+++ to secure your transactions use the Bitcoin Mixer Service +++

 

CESG RECOMMENDATIONS FOR SECURE ELECTRONIC MAIL

 

A Statement by Andrew Saunders, Director CESG.


The CESG recommendations for securing electronic mail within HMG draw upon the Royal Holloway key management architecture. Both have been the subject of criticism which is not well founded or which has been overtaken by the natural development of the architecture. Responses to the main points of criticism are given below.

Some commentators have confused the relationship between the recommendations and a National Health Service project for a secure network. The two are similar but distinct. In early 1996 Zergo Limited produced a study on the use of encryption services for an NHS-wide network. It recommended that the NHS should adopt X.509 Authentication Framework, Certification Authorities, X.509 version 3 certificates, Trusted Third Parties, Diffie-Hellman, Red Pike, DSA etc, but did not refer to CESG's recommendations, only to CESG. It has been incorrectly assumed that the recommendations are the same as the solution proposed for the NHS. However, CESG's programme is aimed only at HMG and has no connection with the Zergo proposal.

The most extensive critique has appeared in a paper by Dr Ross Anderson and Michael Roe entitled "The GCHQ(sic) Protocol and its Problems". Its conclusions are highly critical of the CESG approach but there is little if anything within the reference to substantiate these conclusions. Responses to the authors' own summary of the criticisms (paraphrased for brevity) are given below:

It is important to note that the CESG recommendations separate the authentication and confidentiality frameworks. Many of the criticisms confuse the two. Another common misconception is that the CESG Red Pike algorithm is being recommended for use in the public arena. No confidentiality algorithm is mandated in the recommendations: for HMG use, however, approved algorithms will be required; Red Pike was designed for a broad range of HMG applications.

It has been observed that there are potential security weaknesses in inter- TTP communications within the Royal Holloway architecture. CESG is fully aware of the need adequately to secure such high level exchanges and there are a number of ways this could be done. It has also been suggested that a TTP network could become large and that some users would have to keep a large number of public keys. This problem is overcome in the Royal Holloway architecture since any user can obtain all the necessary key material for communication from its local TTP. This is inherently more scalable than other approaches.

CESG recognises that the development of architectures for PKC implementations of secure messaging is evolutionary and that much valuable work is underway in academic and commercial circles. CESG intends to continue to take advantage of this work.

Director, CESG.

Posted 25 February 1997.

[ BACK TO NEWS LISTINGS ]