Develop and implement cryptographic methods
Overview
This standard is about developing and implementing cryptographic methods.
Cryptography engineers manage the communications security of an organisation. They secure computer system data sharing by creating algorithms and ciphers to encrypt data. They also analyse existing encryption systems to identify weaknesses and vulnerabilities.
Developing and implementing cryptographic methods involves creating and testing cryptography techniques and implementing encryption solutions to protect organisational data and provide secure data communications. This includes the integration of cryptography into system development processes, and implementing algorithms and ciphers to avoid security gaps. They provide advice and guidance on where cryptography can be used. This also includes responsibility for being the key custodian for any cryptographic keys held.
This standard is for those who need to develop and implement cryptographic methods as part of their duties.
Performance criteria
You must be able to:
- Evaluate existing organisational communications protocols to identify vulnerabilities
Design proof of concept cryptographic tools that can be evaluated for security compliance approval
Manage the lifecycle of cryptographic tools and keys from design to retirement in line with organisational procedures
- Implement approved cryptographic protocols and algorithms in line with organisational requirements
- Provide troubleshooting and technical support to resolve cryptography problems
- Plan and schedule when cryptographic keys are replaced in line with organisational procedures
- Coordinate staff designated as Key Custodians in line with organisational procedures
- Act as a cryptographic key custodian in line with organisational procedures
Communicate with third parties to arrange secure key distribution in line with organisational procedures
Arrange with system owners to implement key changes in line with organisational procedures
Process SSL (Secure Sockets Layer) web encryption security certificate requests from internal customers in line with organisational procedures
Maintain, track, and follow expiry of SSL certificates in line with organisational procedures
- Support security compliance audits by collating and presenting cryptographic evidence in line with auditor requests
- Produce cryptography technical design specifications and documentation in line with organisational procedures
Knowledge and Understanding
You need to know and understand:
- The basic principles of cryptography and its use in a networked systems environment
- How to create and decipher codes and encryptions that keep data and communications secure
- Different authentication methods including as passwords and certificates
- The difference between encoding and encrypting
- How to develop and test ciphers and algorithms
- How cryptographic security keys work and function to protect data in transit and rest
- How to evaluate existing communications protocols to identify vulnerabilities
- How to identify and mitigate potential risks associated with implementing cryptographic algorithms
- How to develop proof of concept cryptographic tool designs
- The steps involved in managing the lifecycle of cryptographic tools and keys
- The differences between symmetric and asymmetric cryptography
- The main cryptography techniques including Symmetric Encryption Asymmetric Encryption Hashing
- Common encryption protocols and software applications used to support these
- Industry standard communication protocols
- What is meant by Quantum-safe cryptography
- How to design and evaluate modifications to common communication protocols to improve security
- Common industry standard cryptographic algorithms including DES, 3DES, RSA, RC4
- How to design, implement and evaluate new cryptographic protocols and algorithms
- The steps involved in developing prototype implementations of quantum-safe communications protocols
- How to schedule deployment and configuration of cryptographic tools and equipment
- The steps involved in providing troubleshooting and technical support to resolve problems
- How to plan and schedule when cryptographic keys need to be replaced
- The role of a cypher key custodian
- The importance of coordinating staff designated as Key Custodians
- The importance of communicating with third parties to arrange secure key distribution
- The procedures for working with system owners to implement key changes
- The role of SSL security certificates to evidence trustworthy web sites with encryption
- How to process SSL security certificate requests from internal customers
- The importance of maintaining, tracking SSL certificates following expiry
- The importance of supporting compliance audits by collating and presenting evidence as requested
- The legislation that applies to cryptography implementation
- How to produce cryptography technical design specifications and documentation