Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

ENISA Issues Guidelines on Cryptographic Solutions

ENISA Details Use of Cryptography For Securing Personal Data

The European Union Agency for Network and Information Security (ENISA) has released two reports that aim to inform and guide decision makers in the public and private sector on the use and implementation of cryptographic protocols for securing personal data.

ENISA Details Use of Cryptography For Securing Personal Data

The European Union Agency for Network and Information Security (ENISA) has released two reports that aim to inform and guide decision makers in the public and private sector on the use and implementation of cryptographic protocols for securing personal data.

As a result of the numerous data breaches that took place in the past period and the recent government spying revelations, the European Union is increasingly focusing on personal data protection.

Last year, ENISA, which is referenced as a consultative body in the European Commission’s data breach notification rules, released a cryptographic guidelines report on securing personal data online. The new reports made available last week, “Algorithms, key size and parameters” and “Study on cryptographic protocols” build upon the 2013 study.

Data EncryptionThe first report is a technical document designed to help those who design and implement cryptographic solutions for commercial organizations. Compared to the previous report on cryptographic protocols, this new study also includes information on side-channels, random number generation, and key life cycle management. The report analyzes cryptographic primitives and schemes and attempts to assess whether or not they are suitable for use today and in the future.

The second report is designed to help decision makers in governments and corporations when it comes to choosing the types of protocols they use for protecting personal data. According to ENISA, the main problem with many cryptographic protocols is that they were created many years ago.

“Thus cryptographic protocols suffer more from legacy issues than the underlying cryptographic components. The goal should be to work towards a better cryptographic protocol infrastructure which does not exhibit such problems,” the report reads.

The list of recommendations for researchers and organizations includes the development of cryptographic and security protocols by cryptography experts rather than networking and protocols experts, and the creation of automated tools that can be used to verify the implementation of a protocol to ensure it meets security requirements. ENISA also advises against the “optimization” of well-known protocols for achieving specific application needs since even minor changes can have a negative impact on security.

“What is highlighted is the need for certification schemes in all phases of the technological life-cycle. ’Security by design or by default’ built in processes and products, are basic principles for trust,” said Udo Helmbrecht, ENISA’s executive director. “Standardising the process is an essential element in ensuring the correct application of the data protection reform in the service of EU’s citizens and its internal market. ENISA’s guidelines strive to provide the correct framework in securing online systems.”

Advertisement. Scroll to continue reading.

 

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...