RED/BLACK concept: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
 
Line 8: Line 8:
Different organization have differing requirements for the separation of RED and BLACK fiber optic cable. RED/BLACK terminology is also applied to [[key (cryptography)|key]]s.<br>
Different organization have differing requirements for the separation of RED and BLACK fiber optic cable. RED/BLACK terminology is also applied to [[key (cryptography)|key]]s.<br>
<br>
<br>
'''BLACK keys''' have been encrypted with an '''Key Encryption Key''' (KEK) and are therefore '''benign'''.<br>
'''BLACK keys''' have been encrypted with an '''Key Encryption Key''' (KEK) and are therefore considered benign.<br>
<br>
<br>
'''RED keys''' are not encrypted and must be treated as highly sensitive material.<ref>{{citebook|title=Designing Storage Area Networks|author= Tom Clark|year=2003|publisher=Addison-Wesley Professional |url= http://books.google.com/books?vid=ISBN0321136500&id=xKikTYXkXZEC&pg=PA483&lpg=PA483&ots=4x6i_DAdqy&dq=%22red/black+concept%22&ie=ISO-8859-1&output=html&sig=eBFfATUP0XqF-D4GtDD7HckpHe8|id=ISBN 0321136500}}</ref>
'''RED keys''' are not encrypted and must be treated as highly sensitive material.


==See Also==
==See Also==

Latest revision as of 16:06, 14 June 2007

Abstract

The RED/BLACK concept refers to the careful segregation in cryptographic systems of signals that contain sensitive or classified plaintext information RED Signals from those that carry encrypted information, or ciphertext BLACK signals.



In NSA jargon, encryption devices are often called blackers, because they convert RED signals to BLACK. TEMPEST standards spelled out in NSTISSAM TEMPEST 2-95 specify shielding or a minimum physical distance between wires or equipment carrying or processing RED and BLACK signals.

Different organization have differing requirements for the separation of RED and BLACK fiber optic cable. RED/BLACK terminology is also applied to keys.

BLACK keys have been encrypted with an Key Encryption Key (KEK) and are therefore considered benign.

RED keys are not encrypted and must be treated as highly sensitive material.

See Also

References

  • NSTISSAM TEMPEST 2-95