Cryptography for Network and Information Security

Previous Topic Next Topic

Strength of the Security Protocols

Cryptography-based security technologies are implemented by using security protocols. For example, secure mail systems can be implemented by using the S/MIME protocol, and secure network communications can be implemented by using the IPSec suite of protocols. Likewise, secure Web communications can be implemented by using the TLS protocol.

Standards for security protocols, however, whether proprietary or open standards, often contain weaknesses or limitations that attackers can exploit (for example, to launch denial of service attacks). Even the best implementations of protocol standards contain the weaknesses and limitations that are inherent in the standards. Furthermore, protocol standards usually enable support for weaker cryptography by design. For example, the TLS protocol enables confidential communications to default to weak encryption to support government-imposed export restrictions that have been placed on cryptography.

In general, you can reduce the risk of weaknesses or limitations in security protocols by doing the following:

© 1985-2000 Microsoft Corporation. All rights reserved.