Perimeter
2/13/2013
04:50 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Symantec/VeriSign Expands Encryption Options For SSL Digital Certificates

Elliptic Curve Cryptography (ECC) algorithm, Digital Signature Algorithm (DSA) both now options for SSL sites in addition to RSA encryption

Symantec's Website Security Solutions Group -- formerly VeriSign -- today announced that it will begin offering multiple encryption options, with support for the Elliptic Curve Cryptography (ECC) algorithm and Digital Signature Algorithm (DSA) in its certificates in addition to standard RSA encryption.

The goal is for stronger encryption options for digital certs as well as better performance options for server environments that can't handle larger key sizes, according to Symantec. The new offerings give SSL customers the option of running either RSA, DSA, or ECC encryption in a cert, or multiple certificates for each encryption type to beef up website security, according to Symantec.

Quentin Liu, senior director of engineering at Symantec, says the 256-bit ECC, which is equivalent to 3072-bit RSA encryption, provides an overall higher level of security than standard RSA encryption, and the ECC-256 key is 10,000 harder to crack than an RSA-2048 key, according to internal testing data. ECC-based certificates also can support more simultaneous connections and users with lower latency than RSA-based ones, the tests found.

"No. 1, it's stronger security, and the second big advantage from the server side is [when] using ECC, there are a lot of computational benefits," Liu says. "You're not having as much infrastructure dedicated on the server side," he says. And there's a faster download on the client side: "ECC outperformed RSA in time to deliver to the end user" machine in the tests as well, he says.

RSA encryption on websites will jump from 1024- to 2048-bit on Jan. 1, 2014, when new NIST requirements take effect, but there are some worries that the increased key size will hamper server loads and simultaneous connections. Liu says Symantec is offering this "algorithm agility" now to help customers test the effects of the new algorithms. DSA is a 2048-bit National Security Agency-developed encryption algorithm used as an alternative to the current RSA-standard one.

Encryption expert Bruce Schneier, CTO for BT Counterpane, says ECC is more about efficiency, not stronger security. "All public-key algorithms are as strong as their key lengths, and all take variable length keys. ECC gives equivalent strength for a shorter key length, which is where the efficiency improvements come from," Schneier says. "Like all public-key algorithms, the key length determines the security."

Meanwhile, Taher Elgamal, one of the inventors of SSL, says a multi-algorithm SSL certificate is good news security-wise. "The big thing here is the mention of a multi-algorithm SSL certificate. That means that if one algorithm is broken, then the certificate will still be valid with the other algorithm. We have been advocating this for many years," Elgamal says.

[Following breaches at Diginotar, Comodo, and RSA, digital certificate technology has been deeply tarnished. Here are five ways to shine it up and make it work for your organization. See Salvaging Digital Certificates .]

Symantec is offering ECC and DSA in its SecureSite Pro and SecureSite Pro EV products.

"The use of ECDSA is the most logical one since these are now standard algorithms even in the U.S. government Suite B algorithm set. The experiences with the RSA algorithm key-generation issues in the field will likely be better when we use ECDSA -- I think this is a positive move for the industry," Elgamal says.

Symantec says it has partnered with Google, Akamai, AT&T, Citrix, F5, HID, Juniper, Opera, and Red Hat to speed adoption of the ECC encryption algorithm. "We believe in constantly furthering Web security, which is why Chrome supports Elliptic Curve Digital Signature Algorithm (ECDSA) on all modern operating systems," said Adam Langley, software engineer at Google.

Symantec also launched new certificate services, including a cloud-based CA management service that creates a private key that's used once: It's signed and then destroyed, says Robert Hoblit, senior director of product management at Symantec. "Each application has a unique signature with it, and you revoke certificates with a scalpel approach," he says, "[unlike] today, when you end up having to revoke a certificate associated with a block of applications."

More details on the Symantec digital certificate services are available here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
2/14/2013 | 6:04:32 AM
re: Symantec/VeriSign Expands Encryption Options For SSL Digital Certificates
At any cost i wont prefer to go with Symantec, i have faced so many serious problem with it, again i dont wanna to face such situations!
Presently am using comodo!-á
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

CVE-2014-6080
Published: 2014-12-18
SQL injection vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.