange regular private keys, users must exchange their public keys.

Public keys can be managed through an online or offline directory service, and users can also exchange keys directly.

  1. Monitoring and control of the use of CIPF

To increase the level of security when operating CIPF, monitoring procedures should be implemented in the system that record all significant events that took place during the exchange of electronic messages and all information security incidents. The description and list of these procedures must be established in the operational documentation for the CIPF.

Control over the use of cryptographic information protection provides:

  • monitoring the compliance of the setup and configuration of information security tools, as well as hardware and software that can affect the fulfillment of the requirements for information security tools, regulatory and technical documentation;
  • monitoring compliance with the rules for storing restricted access information used in the operation of information security tools ( in particular, key, password and authentication information);
  • control of the possibility of access of unauthorized persons to information security means, as well as to hardware and software that can affect the fulfillment of the requirements for information security means;
  • monitoring compliance with incident response rules information information (about facts of loss, compromise of key, password and authentication information, as well as any other restricted access information);
  • control of compliance of hardware and software tools of CIPF and documentation for these tools with reference samples ( supplier guarantees or control mechanisms that allow you to independently establish such compliance);
  • monitoring the integrity of the hardware and software of CIPF and documentation for these tools during storage and commissioning of these tools ( using both control mechanisms described in the documentation for CIPF, and using organizational).

Download ZIP file (43052)

If the documents were useful, please give them a “like”:



tell friends