- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
Network World - Next month the National Institute of Standards and Technology (NIST) plans to put out for public review its draft for a new government encryption standard that, when finalized, is going to compel federal agencies with older websites to replace them.
NIST's current standard calls for federal agencies to support Transport Layer Security 1.0 encryption, but the updated version is going to require TLS 1.1 and 1.2, says Tim Polk, computer scientist and group manager for NIST's cryptology technology group. Since websites and browsers support secure communications through TLS, government agencies that haven't already moved to TLS 1.1 and 1.2 need to be aware that they are going to have to in the future, Polk advises.
The new federal government standard, when finalized -- this typically occurs within six months of the release of a draft for public review -- will make it clear there's a time frame that websites and browsers should be up to date. On new requirements.
"Older Web servers probably don't support TLS 1.1 and 1.2," says Polk. He adds that there are probably some agencies that will need to have to acquire new Web server products to support up-to-date TLS. NIST's document expected to be published in September on all this is tentatively entitled "Guidelines for Selection, Configuration and Use of Transport Layer Security Implementations."
The phrase "SSL" technology rather than "TLS" is still often heard, although SSL is a misnomer harking back to the old tech days of Netscape's SSL invention. TLS implementations in older Web servers and browsers are more subject to certain cyberattacks, and that's one main reason to support up-to-date TLS, Polk says.
Other guidance is anticipated in the NIST proposed encryption standard. For instance, "We will require support for certain TLS extensions," including the Extended Validation Certificate guidelines, says Polk.
EV certificates issued by certificate authorities (CAs) are preferred over digital certificates issued otherwise because EV certificates require far more extensive verification of the organization receiving them, and the issuer issuing them that other types of certificates.
The EV certificate standard was devised by the industry group CA/Browser Forum. The CAB Forum is undergoing some turbulent change as its members, including Microsoft, Google, PayPal, Symantec and Apple, among others, make organizational changes, including hashing out decisions related to intellectual-property rights each own pertaining to public-key infrastructure.
"EV certificates have higher levels of assurance associated with them, that they're issued to the right people." says Polk. "We support efforts to move the state-of-the-art forward. We believe for some applications that are important, there is value in it."
NIST also wants the federal government to move forward with what is called "mutually authenticated TLS" in which the server presents you with a way to log in via the user's certificate. "It's not done much today," says Polk. "It's not because most users don't have crypto keys of their own." The federal government has the potential to take advantage of this higher security because of the Personal Identity Validation (PIV) cards that are issued to government employees.