Content deleted Content added
VulcanSphere (talk | contribs) Adding short description: "Process of encrypting message one or more times" (Shortdesc helper) |
CortexFiend (talk | contribs) Link suggestions feature: 2 links added. |
||
(10 intermediate revisions by 9 users not shown) | |||
Line 2:
'''Multiple encryption''' is the process of [[encryption|encrypting]] an already encrypted message one or more times, either using the same or a different algorithm. It is also known as '''cascade encryption''', '''cascade ciphering''', '''multiple encryption''', and '''superencipherment'''. '''Superencryption''' refers to the outer-level encryption of a multiple encryption.
Some cryptographers, like Matthew Green of [[Johns Hopkins University]], say multiple encryption addresses a problem that mostly doesn't exist:
{{Blockquote |text = |title=Multiple Encryption | However, ==Independent keys==
Picking any two [[cipher]]s, if the [[key (cryptography)|key]] used is the same for both, the second cipher could possibly undo the first cipher, partly or entirely. This is true of ciphers where the [[decryption]] process is exactly the same as the encryption process (a [[reciprocal cipher]]) &
To prevent that risk, one can use keys that are [[statistical independence|statistically independent]] for each layer (e.g. independent [[
Ideally each key should have separate and different generation, sharing, and management processes.
Line 15 ⟶ 21:
==Importance of the first layer==
With the exception of the [[one-time pad]], no cipher has been theoretically proven to be unbreakable. Furthermore, some recurring properties may be found in the [[ciphertext]]s generated by the first cipher. Since those ciphertexts are the plaintexts used by the second cipher, the second cipher may be rendered vulnerable to attacks based on known plaintext properties (see references below).
This is the case when the first layer is a program P that always adds the same string S of characters at the beginning (or end) of all ciphertexts (commonly known as a [[Magic number (programming)|magic number]]). When found in a file, the string S allows an [[Kernel (operating system)|operating system]] to know that the program P has to be launched in order to decrypt the file. This string should be removed before adding a second layer.
Line 32 ⟶ 37:
==The Rule of Two==
The '''Rule of Two''' is a [[data security]] principle from the [[National Security Agency|NSA's]] Commercial Solutions for Classified Program (CSfC).<ref>{{cite web |url=http://www.nsa.gov/ia/programs/csfc_program/ |title=Commercial Solutions for Classified Program |publisher=US National Security Agency |access-date=24 December 2015 |quote= |archive-url=https://web.archive.org/web/20151225183650/https://www.nsa.gov/ia/programs/csfc_program/ |archive-date=25 December 2015 |url-status=dead }}</ref> It specifies two completely independent layers of cryptography to protect data. For example, data could be protected by both hardware encryption at its lowest level and software encryption at the application layer. It could mean using two [[Federal Information Processing Standards|FIPS]]-validated software cryptomodules from different vendors to en/decrypt data.▼
▲The '''Rule of Two''' is a data security principle from the [[National Security Agency|NSA's]] Commercial Solutions for Classified Program (CSfC).<ref>{{cite web |url=http://www.nsa.gov/ia/programs/csfc_program/ |title=Commercial Solutions for Classified Program |publisher=US National Security Agency |access-date=24 December 2015 |quote= |archive-url=https://web.archive.org/web/20151225183650/https://www.nsa.gov/ia/programs/csfc_program/ |archive-date=25 December 2015 |url-status=dead }}</ref> It specifies two completely independent layers of cryptography to protect data. For example, data could be protected by both hardware encryption at its lowest level and software encryption at the application layer. It could mean using two [[Federal Information Processing Standards|FIPS]]-validated software cryptomodules from different vendors to en/decrypt data.
The importance of vendor and/or model diversity between the layers of components centers around removing the possibility that the manufacturers or models will share a vulnerability. This way if one components is compromised there is still an entire layer of encryption protecting the information at rest or in transit. The CSfC Program offers solutions to achieve diversity in two ways. "The first is to implement each layer using components produced by different manufacturers. The second is to use components from the same manufacturer, where that
manufacturer has provided NSA with sufficient evidence that the implementations of the two components are independent of one another."<ref>{{cite web |url=https://www.nsa.gov/Portals/70/documents/resources/everyone/csfc/capability-packages/MACPv2_1.pdf/ |title=Mobile Access Capability Package
The principle is practiced in the NSA's secure mobile phone called Fishbowl.<ref name=":0" /> The phones use two layers of encryption protocols, [[IPsec]] and [[Secure Real-time Transport Protocol]] (SRTP), to protect voice communications. The Samsung [[Galaxy S9]] Tactical Edition is also an approved CSfC Component.▼
▲The principle is practiced in the NSA's secure mobile phone called Fishbowl.<ref name=":0">{{cite book | last=Adams | first=David | last2=Maier | first2=Ann-Kathrin | title=Big Seven Study (2016): 7 open source Crypto-Messengers to be compared (English/Deutsch) | publisher=BoD – Books on Demand | publication-place=Norderstedt | date=2019-10-23 | isbn=978-3-7504-0897-5 | url=https://phoenixnap.dl.sourceforge.net/project/goldbug/bigseven-crypto-audit.pdf}}</ref> The phones use two layers of encryption protocols, [[IPsec]] and [[Secure Real-time Transport Protocol]] (SRTP), to protect voice communications. The Samsung [[Galaxy S9]] Tactical Edition is also an approved CSfC Component.
==References==
Line 60 ⟶ 48:
==Further reading ==
{{refbegin}}
* "Multiple encryption" in [
* Confidentiality through Multi-Encryption, in: Adams, David / Maier, Ann-Kathrin (2016): BIG SEVEN Study, open source crypto-messengers to be compared
* A "way to combine multiple block algorithms" so that "a cryptanalyst must break both algorithms" in §15.8 of ''Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C'' by Bruce Schneier. Wiley Computer Publishing, John Wiley & Sons, Inc.
* S. Even and O. Goldreich, On the power of cascade ciphers, ACM Transactions on Computer Systems, vol. 3, pp. 108–116, 1985.
* M. Maurer and J. L. Massey, Cascade ciphers: The importance of being first, Journal of Cryptology, vol. 6, no. 1, pp. 55–61, 1993.
{{refend}}
{{DEFAULTSORT:Multiple Encryption}}
|