Perimeter
2/13/2013
04:50 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Symantec/VeriSign Expands Encryption Options For SSL Digital Certificates

Elliptic Curve Cryptography (ECC) algorithm, Digital Signature Algorithm (DSA) both now options for SSL sites in addition to RSA encryption

Symantec's Website Security Solutions Group -- formerly VeriSign -- today announced that it will begin offering multiple encryption options, with support for the Elliptic Curve Cryptography (ECC) algorithm and Digital Signature Algorithm (DSA) in its certificates in addition to standard RSA encryption.

The goal is for stronger encryption options for digital certs as well as better performance options for server environments that can't handle larger key sizes, according to Symantec. The new offerings give SSL customers the option of running either RSA, DSA, or ECC encryption in a cert, or multiple certificates for each encryption type to beef up website security, according to Symantec.

Quentin Liu, senior director of engineering at Symantec, says the 256-bit ECC, which is equivalent to 3072-bit RSA encryption, provides an overall higher level of security than standard RSA encryption, and the ECC-256 key is 10,000 harder to crack than an RSA-2048 key, according to internal testing data. ECC-based certificates also can support more simultaneous connections and users with lower latency than RSA-based ones, the tests found.

"No. 1, it's stronger security, and the second big advantage from the server side is [when] using ECC, there are a lot of computational benefits," Liu says. "You're not having as much infrastructure dedicated on the server side," he says. And there's a faster download on the client side: "ECC outperformed RSA in time to deliver to the end user" machine in the tests as well, he says.

RSA encryption on websites will jump from 1024- to 2048-bit on Jan. 1, 2014, when new NIST requirements take effect, but there are some worries that the increased key size will hamper server loads and simultaneous connections. Liu says Symantec is offering this "algorithm agility" now to help customers test the effects of the new algorithms. DSA is a 2048-bit National Security Agency-developed encryption algorithm used as an alternative to the current RSA-standard one.

Encryption expert Bruce Schneier, CTO for BT Counterpane, says ECC is more about efficiency, not stronger security. "All public-key algorithms are as strong as their key lengths, and all take variable length keys. ECC gives equivalent strength for a shorter key length, which is where the efficiency improvements come from," Schneier says. "Like all public-key algorithms, the key length determines the security."

Meanwhile, Taher Elgamal, one of the inventors of SSL, says a multi-algorithm SSL certificate is good news security-wise. "The big thing here is the mention of a multi-algorithm SSL certificate. That means that if one algorithm is broken, then the certificate will still be valid with the other algorithm. We have been advocating this for many years," Elgamal says.

[Following breaches at Diginotar, Comodo, and RSA, digital certificate technology has been deeply tarnished. Here are five ways to shine it up and make it work for your organization. See Salvaging Digital Certificates .]

Symantec is offering ECC and DSA in its SecureSite Pro and SecureSite Pro EV products.

"The use of ECDSA is the most logical one since these are now standard algorithms even in the U.S. government Suite B algorithm set. The experiences with the RSA algorithm key-generation issues in the field will likely be better when we use ECDSA -- I think this is a positive move for the industry," Elgamal says.

Symantec says it has partnered with Google, Akamai, AT&T, Citrix, F5, HID, Juniper, Opera, and Red Hat to speed adoption of the ECC encryption algorithm. "We believe in constantly furthering Web security, which is why Chrome supports Elliptic Curve Digital Signature Algorithm (ECDSA) on all modern operating systems," said Adam Langley, software engineer at Google.

Symantec also launched new certificate services, including a cloud-based CA management service that creates a private key that's used once: It's signed and then destroyed, says Robert Hoblit, senior director of product management at Symantec. "Each application has a unique signature with it, and you revoke certificates with a scalpel approach," he says, "[unlike] today, when you end up having to revoke a certificate associated with a block of applications."

More details on the Symantec digital certificate services are available here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
2/14/2013 | 6:04:32 AM
re: Symantec/VeriSign Expands Encryption Options For SSL Digital Certificates
At any cost i wont prefer to go with Symantec, i have faced so many serious problem with it, again i dont wanna to face such situations!
Presently am using comodo!-á
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1774
Published: 2015-04-28
The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted HWP document, which triggers an out-of-bounds write.

CVE-2015-1863
Published: 2015-04-28
Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.

CVE-2015-3340
Published: 2015-04-28
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.

CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.