CARAF: Crypto Agility Risk Assessment Framework

被引:6
作者
Ma, Chujiao [1 ]
Colon, Luis [1 ]
Dera, Joe [1 ]
Rashidi, Bahman [1 ]
Garg, Vaibhav [1 ]
机构
[1] Comcast CyberSecur, Comcast Cable, 1800 Arch St, Philadelphia, PA 19103 USA
来源
JOURNAL OF CYBERSECURITY | 2021年 / 7卷 / 01期
关键词
agility; cryptography; risk assessment; quantum; IoT; KEY;
D O I
10.1093/cybsec/tyab013
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Crypto agility refers to the ability of an entity to replace existing crypto primitives, algorithms, or protocols with a new alternative quickly, inexpensively, with no or acceptable risk exposure. These changes may be driven by regulatory action, advances in computing, or newly discovered vulnerabilities. Yet everyday operational needs may put crypto agility considerations on the back burner when deploying technology, designing processes, or developing products/services. Consequently, changes are often performed in an ad hoc manner. Transition from one crypto solution to another can then take a long time and expose organizations to unnecessary security risk. This paper presents a framework to analyze and evaluate the risk that results from the lack of crypto agility. The proposed framework can be used by organizations to determine an appropriate mitigation strategy commensurate with their risk tolerance. We demonstrate the application of this framework with a case study of quantum computing and related threats to cryptography in the context of TLS for Internet of Things.
引用
收藏
页数:11
相关论文
共 50 条
[1]  
Abelson H., 1997, World Wide Web J., V2, P241
[2]   Keys under doormats: mandating insecurity by requiring government access to all data and communications [J].
Abelson, Harold ;
Anderson, Ross ;
Bellovin, Steven M. ;
Benaloh, Josh ;
Blaze, Matt ;
Diffie, Whitfield ;
Gilmore, John ;
Green, Matthew ;
Landau, Susan ;
Neumann, Peter G. ;
Rivest, Ronald L. ;
Schiller, Jeffrey I. ;
Schneier, Bruce ;
Specter, Michael A. ;
Weitzner, Daniel J. .
JOURNAL OF CYBERSECURITY, 2015, 1 (01) :69-79
[3]  
Alagic G., 2020, Status report on the second round of the NIST post-quantum cryptography standardization process, DOI DOI 10.6028/NIST.IR.8309
[4]  
Alberts ChristopherJ., 1999, OPERATIONALLY CRITIC
[5]  
[Anonymous], 2015, COMMERCIAL NATL SECU
[6]  
[Anonymous], 2006, NIST COMMENTS CRYPTA
[7]  
[Anonymous], CRYPTOGRAPHIC AGILIT
[8]  
[Anonymous], 2014, SECURITY ADVISORY
[9]  
Barker E., 2019, Transitioning the use of cryptographic algorithms and key lengths
[10]  
Bellovin Steven M., Analysis of the CLEAR Protocol per the National Academies Framework