accesskey _ mod _ content

The new guide CCN: Cryptology of employment in the NHIS

  • Hearing
  • Print To PDF
  • Share

11 may 2015

In this guide of the Centre National Cryptologic updates the cryptographic algorithms accredited for use only in the national security, nhis, when its characteristics and requirements may be required.

The CCN-CERT has made public the updating of the guide CCN-STIC 807 Cryptology of employment in the national security in a very comprehensive document which presents cryptographic algorithms that have been accredited for use only in the NHIS, when its characteristics and requirements may be required.

The principal update of the guide is the elimination of the functions summary SHA-1y RIPMED-160 from january 2017. The functions summary are used in the processes of electronic signature, key derivation, integrity of documents, etc. Their safety has been undermined by the emergence of new algorithms for cryptanalysis and increasing capacity. The computational CCN, in accordance with the policies implemented by international companies like Google, Mozilla, Microsoft, etc. and other countries, has determined that the sha-1 algorithm will not be accredited as of january 2017.

In addition been updated key lengths allowed for the different levels of security of the public key algorithms, thereby increasing the length in accordance with the computer advances.

The Guide, prepared by the National Centre, collects Cryptologic algorithms accredited (symmetrical encryption, protocols of agreement, asymmetric algorithms key functions and summary) and the certified products. It supports an extensive presentation of security measures such as identification and authentication, protection of confidentiality, authenticity and integrity or encryption of information.

Other security measures included are the key protection critográficas, electronic signature or time stamps.

Original source of news (Opens in new window)

  • Security and protection of Data
  • Identity and electronic signature