Cryptography is the science of transforming data so
that it is interpretable only by authorized persons. Data that is unencrypted
is called plaintext. The process of disguising plaintext data is called encryption,
and encrypted data is called ciphertext. The process of transforming
ciphertext back to plaintext is called decryption. The Texas
Administrative Code states that, "encryption techniques for storage and
transmission of information shall be used based on documented court security
risk management decisions.”
Cryptography relies upon two basic components: an algorithm and a key. Algorithms are complex mathematical formulae, and keys are strings of bits used in conjunction with algorithms to make the required transformations. There are two basic types of cryptography: symmetric and asymmetric. Each has advantages and disadvantages. Most current cryptographic applications combine both techniques to exploit the strengths of each type.
Management’s ability to monitor internal communications or audit internal computer systems may be impacted by the use of encryption. If a user encrypts outgoing email messages or the content of a hard disk drive, system administrative personnel will be unable to audit such messages and files. Also, if the decryption keys are lost, the data may then be permanently lost.
The Department of Information Resources’ (DIR) SRRPUB13 publication provides guidance on Digital Signatures and Public Key Infrastructure (PKI) that may be useful.
Encryption Planning Standards
Description |
Benefits |
Disadvantages |
|
Use approved encryption tools such as Secure
Socket Layers (SSL) and IPSec to encrypt sensitive data traversing an
un-trusted network. |
Lower
cost. |
Does not protect data in storage. Slow speed. |
1. If information that is considered to be sensitive or confidential, such as adjudication, credit card, or juvenile case information, traverses an un-trusted public network, such as the Internet, then the data shall be encrypted with at least 128-bit encryption. Options for encrypting data in transit include:
For Web servers using SSL, the certificate shall be purchased from a recognized CA vendor. The DIR has approved the following PKI service providers:
· Digital Signature Trust Company
2. Encryption keys shall be considered synonymous with the courts most sensitive category of information and access to those keys must be restricted on a “need-to-know” basis. The keys to be used for encryption must be generated by means that are not easily reproducible by outside parties.
3. The following features shall be required when purchasing encryption products:
Description |
Benefits |
Disadvantages |
|
Implement
a high-level encryption policy based on the court risk analysis to define how
the court will use encryption technology.
The encryption policy will consider security requirements and
resources required. Also, the policy
will address the encryption of data in storage and in transit. |
High
security provided by encryption performed based on management-approved
policy. |
More
costly than the minimum-security option. Slow speed. |
In addition to encrypting data in transit, the following standards shall be followed:
1. A high-level encryption policy shall be developed to establish a coordinated strategy for encryption. The policy will include:
2. If the court business environment and encryption policy require the use of encryption on stored data, then a commercial product shall be used to provide the encryption. In addition, if stored data is to be encrypted, then the courts must have a way to recover encrypted files in the event that an employee leaves the court or the employee’s key has been lost or stolen. Sensitive information stored in databases shall utilize the encryption capabilities of the database management system (DBMS).
Description |
Benefits |
Disadvantages |
|
Implement
a high-level encryption policy to define how the court will use encryption
technology. The policy will address
the encryption of data in storage and in transit. Implement a Public Key
Infrastructure (PKI). |
Maximum
security and capabilities are provided. |
Even higher costs associated with deployment of
PKI. PKI technology is immature and
issues exist regarding interoperability, cross-certification, token
technology, and government controls. Slow speed. |
In addition to the Optimum Security Option, the courts shall:
1. Implement a public key infrastructure (PKI) to provide maximum security. PKI provides the means for verifying identity and managing encryption. The following shall be considered in implementing and/or evaluating PKI:
According
to the Gartner group, PKI vendors such as VeriSign, Entrust, RSA, and Baltimore
are currently the market leaders for this type of technology.