<section title="17.1. Cryptographic Fundamentals"><subsection title="Objective"><paragraph
    title="17.1.1."


><![CDATA[<p class="NormS17C1">Agencies use cryptographic products, algorithms and protocols that are approved by the GCSB and are implemented in accordance with this guidance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.1.2."


><![CDATA[<p>This section covers information on the fundamentals of cryptography including the use of encryption to protect data at rest and in transit. &nbsp;Detailed information on algorithms and protocols approved to protect classified information can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2 - Approved Cryptographic Algorithms</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
<block title="Purpose of cryptography"><paragraph
    title="17.1.3."


><![CDATA[<p class="NormS17C1">Cryptography is primarily used to support:</p><ul>
<li>Confidentiality – protecting against the risk of information being disclosed to an unauthorised person;</li>
<li>Authentication – ensuring a person or entity is who they claim to be;</li>
<li>Integrity – ensuring information has not been compromised, either deliberately or accidentally; and</li>
<li>Non-repudiation – proving who (or what) performed an action. </li>
</ul>]]></paragraph>
<paragraph
    title="17.1.4."


><![CDATA[<p class="NormS17C1">Cryptography is an important control for data protection. The encryption selected may change depending on the classification of the data.  It is important to note that classification, in itself, provides no protection but is merely a labelling mechanism to indicate the degree of protection and care required in handling that data.</p>]]></paragraph>
<paragraph
    title="17.1.5."


><![CDATA[<p class="NormS17C1">Cryptography is frequently used in the establishment of secure connectivity (e.g. IPSec VPNs) and in trust frameworks such as those supported by Public Key Infrastructure (PKI).</p>]]></paragraph>
<paragraph
    title="17.1.6."


><![CDATA[<p>With the increases in speed and computing power and the cost reductions of modern computing, older cryptographic algorithms are increasingly vulnerable.  It is vital that recommendations and controls in the NZISM are followed.</p>]]></paragraph>
<paragraph
    title="17.1.7."


><![CDATA[<p class="NormS17C1">Mitigation of the risks when using older cryptographic algorithms, often takes the form of increased key lengths.  Agencies should also note the increasing threat posed by the evolution and development of quantum computing (see 17.1.19 - Quantum Computing and Encryption).</p>]]></paragraph>
</block>
<block title="Encryption"><paragraph
    title="17.1.8."


><![CDATA[<p class="NormS17C1">Encryption is the process of converting plain (readable) text to an unintelligible form (cipher text).  The term encryption is often used synonymously with cryptography.</p>]]></paragraph>
<paragraph
    title="17.1.9."


><![CDATA[<p class="NormS17C1">The use of approved encryption will generally reduce the likelihood of an unauthorised party gaining access to the information contained within the encrypted data.</p>]]></paragraph>
<paragraph
    title="17.1.10."


><![CDATA[<p class="NormS17C1">When data is at rest, encryption can be used to reduce the physical protection and handling requirements of media or systems. This does not change the classification of the underlying data system or equipment.</p>]]></paragraph>
<paragraph
    title="17.1.11."


><![CDATA[<p class="NormS17C1">Care needs to be taken with encryption systems that do not encrypt the entire media content to ensure that either all of the classified data is encrypted or that the media is handled in accordance with the highest classification of the unencrypted data.</p>]]></paragraph>
<paragraph
    title="17.1.12."


><![CDATA[<p class="NormS17C1">Encryption of data in transit can be used to provide protection for information being communicated over insecure media and hence reduce the security requirements of the communication process.</p>]]></paragraph>
<paragraph
    title="17.1.13."


><![CDATA[<p class="NormS17C1">It is important to note that when agencies use encryption for data at rest or in transit, they are <strong>not</strong> reducing the <strong>classification</strong> of the information. When encryption is used the potential risk of disclosure of the information is reduced.</p>]]></paragraph>
<paragraph
    title="17.1.14."


><![CDATA[<p class="NormS17C1">As the classification of the information <strong>does not </strong>change when encrypted, agencies cannot use lowered storage, physical transfer or security requirements as a baseline to further lower requirements with an additional cryptographic product.</p>]]></paragraph>
<paragraph
    title="17.1.15."


><![CDATA[<p>In general terms, the level of assurance of specific encryption protocols and algorithms is defined in terms of Common Criteria, Protection Profiles or, in some cases, approved cryptographic evaluations.  It is important to note that evaluations of cryptographic protocols and algorithms are <strong>NOT</strong> universally conducted when security products are evaluated, relying rather on previous approved evaluations of cryptographic protocols and algorithms.</p>]]></paragraph>
</block>
<block title="Risk Assessments"><paragraph
    title="17.1.16."


><![CDATA[<p class="NormS17C1">Encryption algorithms apply data transformations that are designed to be difficult to reverse by unauthorised users.  Today’s software will usually provide several algorithmic options, but may include some older algorithms provided for backward compatibility with older (legacy) systems.  In many cases the older algorithms are deprecated, are considered time-expired and are not fit for purpose in modern systems. Deprecated algorithms should not be used.</p>]]></paragraph>
<paragraph
    title="17.1.17."


><![CDATA[<p class="NormS17C1">In all cases a comprehensive risk assessment should be undertaken before configurations are selected.&nbsp; Some general principles to be considered are:</p><ul>
<li>Cryptographic strength is determined by a combination of the encryption algorithm being used, the encryption protocol and the key length.&nbsp; Longer keys generally provide increased encryption strength over shorter keys when using the same encryption algorithm;</li>
<li>Asymmetric cryptographic algorithms are slower than symmetric cryptographic algorithms at an equivalent cryptographic strength;</li>
<li>Asymmetric cryptographic algorithms are recommended for the exchange of symmetric cryptographic keys when they are needed to be shared across communication channels;</li>
<li>Encrypted data cannot usually be compressed, but compressed data can be encrypted.&nbsp; Data should be compressed before encryption;</li>
<li>Encryption keys have the same requirements for handling and storage as the unencrypted data they are being used to protect;</li>
<li>Any risk assessment should include consideration of key management – refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">section 17.9 Key Management</a>.</li>
</ul>]]></paragraph>
<paragraph
    title="17.1.18."


><![CDATA[<p>It is important to note that the NZISM prescribes approved algorithms and protocols and users must select combinations from these lists.</p>]]></paragraph>
</block>
<block title="Quantum Computing and Encryption"><paragraph
    title="17.1.19."


><![CDATA[<p class="NormS17C1">Developments in quantum computing have highlighted threats to classical cryptography whereby a quantum computing, can undermine all of the widely used public key algorithms used for key establishment and digital signatures.  While this may be not an immediate issue, quantum developments are likely to undermine the effectiveness of encryption being used today to protect confidentiality of information.</p>]]></paragraph>
<paragraph
    title="17.1.20."


><![CDATA[<p class="NormS17C1">A further implication is that historical and archived data protected by encryption may be at risk.</p>]]></paragraph>
<paragraph
    title="17.1.21."


><![CDATA[<p class="NormS17C1">It is generally accepted that symmetric encryption, with sufficiently long keys, will remain quantum resistant in the short term but that quantum resistant replacements for digital signature and key establishment algorithms will be required in the near future.</p>]]></paragraph>
<paragraph
    title="17.1.22."


><![CDATA[<p class="NormS17C1">In the longer term, quantum resistant algorithms are expected to be developed, standardised and approved for use.  Until such time, however, agencies should be positioning themselves to be ready to migrate to a “post-quantum encryption” environment.</p>]]></paragraph>
<paragraph
    title="17.1.23."


><![CDATA[<p class="NormS17C1">As it is now recognised that agencies will need to undertake future migration activities related to post-quantum encryption, it is no longer specifically advised to invest in migration from RSA to ECC-based algorithms if that has not already taken place.  Emphasis should instead be placed on ensuring minimum key lengths specified in the NZISM are adhered to.</p>]]></paragraph>
</block>
<block title="Transitioning Cryptographic Algorithms and Protocols"><paragraph
    title="17.1.24."


><![CDATA[<p>It is important to use algorithms that adequately protect sensitive information.  It is also important to recognise that all cryptographic algorithms and protocols have a finite life.  Challenges are posed by new cryptanalysis techniques and methods, the increasing power of classical computing technology, and the continuing work on the development of quantum computers.  In addition, there is an active field of work that continuously seeks to compromise algorithms and protocols currently in use.</p>]]></paragraph>
<paragraph
    title="17.1.25."


><![CDATA[<p>Planning for changes in the use of cryptography because of algorithm breaks, the availability of more powerful computing techniques or new technologies is an important consideration for agencies.  Awareness of retirement or deprecation of algorithms and associated protocols is essential.</p>]]></paragraph>
</block>
<block title="RSA "><paragraph
    title="17.1.26."


><![CDATA[<p>RSA was announced in 1976 and is now over 45 years old. Several flaws and attacks have been identified since creation, each of which required specific mitigations, careful implementation and management.  Unfortunately there is ample evidence that implementers continue to have difficulties in securely implementing, using and managing RSA.</p>]]></paragraph>
<paragraph
    title="17.1.27."


><![CDATA[<p class="NormS17C1">To counter identified threats from shorter RSA key lengths, longer key lengths have been specified in the NZISM since 2010.  Minimum key lengths have been subsequently increased over time.</p>]]></paragraph>
<paragraph
    title="17.1.28."


><![CDATA[<p class="NormS17C1">For a number of years there had been several indicators that RSA was likely to be deprecated by the cryptographic community and standards bodies.  For example, TLS 1.3 has deprecated the use of RSA for key exchange in favour of elliptic curve cryptography, but RSA is still supported for digital signatures in the current standard.  Previous guidance from NIST was also indicative of the impending deprecation of RSA.  However, subsequent guidance no longer recommends moving from RSA to elliptic curve if that has not already been done.</p>]]></paragraph>
<paragraph
    title="17.1.29."


><![CDATA[<p class="NormS17C1">Therefore, while RSA is not fully deprecated in the NZISM, it is approved ONLY for a limited set of uses as described in <a title="Approved cryptographic algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2 – Approved Cryptographic Algorithms</a>.</p>]]></paragraph>
</block>
<block title="Product specific cryptographic requirements"><paragraph
    title="17.1.30."


><![CDATA[<p class="NormS17C1">This section provides requirements for the use of cryptography to protect classified information.  Requirements, in addition to those in this Manual, can exist in consumer guides for products once they have completed an approved evaluation.  Vendor specifications supplement this manual and where conflict in controls occurs the product specific requirements take precedence.  Any policy or compliance conflicts are to be incorporated into the risk assessment.</p>]]></paragraph>
</block>
<block title="Exceptions for using cryptographic products"><paragraph
    title="17.1.31."


><![CDATA[<p>Where Agencies implement a product that uses an Approved Cryptographic Algorithm or Approved Cryptographic Protocol to provide protection of unclassified data at rest or in transit, that product does not require a separate, approved evaluation.  Correct implementation of the cryptographic protocol is fundamental to the proper operation of the Approved Cryptographic Algorithm or Approved Cryptographic Protocol and is part of the checking conducted during system certification.</p>]]></paragraph>
</block>
<block title="Federal Information Processing Standard 140"><paragraph
    title="17.1.32."


><![CDATA[<p class="NormS17C1">FIPS 140 is a United States standard for the evaluation and validation of both hardware and software cryptographic modules.</p>]]></paragraph>
<paragraph
    title="17.1.33."


><![CDATA[<p class="NormS17C1">FIPS 140 is in its third iteration and is formally referred to as FIPS 140-3.  This section refers to the standard as FIPS 140 but this should be considered to encompass FIPS 140-1, FIPS 140-2 and FIPS 140-3.</p>]]></paragraph>
<paragraph
    title="17.1.34."


><![CDATA[<p>FIPS 140 is not a substitute for an approved evaluation of a product with cryptographic functionality.  FIPS 140 is concerned solely with the cryptographic functionality of a module and does not consider any other security functionality.</p>]]></paragraph>
<paragraph
    title="17.1.35."


><![CDATA[<p>Cryptographic evaluations of products will normally be conducted by an approved agency.  Where a product’s cryptographic functionality has been validated under FIPS 140, the GCSB can, at its discretion, and in consultation with the vendor, reduce the scope of a cryptographic evaluation.</p>]]></paragraph>
</block>
<block title="New Zealand National Policy for High Assurance Cryptographic Equipment and Key Management"><paragraph
    title="17.1.36."


><![CDATA[<p class="NormS17C1">The New Zealand National Standard for High Assurance Cryptographic Equipment (HACE) and related key management is contained in the <strong>New Zealand Communications Security Policy No. 301 – Safeguarding of Communications Security (COMSEC) Material</strong>.&nbsp; This prescribes national doctrine for the safeguarding of COMSEC materials.&nbsp; New Zealand Communications Security Policy No. 301 – Safeguarding of Communications Security (COMSEC) Material, replaces New Zealand Communications Security Standard No. 300 – Control of COMSEC Material which is now withdrawn. Note NZCSP 301 is a RESTRICTED document.</p>]]></paragraph>
</block>
<block title="Protection of RESTRICTED/SENSITIVE information in transit over public systems"><paragraph
    title="17.1.37."


><![CDATA[<p class="NormS17C1">The physical requirements for protection of information classified RESTRICTED/SENSITIVE are provided by the classification system and PSR guidance.</p>]]></paragraph>
<paragraph
    title="17.1.38."


><![CDATA[<p>Where such information is generated and held on information systems (any computer device, including laptops, mobile phones, tablets, desktop and networked systems), the requirements of the NZISM apply. Of particular note is the requirement to encrypt RESTRICTED/SENSITIVE data when in transit over public systems, including any Internet connection, public network or any other network NOT directly controlled by the agency.</p>]]></paragraph>
</block>
<block title="Encryption and Key Management"><paragraph
    title="17.1.39."


><![CDATA[<p class="NormS17C1">Direct agency control is described as the immediate and continuous physical and logical control, responsibility for, protection and operation of agency information systems and data (see 2.2.4).</p>]]></paragraph>
<paragraph
    title="17.1.40."


><![CDATA[<p class="NormS17C1">Indirect agency control is described as when information is not under the direct control of the agency, this may be through outsourcing, ICT management or services, third party facilities such as data centre co-locations, or consumption of cloud services (see 2.2.5 – 2.2.7).</p>]]></paragraph>
<paragraph
    title="17.1.41."


><![CDATA[<p class="NormS17C1">Encryption can be used to protect information not under the direct control of the agency.</p>]]></paragraph>
<paragraph
    title="17.1.42."


><![CDATA[<p class="NormS17C1">The use of encryption (including data encryption, use of a VPN or any other form of protection using cryptography) requires cryptographic key management and the retention of control of both keys and key management processes. </p>]]></paragraph>
<paragraph
    title="17.1.43."


><![CDATA[<p class="NormS17C1">Where agencies make use of VPNs or other forms of network connectivity that protect data in transit, the control and management of the cryptographic key is fundamental to the integrity and confidentiality of the encrypted data.</p>]]></paragraph>
<paragraph
    title="17.1.44."


><![CDATA[<p class="NormS17C1">If encryption keys are compromised, then any authentication and encryption mechanisms that rely on those keys, no matter how robust or comprehensive, are futile.</p>]]></paragraph>
<paragraph
    title="17.1.45."


><![CDATA[<p class="NormS17C1">If encryption keys are lost, damaged, or fail then access to data encrypted using those keys will also be lost.&nbsp; If control of encryption keys is lost, then those keys should be considered to be compromised and must be replaced or superseded urgently.</p>]]></paragraph>
<paragraph
    title="17.1.46."


><![CDATA[<p class="NormS17C1">The selection of the cryptographic protocol and algorithm is described in this chapter and specified in 17.1.55.C.02. It is essential that agencies select and use only approved cryptographic algorithms and protocols (see <a title="Approved Cryptographic Protocols" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">section 17.2 – Approved Cryptographic Protocols</a>) and apply the cryptographic key management requirements of the NZISM (see <a title="Key management" href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">section 17.9 - Key Management</a>).</p>]]></paragraph>
</block>
<block title="VPN connection Security"><paragraph
    title="17.1.47."


><![CDATA[<p class="NormS17C1">The types of encryption, protocols, and cryptographic algorithms applied in the establishment and maintenance of a VPN connection are fundamental to the security and integrity of the connection.</p>]]></paragraph>
<paragraph
    title="17.1.48."


><![CDATA[<p class="NormS17C1">Key aspects of VPN security include:</p><ul>
<li>The encryption algorithm and protocol used;</li>
<li>Cryptographic key length;</li>
<li>The authentication protocol</li>
<li>Key Exchange protocol;</li>
<li>Selection of VPN protocol;</li>
<li>VPN monitoring and a “kill switch” to deter IP leakage   and snooping;</li>
<li>Cryptographic key management.</li>
</ul>]]></paragraph>
<paragraph
    title="17.1.49."


><![CDATA[<p class="NormS17C1">It is important to understand that a variety of VPN services can use a variety of mechanisms.&nbsp; Agencies should also consider the service provider’s use of hash authentication, perfect forward secrecy, and the difference in encryption settings on both the data and control channels.&nbsp; The NZISM specifies the cryptographic protocols and cryptographic algorithms that should be used (see sections <a title="Approved Cryptographic algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 – Approved Cryptographic Algorithms</a> and <a title="Approved Cryptographic Protocols" href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">17.3 – Approved Cryptographic Protocols</a>) and agencies must ensure the VPN connection conforms with these requirements.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.1.50."


><![CDATA[<p>Further references can be found at:&nbsp;</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>NZCSP 301</strong></td>
<td>New Zealand Communications Security Policy 301 - Safeguarding of Communications Security (COMSEC) Material, NZCSP 301 replaces NZCSS 300</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>Contact the GCSB</p>
<p>RESTRICTED document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>&nbsp;PSR</td>
<td>Handling requirements for protectively marked information and equipment</td>
<td style="text-align: center;"><span>NZ Government Protective Security Requirements</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/classification-system/how-to-protect" target="_blank">https://protectivesecurity.govt.nz/classification-system/how-to-protect</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Transport Layer Security (tls)</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a title="https://datatracker.ietf.org/wg/tls/documents/" rel="noopener noreferrer" href="https://datatracker.ietf.org/wg/tls/documents/" target="_blank">https://datatracker.ietf.org/wg/tls/documents/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>TLS 1.3</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://www.ietf.org/blog/tls13/" target="_blank">https://www.ietf.org/blog/tls13/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>The Transport Layer Security (TLS) Protocol Version 1.3 March 2018</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html" target="_blank">https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html</a>&nbsp;</td>
</tr>
<tr>
<td>RFC 2407</td>
<td>The Internet IP Security Domain of Interpretation for ISAKMP</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc2407" target="_blank">https://tools.ietf.org/html/rfc2407</a>&nbsp;</td>
</tr>
<tr>
<td>RFC 2408&nbsp;</td>
<td>Internet Security Association and Key Management Protocol (ISAKMP)</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc2408" target="_blank">https://tools.ietf.org/html/rfc2408</a>&nbsp;</td>
</tr>
<tr>
<td>RFC 2409&nbsp;</td>
<td>The Internet Key Exchange (IKE)</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc2409" target="_blank">https://tools.ietf.org/html/rfc2409</a></td>
</tr>
<tr>
<td>RFC 8446&nbsp;</td>
<td>The Transport Layer Security (TLS) Protocol Version 1.3</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8446" target="_blank">https://datatracker.ietf.org/doc/html/rfc8446</a></td>
</tr>
<tr>
<td>RFC 8996&nbsp;</td>
<td>Deprecating TLS 1.0 and TLS 1.1 – Best Current Practise</td>
<td style="text-align: center;"><span>IETF</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8996" target="_blank">https://datatracker.ietf.org/doc/html/rfc8996</a></td>
</tr>
<tr>
<td>FIPS 140-3 (March 2019)&nbsp;</td>
<td>Security Requirements for Cryptographic Modules&nbsp;</td>
<td style="text-align: center;">NIST&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/140/3/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/140/3/final&nbsp;</a></td>
</tr>
<tr>
<td>FIPS 186-4 (July 2013)</td>
<td>Digital Signature Standard (DSS)&nbsp;</td>
<td style="text-align: center;"><span>NIST&nbsp;</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/186/4/draft" target="_blank">https://csrc.nist.gov/publications/detail/fips/186/4/draft</a></td>
</tr>
<tr>
<td>FIPS 186-5 (Draft, January 2020)<span>&nbsp;</span>&nbsp;</td>
<td>Digital Signature Standard (DSS)&nbsp;</td>
<td style="text-align: center;"><span>NIST&nbsp;</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/186/5/draft" target="_blank">https://csrc.nist.gov/publications/detail/fips/186/5/draft</a></td>
</tr>
<tr>
<td>FIPS 197 (November 2001)</td>
<td>Advanced Encryption Standard (AES) (This publication is under review)</td>
<td style="text-align: center;">&nbsp;<span>NIST&nbsp;</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/197/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/197/final</a></td>
</tr>
<tr>
<td>NIST SP 800-56A Rev. 3 (April 2018)</td>
<td>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final</a></td>
</tr>
<tr>
<td>NIST SP 800-56B Rev. 2 (March 2019)</td>
<td>Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-56b/rev-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-56b/rev-2/final</a></td>
</tr>
<tr>
<td>NIST SP 800-131A Rev. 2 (March 2019)</td>
<td>Transitioning the Use of Cryptographic Algorithms and Key Lengths</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final</a></td>
</tr>
<tr>
<td>NIST SP 800-57 Part 1 Rev. 5 (May 2020)</td>
<td>Recommendation for Key Management: Part 1 – General</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final</a></td>
</tr>
<tr>
<td>NIST SP 800-57 Part 2 Rev. 1 (May 2019)</td>
<td>Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-57-part-2/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-57-part-2/rev-1/final</a></td>
</tr>
<tr>
<td>NIST SP 800-57 Part 3 Rev. 1 (January 2015)</td>
<td>Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-57-part-3/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-57-part-3/rev-1/final</a></td>
</tr>
<tr>
<td>NIST 800-175A (August 2016)</td>
<td>Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175A.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175A.pdf [PDF, 470 KB]</a></td>
</tr>
<tr>
<td>NIST SP 800-175B&nbsp;Rev. 1 (March 2020)</td>
<td>Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-175b/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-175b/rev-1/final</a></td>
</tr>
<tr>
<td>CNSS Policy 15 (October 2016)</td>
<td>Use of Public Standards for Secure Information Sharing</td>
<td style="text-align: center;">
<p><span><span>Committee on National Security Systems</span></span></p>
<p><span>(CNSS)</span></p>
</td>
<td><a rel="noopener noreferrer" href="https://www.cnss.gov/CNSS/issuances/Policies.cfm" target="_blank">https://www.cnss.gov/CNSS/issuances/Policies.cfm</a></td>
</tr>
<tr>
<td>NSA Quantum Computing FAQ (August 2021)</td>
<td>Quantum Computing and Post-Quantum Cryptography</td>
<td style="text-align: center;"><span>NSA</span></td>
<td><a rel="noopener noreferrer" href="https://media.defense.gov/2021/Aug/04/2002821837/-1/-1/1/Quantum_FAQs_20210804.pdf" target="_blank">https://media.defense.gov/2021/Aug/04/2002821837/-1/-1/1/Quantum_FAQs_20210804.pdf [PDF, 258 KB]</a></td>
</tr>
<tr>
<td>
<p>VPNCP</p>
<p>Version 3.1 March 2015</p>
</td>
<td>Virtual Private Network Capability Package Version 3.1 March 2015&nbsp;</td>
<td style="text-align: center;">NSA&nbsp;</td>
<td>https://www.nsa.gov/ia/_files/VPN_CP_3_1.pdf</td>
</tr>
<tr>
<td>
<p>&nbsp;</p>
</td>
<td>Suite B Implementer’s Guide to NIST SP 800-56A, July 28, 2009</td>
<td style="text-align: center;">NSA</td>
<td><a rel="noopener noreferrer" href="http://docplayer.net/204368-Suite-b-implementer-s-guide-to-nist-sp-800-56a-july-28-2009.html" target="_blank">http://docplayer.net/204368-Suite-b-implementer-s-guide-to-nist-sp-800-56a-july-28-2009.html</a></td>
</tr>
<tr>
<td>
<p>EPC342-08 Version 7.0 4 November 2017</p>
</td>
<td>Guidelines on Cryptographic Algorithms Usage and Key Management</td>
<td style="text-align: center;"><span>European Payments Council</span></td>
<td><a rel="noopener noreferrer" href="https://www.europeanpaymentscouncil.eu/document-library/guidance-documents/guidelines-cryptographic-algorithms-usage-and-key-management" target="_blank">https://www.europeanpaymentscouncil.eu/document-library/guidance-documents/guidelines-cryptographic-algorithms-usage-and-key-management</a></td>
</tr>
<tr>
<td>
<p>&nbsp;</p>
</td>
<td>Choose an Encryption Algorithm</td>
<td style="text-align: center;"><span>Microsoft</span></td>
<td><a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/choose-an-encryption-algorithm?view=sql-server-2017" target="_blank">https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/choose-an-encryption-algorithm?view=sql-server-2017</a></td>
</tr>
<tr>
<td>
<p>&nbsp;</p>
</td>
<td>Transport Layer Protection Cheat Sheet</td>
<td style="text-align: center;"><span>OWASP</span></td>
<td><a rel="noopener noreferrer" href="https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet" target="_blank">https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Guide to Cryptography</td>
<td style="text-align: center;"><span><span>OWASP</span></span></td>
<td><a rel="noopener noreferrer" href="https://www.owasp.org/index.php/Guide_to_Cryptography" target="_blank">https://www.owasp.org/index.php/Guide_to_Cryptography</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>New Directions in Cryptography - IEEE Transactions on Information Theory Vol IT22 November 1976</td>
<td style="text-align: center;"><span><span>Diffie, Hellman</span></span></td>
<td><a rel="noopener noreferrer" href="https://ee.stanford.edu/~hellman/publications/24.pdf" target="_blank">https://ee.stanford.edu/~hellman/publications/24.pdf [PDF, 2.1 MB]</a></td>
</tr>
</tbody>
</table><p>&nbsp;</p><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using cryptographic products"><paragraph
    title="17.1.51.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>No real-world product can ever be guaranteed to be free of vulnerabilities.  The best that can be done is to increase the level of assurance in a product to a point that represents satisfactory risk management.</p>]]></paragraph>
<paragraph
    title="17.1.51.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a> for a discussion on product evaluation and assurance.</p>]]></paragraph>
<paragraph
    title="17.1.51.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2070"
><![CDATA[<p class="Normal-nonumbering">Agencies using cryptographic functionality within a product to protect the confidentiality, authentication, non-repudiation or integrity of information, MUST ensure that the product has completed a cryptographic evaluation recognised by the GCSB.</p>]]></paragraph>
</block>
<block title="Data recovery"><paragraph
    title="17.1.52.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>It is important for continuity and operational stability that cryptographic products provide a means of data recovery to allow for the recovery of data in circumstances such as where the encryption key is unavailable due to loss, damage or failure.  This includes production, storage, backup and virtual systems. This is sometimes described as “key escrow”.</p>]]></paragraph>
<paragraph
    title="17.1.52.C.01."

    tags="Cryptography,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2074"
><![CDATA[<p>Cryptographic products MUST provide a means of data recovery to allow for recovery of data in circumstances where the encryption key is unavailable due to loss, damage or failure.</p>]]></paragraph>
<paragraph
    title="17.1.52.C.02."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2075"
><![CDATA[<p>Cryptographic products SHOULD provide a means of data recovery to allow for recovery of data in circumstances where the encryption key is unavailable due to loss, damage or failure.</p>]]></paragraph>
</block>
<block title="Reducing storage and physical transfer requirements"><paragraph
    title="17.1.53.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p class="NormS16C1">When encryption is applied to storage media (whether portable or residing within IT equipment or systems) it provides an additional layer of defence.  Whilst such measures do not reduce or alter the classification of the information itself, physical storage, handling and transfer requirements may be reduced to those of a lesser classification for the media or equipment (but not the data itself). </p>]]></paragraph>
<paragraph
    title="17.1.53.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>Approved Cryptographic Algorithms are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">section 17.2</a>.</p>]]></paragraph>
<paragraph
    title="17.1.53.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2079"
><![CDATA[<p>Encryption used to reduce storage or physical handling protection requirements MUST be an approved cryptographic algorithm in an EAL2 (or higher) encryption product.</p>]]></paragraph>
<paragraph
    title="17.1.53.C.02."

    tags="Cryptography,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2080"
><![CDATA[<p class="Normal-nonumbering">If an agency wishes to reduce the storage or physical transfer requirements for IT equipment or media that contains classified information, they MUST encrypt the classified information using High Assurance Cryptographic Equipment (HACE).  It is important to note that the classification of the information itself remains unchanged.</p>]]></paragraph>
<paragraph
    title="17.1.53.C.03."

    tags="Cryptography,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2081"
><![CDATA[<p>If an agency wishes to use encryption to reduce the storage, handling or physical transfer requirements for IT equipment or media that contains classified information, they MUST use:</p><ul>
<li>full disk encryption; or</li>
<li>partial disk encryption where the access control will allow writing ONLY to the encrypted partition holding the classified information.</li>
</ul>]]></paragraph>
<paragraph
    title="17.1.53.C.04."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2082"
><![CDATA[<p>If an agency wishes to use encryption to reduce the storage or physical transfer requirements for IT equipment or media that contains classified information, they SHOULD use:</p><ul>
<li>full disk encryption; or</li>
<li>partial disk encryption where the access control will allow writing ONLY to the encrypted partition holding the classified information.</li>
</ul>]]></paragraph>
</block>
<block title="Encrypting NZEO information at rest"><paragraph
    title="17.1.54.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>NZEO information is particularly sensitive and it requires additional protection in the form of encryption, when at rest. This includes production, storage, backup and virtual systems.</p>]]></paragraph>
<paragraph
    title="17.1.54.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2085"
><![CDATA[<p>Agencies MUST use an Approved Cryptographic Algorithm to protect NZEO information when at rest on a system.</p>]]></paragraph>
</block>
<block title="Information and Systems Protection"><paragraph
    title="17.1.55.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>When encryption is applied to information being communicated over networks, less assurance is required for the physical protection of the communications infrastructure. In some cases, no physical security can be applied to the communications infrastructure such as public infrastructure, the Internet or non-agency controlled infrastructure. In other cases no direct assurance can be obtained and reliance is placed on third party reviews and reporting. In such cases encryption of information is the only practical mechanism to provide sufficient assurance that the agency information systems are adequately protected.</p>]]></paragraph>
<paragraph
    title="17.1.55.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p class="NormS16C1">Data duplication for backups or data replication aggregates agency information and will generally increase the impact of an unauthorised party gaining access to, or otherwise compromising, the data.  This includes where outsourced services are undertaken.</p>]]></paragraph>
<paragraph
    title="17.1.55.C.01."

    tags="Cryptography,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2089"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST use HACE if they wish to communicate or pass information over UNCLASSIFIED, insecure or unprotected networks.</p>]]></paragraph>
<paragraph
    title="17.1.55.C.02."

    tags="Cryptography,Technical"


    classification="Restricted/Sensitive"
    compliance="Must"
    cid="2090"
><![CDATA[<p>Information or systems classified RESTRICTED or SENSITIVE MUST be encrypted with an Approved Cryptographic Algorithm and Protocol if information is transmitted or systems are communicating over insecure or unprotected networks, such as the Internet, public networks or non-agency controlled networks.</p>]]></paragraph>
<paragraph
    title="17.1.55.C.03."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2091"
><![CDATA[<p class="NormS16C1">Agencies MUST encrypt aggregated agency data using an approved algorithm and protocol over insecure or unprotected networks such as the Internet, public infrastructure or non-agency controlled networks when the compromise of the aggregated data would present a significant impact to the agency. &nbsp;</p>]]></paragraph>
<paragraph
    title="17.1.55.C.04."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2092"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD encrypt agency data using an approved algorithm and protocol if they wish to communicate over insecure or unprotected networks such as the Internet, public networks or non-agency controlled networks.</p>]]></paragraph>
</block>
<block title="IT equipment using Encryption"><paragraph
    title="17.1.56.R.01."

    tags="Cryptography,Encryption,Technical"


><![CDATA[<p>In general terms, when IT equipment employing encryption functionality is turned on and authenticated all information becomes accessible to the system user.  At such a time the IT equipment will need to be handled in accordance with the highest classification of information on the system.  Special technology architectures and implementations exist where accessibility continues to be limited when first powered on.  Agencies should consult the GCSB for further advice on special architectures and implementations.</p>]]></paragraph>
<paragraph
    title="17.1.56.R.02."

    tags="Cryptography,Encryption,Technical"


><![CDATA[<p>The classification of the equipment when powered off will depend on the equipment type, cryptographic algorithms and protocols used and whether cryptographic key has been removed.  Agencies should consult the GCSB for further advice on treatment of specific software, systems and IT equipment. </p>]]></paragraph>
<paragraph
    title="17.1.56.C.01."

    tags="Cryptography,Encryption,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2096"
><![CDATA[<p>When IT equipment storing encrypted information is turned on and authenticated, it MUST be treated as per the original classification of the information.</p>]]></paragraph>
<paragraph
    title="17.1.56.C.02."

    tags="Cryptography,Encryption,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2097"
><![CDATA[<p>Agencies MUST consult the GCSB for further advice on the powered off status and treatment of specific software, systems and IT equipment.</p>]]></paragraph>
</block>
<block title="Encrypting NZEO information in transit"><paragraph
    title="17.1.57.R.01."

    tags="Cryptography,Encryption,Technical"


><![CDATA[<p>NZEO information is particularly sensitive and requires additional protection. It must be encrypted when in transit.</p>]]></paragraph>
<paragraph
    title="17.1.57.C.01."

    tags="Cryptography,Encryption,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2100"
><![CDATA[<p>In addition to any encryption already in place for communication mediums, agencies MUST use an Approved Cryptographic Protocol and Algorithm to protect NZEO information when in transit.</p>]]></paragraph>
</block>
<block title="Key Refresh and Retirement"><paragraph
    title="17.1.58.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>All cryptographic keys have a limited useful life after which the key should be replaced or retired. Typically the useful life of the cryptographic key (cryptoperiod) is use, product and situation dependant. Product guidance is the best source of information on establishing cryptoperiods for individual products. A more practical control is the use of data, disk or volume encryption where key changes are more easily managed. Selection of cryptoperiods should be based on a risk assessment.&nbsp;Refer also to section <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">17.9 – Key Management</a>.</p>]]></paragraph>
<paragraph
    title="17.1.58.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2103"
><![CDATA[<p>Agencies SHOULD establish cryptoperiods for all keys and cryptographic implementations in their systems and operations. <br><br></p>]]></paragraph>
<paragraph
    title="17.1.58.C.02."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2104"
><![CDATA[<p>Agencies SHOULD use risk assessment techniques and guidance to establish cryptoperiods.</p>]]></paragraph>
<paragraph
    title="17.1.58.C.03."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2105"
><![CDATA[<p class="Normal-nonumbering">Agencies using HACE MUST consult the GCSB for key management requirements.</p>]]></paragraph>
</block>
</subsection>
</section>
