Give up on trying to do it all yourself and leave itto the experts.
Encryption is a core tenet for cybersecurity. Attackers can't steal data that's encrypted. No matter what Hollywood says, there's no way for a hacker to get through one layer of good encryption, much less "several layers of encryption."
Related: Why Google Cloud Turned to AMD to Solve for Runtime Encryption
But encryption comes with a lot of challenges.
In a survey last fall by the Cyber Security Competency Group, 66 percent of respondents said that the management of encryption keys was either a "big" or "medium" challenge for their companies.
Related: Quantum Computing Doesnt Threaten Good Encryption--Yet
Managing keys across multiple clouds was an even bigger challenge.
In a similar study by Ponemon Institute and Encryption Consulting last year, 60 percent of respondents said that key management was "very painful."
The top reason for the pain? Knowing who's in charge of all the keys. Other pain points include lack of skilled personnel and isolated or fragmented key management systems.
Meanwhile, encryption is evolving, and keeping on top of all the encryption algorithms is a challenge. Encryption involves some heavy-duty math. It's easy to make a mistake.
Within the next decade, respondents expect to see mainstream enterprise adoption for new approaches like multi-party computation, homomorphic encryption, and quantum algorithms.
As with any security technology, encryption is a constant game of cat and mouse. Attackers try to find vulnerabilities in algorithms. To keep up, defenders improve the algorithms themselves, strengthen how they are implemented, or increase the length of encryption keys.
That means any long-term encryption strategy has to allow for the possibility of upgrading either the algorithms or the keys.
Consider for example servers managing internet communications. To encrypt a message both the sender and the receiver have to agree on what encryption method and key length they are using, said Mike Sprunger, senior manager of cloud and network security at Insight.
"When those servers are deployed, they have a list of algorithms ranked from most desired to least desired and they will negotiate to find the highest-level match," he told DCK.
Unfortunately, those lists can get out of date, he said. "Often, when servers are deployed, they're never touched again."
The one bright side here is that online communications are ephemeral. Keys are created, used, and immediately discarded.
When it comes to long-term storage, however, those keys sometimes have to be good for years. Some companies have business or regulatory requirements to keep data for a decade or longer.
If the encryption becomes outdated or the keys themselves are compromised data centers have to decrypt all their old data and re-encrypt it again with new, better encryption.
"A good practice is to rotate keys regularly," said Sprunger.
This can easily become an administrative nightmare if a data center operator is doing it alone.
"The good vendors have a mechanism for going through and recycling and replacing keys," he said.
If anything goes wrong and keys are lost, so is the data.
Encryption also plays a role in generating the certificates used to digitally sign and authenticate systems, users, and applications. If those certificates expire, get lost, or get compromised, companies could lose access to their applications or attackers can gain access.
"Most organizations do not do a good job managing that," said Sprunger. "And if they don't manage the certificates properly, they run the risk of shutting down their organization. I recommend that if they're not good at managing certificates, they go to a third-party provider."
If encryption is handled by hardware, upgrading can be a particular challenge for data centers that have opted to buy and maintain their own equipment.
Hardware acceleration can result in both speed and security improvements, but the hard-coded algorithms can also become old and obsolete.
"Now I've got to go back in and replace equipment to get a different algorithm or a bigger key size," said Sprunger.
On the other hand, if there's a particular system that has embedded hardware-based encryption, like an encrypted drive, then when the devices are replaced the new ones will automatically have the newer and better encryption in them.
"That will be a fairly painless upgrade," said Tom Coughlin, IEEE fellow and president of Coughlin Associates.
With software-based encryption that encompasses multiple systems, upgrades can be a bigger challenge.
"There may be issues, depending upon how many of these exist and how much they depend upon each other," he said.
When choosing encryption vendors, data centers should look for those that are FIPS 140-2 compliant, said Insight's Sprunger, senior manager of cloud and network security at Insight.
Getting this certification is difficult and expensive, involving third-party security reviews, but is a federal mandate for government contracts.
"Having been a director of technical engineering for a company that built encryption appliances, it's an arduous process," he told DCK. "But table stakes."
Any vendor should be able to respond right away to questions about compliance, he said.
There are many vendors and organizations working on new encryption technologies and creating standards required to ensure that we're all moving in the same direction. Data center managers looking to buy equipment that will set them up for the future particularly the quantum future will have to wait for both technologies and standards to emerge.
The picture is a little bit clearer, for now at least, when it comes to symmetric encryption. That's when the same key is used to both lock and unlock the data such as when a company stores backups.
To keep data secure for a year or two, current 128-bit encryption is enough, said Simon Johnson, senior principal engineer at Intel.
"If you're looking to keep secrets beyond 15 to 20 years, then folks are starting to recommend at least 256 bits," he told DCK. That'll keep us secure even when the first wave of quantum computers gets here.
Fortunately, today's chips can support that level of encryption, Johnson said. "The AES (advanced encryption standard) operations are there for doing that. It's just a matter of changing your software to go those lengths."
Asymmetric encryption, where one key is used to encrypt a message and a different key is used to decrypt it, is a bit more challenging. This is the type of encryption used for communications and is also known as public key infrastructure.
The next stage of evolution of this type of encryption is still up in the air, he said.
"We're still waiting for NIST (National Institute of Standards and Technology) and the academic world to really focus on providing mechanisms that will do asymmetric encryption in the post-quantum world," he said. "We're waiting for standards. Not just Intel the world is waiting for standards. There's no post-quantum standards in that space."
But creating new encryption algorithms, testing them, developing standards, getting industry buy-in, and then deploying them will take years. And that's if the new algorithm fits into the protocols that are in place today.
"But who knows what these new algorithms will look like," he said.
For example, moving to elliptic curve algorithms, one of the early favorites for quantum-proof encryption, would be a ten-year horizon, he said.
He suggests that data center managers looking ahead should first of all move to 256 encryption to protect storage.
And for asymmetric encryption used in communications, larger key sizes should provide adequate security for the intermediate future, he said.
"So, five to eight years," he said. "Though nobody knows when this mysterious quantum computer is going to appear."
Read more:
Managing Encryption for Data Centers Is Hard. And It Will Get Harder - Data Center Knowledge
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]