HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.164 Selection of a suitable cryptographic procedure

S 2.164 Selection of a suitable cryptographic procedure

Initiation responsibility: IT Security Management

Implementation responsibility: IT Security Management

The selection of a cryptographic procedure is divided into two subsidiary tasks:

Before users commit themselves to a particular procedure, they should have a precise conception of their requirements in terms of the confidentiality and authenticity of the processed data at every point of the information-processing system.

Selection of cryptographic algorithms

When selecting cryptographic algorithms it is first necessary to clarify which type of cryptographic procedures are required, in other words symmetrical, asymmetrical or hybrid procedures, and then to select suitable algorithms, i.e. those with the requisite mechanism strength.

Encryption techniques

Authentication techniques

Hash techniques

Suitable algorithms include MD5, SHA-1 and RIPEMD-160, for example.

Selection criteria


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home