Approved For Release 2005/06/09: CIA-RD
F I N A L R E P O R T
BY
COMPUTER SECURITY TECHNICAL PANEL
DEFENSE SECURITY BOARD STEERING GROUP
FOR
TASK FORCE ON COMPUTER SECURITY
July 15 1568
May be downgraded to SECRET upon removal of appendix
NSA, OSD reviews completed
-
v.R
~~ Nyh61 v! ~`~ ~N .Y
Copy __1 r __ of _----- copse:,.
ILLEGI
ILLEGI
Approved For Release 2005/06/09 CIA-RtAR MMOOM2D6a G
417
Appro+ied'For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
SECTION 1 FOR OFFICIAL USE ONLY
INTRODUCTION, RECO711 ,1NDP TIONS AND SUiivu^ARY
1.1 The Background of Report .................................1
1.2 Recommendations ..........................................1
1.3 Sum nary of the Report .....................................2
1.4 Acknowledgements .........................................2
SECTION 2 CONFIDENTIAL
TECHNICAL POLICY INTERACTIONS
2.1 Purpose ..................................................1
2.2 Authentication ........................................... 1
2.3 Software Controls ........................................6
SECTION 3 SECRET
AUTOMATION OF TIx2 MULTILEVEL SECURITY
CLASSIFICATION AND CONTROL SYSTEM
3.1 Introduction .............................................1
3.2 Security Structure .......................................8
3.3 Examples .................................................11
3.4 General-Discussion .......................................20
SECTION 4 UNCLASSIFIED
ST kTE-OF-ZriE-ART PRIVACY SYSTEMS
4.1
4.2
Introduction ....................... ....................1
Authentication ...........................................4
4.3 Protection ............................................... 5
4.4. Certification ............................................12
4.5 Summary .............. .... .......... ...................15
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
SECTION 7
SECRET
SECURE SYSTF `1S
5.1
introduction :..........................................
5.2
Potential Threats and Countermeasures ...................2
5.3
Techniques for Protecting; a System ......................4
1
5.~
File Security ...........................................14
5.,5
Certification ...........................................19
5.6
Research Recommendations ................................21
DETAILED DISCUSSION AND RECOi ENDATIONS FOR CRYPTOLOGIC RESEARCH
Introduction ............................................1
Machine Environment Assumed ............................2
Method of Operation .....................................2
.Establishment of Cryptovariables ........................ 3
User-Private Address Space .............................. 5
Problems of IED Design ..................................7
Transencipherment .......................................8
Secondary Storage Encryption Device .....................8
Line Encryption .........................................9
Control and Flow of Keying Information ..................9
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
Approved For Release 2005/06/09 : CIA-RDP71 R0051 0A000200130003-7
~o?lo~ain is a list of members of the Technical Panel
Sci inrc L. Glaser - Chairman
Case Western Reserve University
Arthur A. -usnkin - Secretary
Massachusetts Institute of Technology
James P. Anderson
Anderson and Company
Edward H. Bensley
The MITRE Corporation
Charles R. Blair
Associated Universities, Inc.
Harold M. Jayne
Executive Office of the President
I ex officio) - Chairman, Policy Panel
National Security Agency
Lawrence G. Roberts
Advanced Research Projects Agency
Jerome H. Saltzer
Massachusetts Institute of Technology
Willis H. Ware (ex'officio) - Chairman, Task Force
The R ND Corporation
P.L. 86-36
STAT
Approved For Release 2005/06/09 ; CIA-RDP71 R00510A000200130003-7
Approacedfor F elepke g x/10 69.:SJ aP1g'_k ~? 10 ~02~D 30003-7
Section i . 'Introduction, Recommendations and Sunsmary
ihle Backgrowid of the Repo
In late 1967 a Task Force was established under J'LRPA at the behest
of DD:P:..: - Task Force was to determine the problems of
_- ~,. The purpose sn ., of this ~
creating secure time sharing systems. As a part of this Task Force the technical
panel was established. This panel met quite frequently during late 1967 and into
1968. This work culminated in a workshop being held at the Communications Re-
search Division of the Institute of Defense Analysis at Princeton, New Jersey,
from March 28-30, 1968. The following report is the output of this workshop.
1.2 Recommendations
The bulk of this report will be concerned with various technical
facilities that can and must be included in order to make a time sharing system
secure. The purpose of this set of recommendations is to indicate those research
areas that must be pursued in order to guarantee this security. It should be
further emphasized that no attempt has been made to delineate either the cost of
the various research tasks or to indicate within this report who should be tasked
with the various areas of research. Rather, the specific research programs are
delineated within other sections of this report and should be self-evident as to
the cognizant agency. The following are the four primary research areas that
should be pursued. The first two can be considered to be short term, while the
second two are long term.
1. Security structure language. The design of the security
structure language should be completed and its implement algorithm defined.
This package to be submitted for review and approval at the earliest possible
date (see section 3).
2. Consistency checks. A rapid early analysis should be made of
the possibility of incorporation hardware consistency checks in equipment
supplied by major manufacturers today (see section 4).
3. Systems certification. A research program should be delineated
for the problem of determining the feasibility of more automated, hence exhaustive,
certification of the integrated hardware/software system with due regard to its
operational environment (see sections 4 and 5).
4. Cryptologic research. A program for the necessary cryptologic
research to be initiated as soon as possible in order to facilitate the early
availability of secure time sharing systems (see section 5 and the Appendix).
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
Approved For Release 2005/06/09: PIA-RDP71 R0051 OA000200130003-7
S-w:a cry of the report
The remainder of this report is divided into four sections plus
an aopo'nd .x. Section 7 of this report is concerned primarily with the interaction
bct:'een the tecl-nical and the procedural, doctrinal, problems. It deals with
certain facilities that are expected to be present in order to make the system
operate properly from the doctrinal standpoint. Section 3 concerns itself with
a definition of a security structure language and is aimed primarily at a view
of the system.from the standpoint of the security officer. What is contained in
this section can best be described as a generalization for what must be implemented
in order to facilitate the present structure of the security system of the United
States Government. Section 4 primarily concerns itself with state of the art
techniques with regard to the implementation of secure time sharing systems. As
will be pointed out in this section, true secure time sharing systems are
currently beyond the state of the art, but this section does concern itself with
an attempt at making privacy systems and gives guide lines to facilitate the de-
sign of such systems in the near term. Section 5 concerns itself with the longer
term secure time sharing systems and discusses in some detail the two techniques
that are currently known by which time sharing systems can be made to be secure.
The appendix gives greater detailed discussion on the area of the cryptologic re-
search. It was felt advisable to separate out this kind of detail from the rest
of body of the report in order to keep the security level of the entire report
somewhat lower than what otherwise would be necessary.
1.4 Acknowledgments
It is impossible to list all of the contributors to this report,
however, it is fitting here to give particular thanks to the members of the
technical panel, the guests of the panel at our various meetings and particularly
at the meeting at Princeton, and further to the personnel of the Communications
Research of the Institute of Defense Analysis for acting as hosts and giving us
such fine accommodations during the extremely intensive three days of workshop.
Finally, it would be very remiss not to give particular thanks to the various
secretaries of the members of this panel who have given unstintingly of their
time and services to make this report possible.
Approved For Release 2005/06/09: CIA-RDP71 R0051 OA000200130003-7
Approved r?1s$^2bQrQ6fi~~9Cs\~QP'?~'FQ~5'IO000200130003-7
2. TECHNICAL/POLICY TNTER CT TOMS
2.1 Purnose..
Although much of the material in this section is covered in other
sections of this report, its treatment here-is from the stand point of the
procedural problems involved rather than the technical feasibility: The
reader desiring a cursive view of the technical problems may glean much of
the:information by a parusal of this section only. However, the reader
should remember this is primarily a procedural view of the technical problems
and therefore is an overview. More detailed coverage is contained in the
following sections of this report and the appendix.
2.2 Authentication
It is suggested that multi-access resource sharing systems have
significant advantages. To achieve these advantages it is necessary to
have one or more computer complexes, many remote terminals and an even
larger number of individuals who have controlled access to the system,
the processing which the system can accomplish, and the information
stored within it. The objective of security in the system is to assure that
no classified information is disclosed to any individual not formally
authorized to receive it. Since it is to be expected that not all individuals
(users) at any one remote terminal will require access to the same material,
it is necessary to employ a means by which the user can be uniquely identified
to the computer system to assure that he only gains"access to the information
for which he is authorized. A password system using one-time material which.
is supplied individually to each user will serve this purpose. This
Appro ` ~ ' ~ `9 O O 1 0051OA000200130003-7
Approved;Pbi Release 2.00'M'6/49~ 1A4RbP7fF*YO 1OA000200130003-7
password authenticates the user to the system and is the key which unlocks
the system to him up to the predetermined access limits. An authentication
must always be required at log-on and may also be required upon demand.
by the system while the user has control of the terminal-in order to
assure the system that the original user is still in control. This
re-authentication procedure may be invoked on the basis of the amount of
time elapsed since the last authentication and/or upon the completion of
a specified number of transactions as determined by the system design.
The clearance of a remote terminal in a switched communications
system will not necessarily be obvious to the central facility. This
will require that a means be provided for authenticating a specific terminal
to the control facility to assure that only information authorized to be
handled by that terminal is actually delivered to it by the central facility.
Also the user must know that the distant central facility he has reached
via switched communications system is indeed the terminal authorized to
receive the information he is about to transmit. If the communication
links from the remote terminals to the central facility are secured by
crypto-equipment utilizing unique keys for each link then identification
of the key will authentically establish the identification of the terminal
to the central facility and further authentication may or may not be necessary.
If the remote terminal is a part of a multi--holder cryptonet, a unilateral
authentication using one-time passwords is required. The can be accomplished
by an appropriate challenge-reply pair being exchanged between the central
facility and the remote terminal. At the remote terminal appropriate
-Approved For Release 2005/06/09 CIA-RDP71 R0051 OA000200130003-7
r' `,,, . ^?. i~ .~r3 ?T 3 J t. .:cam
Approved For Release 2005/06/09 : CIA-RbP11 R00510A000200130003-7
passwords will be issued to the user by individual responsible for the
security control of the terminal. The user must give unused passwords
protection equivalent to the highest level information thab could be
accessed with them.
It will be necessary for computers to transmit information to other
computers in some systems. The provision of the preceding paragraph
apply for establishing the authenticity of the computers one to the
other over either point-to-point or switched communications systems.
In some systems a user operating at a remote terminal which is assigned
to one computer facility may want to access information and/or run a job
on another computer facility. This is permissable and may be done by the
user authenticating himself to his own computer by the previously described
techniques. The first computer then passes to the second computer, over
their authenticated communications link, the information required by the
second computer to permit it"to determine the degree of access permitted
to the user.
2.2.2 Communications Link Protection
It has been stated elsewhere that all communications links passing
classified information will be secured by appropriate cryptographic equipment.
Assume that a communication link between two terminals has been established
and the cryptographic equipment is in synchronization. The link may or
may not also have traffic flow security depending upon its security
requirements. It is recognized that in any case information will not
actually be passing over the link at all times. This is true on either a
half-duplex or full-duplex link. In the case where the cryptographic
3
Approved For F elease 2005/06/09: CIA-RDP71 R0051 OA000200130003-7
Approved For 'Release``~2'065LIY6/99-:-trA-1 DP71 R00510A000200130003-7
equipment is stepping independently of the plain text input information,
there may be a danger of spoofing.* For example, a user could log on to
the system, properly accomplish all the identification and authentication
procedures and then apuse. During this pause no enciphered plain text is
being transmitted over the link. In this situation it could be possible
to tamper with the link and introduce bogus plain text which will be
deciphered by the receiving terminal and treated as authentic plain text
information. The consequences of this action could range from mere
harassment to extremely serious. Files could be erased, programs changed,
etc., depending upon the rights and privileges established by the bona
fide transmitting terminal. This threat can be circumvented by proper
chice and/or application of the cryptographic equipment to the system
and must be accomplished as a part of the initial system design.
In the case of a half-duplex link operating in a switched communications
net where the same cryptographic key is held by all terminals and used for
the transmit and. receive function, there may be a threat to the system
due to physical capture of one terminal. User and terminal authentication
procedures discussed elsewhere will protect against the threat of the
captured terminal gaining access to the computer and causing system damage.
However, it would be possible for the captured terminal to tap the communi-
cations link between two other terminals in the same cryptographic net
and thereby receive any classified information passed over the link by
either of the other terminals. This threat exists in any secure co nuni-
`Spoofing: intelligent deception
Approved For Release-2005J
r--> ti's ?~ ~ .,.,
Approved For Fe1ea?5(gd9` CIEX=~2p'I}0'~A000200130003-7
cations system where there are many holders of the sOame key. It can
only be countered by keeping the number of holders of the same key to a
minimum and the ideal situation is to have no crypto nets of more than
two holders. Crypto-equipment could be located at the computer facility
which stored all the individual independent keys of each terminal upon
demand. Equipment with this capability does not now exist but is within
the current state-of-the-art and can be provided, possibly by modification
of equipment now in development but certainly by new development.
Approved Fob r 3;;A
! oAA000200130003-7
Approved Ft,' ee se 2005/06)DW:1 -RDP-71 2 b iO 000200130003-7
2.'~ Software Controls
2.3.1 Access Control-
Given that the identity of the user has been verified and his console
identified, the software system can look up the user clearance and that
of the terminal (console) in system directories. The system now has the
"user clearance", the "terminal clearance", and the clearance of any other
I/O devices accessible to the user's program such as tapes drives, readers,
printers, and other consoles.
2.3.1.1 Limiting Input and Output - Software traps should detect any
inputs which are identified as having a classification "greater" that
either the user clearance or the terminal clearance. Input faults should
cause a security violation alarm. Similarly, outputs to any device which
are classified "greater" than the terminal clearance or "greater" than the
user clearance should be omitted and.the fault logged.
2.3.1.2 Limiting Job Classification - The actual job run centrally in the-
computer should not be allowed to access information (programs and-data files)
which has a classification "greater" that the user clearance. This
limitation is dictated by the judgment that it is almost impossible to
guarantee that a, job cannot somehow downgrade information so as to permit
it to be output. However, exceptions are possible; e.g., an execute
only program which has been certified to always digest information so as
to produce an output of lower classification' than the source data.
1. System access to accounting and control files are excluded from this
restriction.
6
Approved For ,?ele se 005/ /0 C1ArRDP. 1 RA0a,1 0 A000200130003-7
I T7.
Approved Fb Rie_ 40 /6.1.Q# R Ff~1R ji1 4 000200130003-7
the terminal clear-
2.3.1.3 The job Clearance is not invited, ho lever, by
q.,
ance. A TOP S C v cle red ;person -J-h-- run a TOP SEC T job using a
SFCRE ' 'C'C rmi ll al i= her? no RfT _,,?,__ t~:_Ye v ere _O_ SFC~_ I/O to the console. He mi
direct the out-rut to TOP -SECR T printer. Such occurrences might be com-
mon for re:o initiated batch operations and no deception need be sus-
rectea since the user is cleared for the job.
2.3.1.4 Access Control '%atrix - The previous access control limitations
can be represented by a control matrix. The matrix should be read in the
form: User (device) clearance should be z to input (job, output) classifi-
cation.
Clearance:
User
I/O Device
in-out Classification
Job Clearance
Job Classification
>
Z:E
Z
Independent
*Except for certified execute
only programs
2.3.1.5 Denial of Access - The "User" urio interacts directly with the sys-
tem must not be allowed access to information related to the character of
the control systems arid/or files when access is denied under authentication
procedures. For exarmle, responses during authentication that provide such
info _~:ation include the following,-: You do not have the required clearance
file X correctly r. or "The
to access file X" or "You have not requested
classification of file X is Y". P. record of authentication failures will be
included in the system log and alarms will be provided to assure that the
security of the system is maintained.
Approved Forr$ Ie a 2Q 5/a6/Q .1A-R~gQ~71RQOP.1 Q X000200130003-7
tom, '1
7,
Approved Fob FIese 5051063.
i0,l,t `eF P711 F100200130003-7
2,3.1.6 Classification - Clearance Comparison.- Section 3 contains a
description of a language which informally describes the structure and
rules of clearances, special accesses, compartments, classification, etc.
Using a language of this form, the definitions needed for a particular
installation can then be compiled, creating a data structure. Utilizing
this data structure, compare and combine routines can make the somewhat
complex, determinations of whether a particular clearance grants access
to a classification and what "high water mark" classification results
from accessing information at several different levels of classification.
2.3.2 Restricted Operations
The threat to the security of the system is reduced in those cases
where the allowable functions of specific terminal or I/O devices are
limited by the system. These properties can be used, after adequate
certification, to support operations and procedures not otherwise available
to unrestricted devices. An example of a restricted operation maybe a
terminal limited by the system to the execution of one certified program
that performs some limited set of well defined operations and provides
output to another I/O device. In this example the terminal operator could
execute the program, without clearance for the data being processed.
Another example could be to limit a terminal to a specific set of input
functions only, in this case the operator could again operate at a lower
clearance level than the files being referrenced.
Approved; r jp9 - i4 F 71 q61 0A000200130003-7
{
Approved For .Retka 2U~5'~v6,1019 CIA4~601 RQQS a0200130003-7
2.3,3 Output Classification
To assist the user in protecting sensitive information, when a file
is created the computer will define the maximum composite classification
of the file to the user. This "high water mark" will be determined
algorithmically by consideration of the classifications of all files
referenced, programs utilized, and inputs utilized.* In case of a perman-
ent file, the user will be notified of this "high water mark" classification.
He will then be required to state that he certifies this classification,
upgrades it or downgrades it. If a downgrading (a less stringent classif-
ication) is certified, the system should audit this transaction for peri-
odic review. Possibly, downgrading authorization should be limited to
those users with write access to a file.
The reason for requiring the user to confirm or modify the computer
determined classification rather than specify his own is that the user may
not realize the totality of all file classifications referenced and most
likely has not reviewed the totality of the resultant file. Any analogy
with documents handling rules is dangerous since files are often large and
non-textual for which the user must determine the content by program testing
and/or scanning.
-Approved For Release 2005/06/09: CIA-RDP71 R0051..OA000200130003-7
._.. :.;i .. _, ..: ..._.~.%_ _,:u a ._ _,-.. ?_.........
Approved For R? a e. 0Q 061Q9 3 CIA- 7;1400 1 E A000200130003-7
2.3.4 1-!rite controls
Write access to files must be a function of the specific files and
the user. The write capability is not related to security specifically,
but is primarily a management function to provide file protection from
undesirable changes. The system must provide for these controls in the
file structure. The same controls should also apply to deletion of files.
The application of such controls increases the integrity of files.
Approved For Release 2005/06/0: CIA-RDP71 R0051 OA000200130003-7
Approved For Release 26d5/06%b9 CIA=1i)P7--R00510A000200130003-7
3. Ll l ~... .i01'i 0. l ult_level Secia_'ity
C1ass__ _ca ulu~_ and Control S~- ~te_.
'E ~i1a't mould permit a formal definition
o1 th S i"1C1..:re of the U. r. seCLu'rimay System for control O~ Clt S ified
i Y i r, . -~ - G. ..l _ ...i.,..i 41 r to :. y r - initial results
in the area u'_luer discussion and, as such, Is Qu_ to in' banal. It is
571. me Lbw op1e alreamv Clui fa =ailiar mica inc security sy s i:em .
!O1' de ,ailed v r.sion of this WO Will be needed for tie general reader
at errs t_n; to do the actual iileY:: r_tati on.
file basic multilevel security er ?- of ai1S'?.)erln" the
77 I,!?obl cones-s :;s
I O1_1_O'l?i1 ~J Q:.l `'. 's ion. Can an i_ dividual m'il,h a JC'J I'l.-!-cular clearance have
access to a aua ntGum Of Cla?8 't - ). 1. l
:,.i: ..~1.C#'._~.
en e-r
~ v
J v ..?_ G. n c this i i O't~__@:_. C_. S ~S G,2pel . clen t- of C07::pU'~ S S G27iS,
the int_'OC uct iU_1 of an a u-so !:ateC decision process requires a very formal
specification Of the decision ioles?. This section ariUresses itse_L?
-so one solution of that problem.
Because Oi the comric,,-Lty of the overall scheme for COiltrol_Liil
access -to classified defense infor^ationl, 1 may :)ell be that as no
ins ,L lla.tion is the full m ade of the security control ?.(Dp. ararus necessary.
Furthermore, as a matter of precat.ition, it would be, undesirabl to divulge
unnecessarily -co pro r ::iii; personnel the C..&.-ails of security control
r ethods. Therefore; our approach has been to conceive a sciiE e in vh:ic .
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
Approved For Release : d 10
[ ~TR1D '71 RO051 OA000200130003-7
O __1V O!. the security control OC~^., :L, .,r~."O
pr 1-2 ill be described
to a
orii 1 Cl :trance level (`ECFFT) . r!CL?over,
there SECU."1
_ ddi Xional e tLL ich are ?1o SS ~ Ta 1
a of y CO-t_ 'rOl L. ]i_ 1l _`ab_G
at the C1. ar i_Cr le"';
l of Cur acne 1e is such. as to pear. e
ilt local
_
seCU'_ ity' O: S _i.CC_ cle _ ed to all a: ropriate level to insert such Sul)rlo-en-ary
inf oio'_1 .
We propose to keep in a multi-access remote-terminal commuter
system, to IoaLcc]lii inIorr:'.a-tioil:
1. For each -use-r- a list o certain parameters rc1_ v2 i1
t O n
2. FO. each 'r' le a into certain access meters
relative to "G'_2^ 1610' i;c. ion contained in that. file.
3. For each ~erriiinal connected to 1-hie a list 0=
certain parameters relevant -L t,.
LO
Ike details of t=hese rame er S and how they are Used. is C?.e;re lone below.
vie have r=ace col-La--!-,u assuni -?ions arid defin_rio1!s as iollorls io1
the _ uroosc's o his gape
1. For L1nS.' c're ~c r'~ of the total Security control.
::~'s t,em ?ha1, may be of concern to a "_Lvdn insta.llatlon,
1'
t_1C s Cu a_i"'ty of \ O ' O ti1eY' S'~CilsiplC 0 Y/ cLt
that insta.lla io ~ must k r_or t,'_~e c'carol ete structure .
2. he ?ee to i i.OL'7 control on access v ill be verified by
e: ,illicit reference to a name c'hec-_, ordanu..zation check,
other che=ck, or combination of C'_^_ecks, etc . , as may be
recquired by security procedures. .his is in addition to
2
Approved For Release,-Z:O65/Q IO qA RI R' 1 R0051 OA000200130003-7
Approved For Release ~IAR@ 200510A000200130003-7
verification of the clearance status of the user requesting
access to a given file.
3. clearance is associated with either a user or a terminal;
a classification is associated with ka file oft information.
1+. The word "accesses", when used below as part of the security
structure langx.;e, is defined to be semantically equivalent
to "permits access to information labelled as".
j. The phrade vatioiial Clearance is taken to mean the normal
defense clearances of TOP SECRET, SECRET, COP&IDENTIAL
and UNCLEARED, which are hierarchical in that order. The
National Cie arance status of an individual will be taken as
the major parameter in controlling his access.
6. If an individual is authorized to have access to information
of Type A at one or more National Clearance levels, then it
is assumed that,he is (in principle) granted access to Type A
information up through the level of his National Clearance.
This is intended to rule out the following case which we
believe is common in present manual practice: an individual
with a National Clearance of TOP SECRET is authorized access
to (say) cryptographic information (i.e., is granted CRYPT O
access) only to the SECRET level.
Approved For Relea0O`+ t-IP71 R00510A000200130003-7
Approved For Release 2005/06/09 CIA-RDP71 R0051 0A000200130003-7
We regard this as an illegal use of the clearance
control structure and for the purposes of the computer
records, an individual granted*(say) a National TOP SECRET
Clearance and access to information of Type A, is automatically
assumed to be cleared for all Type A information through
the TOP SECRET level. Any exceptions to this assumption
must be explicitly stated on an individual basis. Thus,
it can be said that the National Clearance factors or
distributes over all special information types. The phrase
"Type All can refer to a special clearance system, a com-
partment or special grouping which itself may be within
a special clearance system, or any major or minor segment
of any clearance system that may have to be specified.
7. As a consequence of the above, the computer algorithm
which matches parameters of the user against the parameters
of the file to be accessed will compare the user's
National Clearance and the file's National Classification
first. If a user is to be granted access to a given
file, then his National Clearance level must equal or
exceed the National Classification level of the file. Note
that this is a necessary but not sufficient condition for
access. Additional control such as code words, special
access, compartments, special groupings, etc. will be
regarded as controlling access to specific information types
within the framework of the National Clearance structure.
Approved For Releas -:29 J9.;~ I,A- P-a71 R00510A000200130003-7
Approved For Release 2005/b'6/9'. -4DP71 R0051 OA000200130003-7
8. An' "Access Control Label" is regarded as an additional means
of access control and will require verification against the
user's status. Examples of such labels are: "No Foreign
Dissemination except Intelligence Elements", "Not Releasable
Outside the DoD".
An "Informational Label" is regarded as not controlling access
to the information but rather giving guidance to the user on
how the information may be further disseminated., further
controlled, utilized, etc. Examples of such labels are:
Limited Distribution, Special Handling Required.
10. All names, code words, etc., at a given installation are
assumed to be unique. a-
SYSTEM CATALOGS
The computer system will maintain a catalog of all terminals which
may be connected to it and for each terminal will maintain the following
information:
1. The highest level of National Calssif ication of information
that may be transmitted to or from the console.
2. Special code words, group. names or other names which modify
the National Clearance level of the* console to receive other
classes of information.
3. Physical location, including building location, room number
and the cognizant agency.
Approved For ReleWe-2Q /96t9' :41'4-REP71 R0051 OA000200130003-7
Approved For Rel
4. The electrical address..
5. The permanent identification number.
.6. A list of the user authorized to use the console.
7. Person responsible and his telephone number.
The computer system will maintain a catalog of all users authorized
to,have access to it and for each user will maintain the following
irif ormat ion .
1. His National Clearance level and its date of expiration and
.granting agency.
2. Special code words, special groupings or other words which
extend. his access to other classes of information, and the
date of expiration of each such special name.
3. His agency affiliation.
4. His citizenship.
5. His agency assignment(s).
6. His permanent identification number (Social Security or
other).
7. Special need-to-know designators other than those explicitly
given by items 1 and 3 above.
The computer system will maintain the following information for each
Approved For Rele
Approved For ReleatR
,XUW , ~~- 71 R0051 OA000200130003-7
1. The National Classification of the f~le.
2. Special names such as code words, compartment names,
handling caveats, etc. that serve to control access to
the file.
3. A need-to-know list, including one or more of the following
as may be required.
. Universal need-to-know; i.e., everyone authorized access.
A name list.
. A group designator need-to-know.
Specific exclusions from need-to-know by such things
as groups, names, explicit lists of names.
4. Access control labels.
5. Informational labels.
6. Background information onythe file. (This is subject to
policy decisions.) Examples of information which might
be desired are:
Its date of creation.
Its downgrading group, and any downgrading. actions applied
to it.
Name of individual who created the file and his agency.
Predecessor files (if any) from which the file was created.
Approved For Release 2005/06/09 CIA-RDP71 R0051 OA000200130003-7
Approved For Release ClATBQP71 R0051 0A000200130003-7
3.2 SECURITY STRUCTURE
Not only will the computer system maintain a catalog of information
for each user, each file, and each terminal but it also must be aware of
the structure of the security control apparatus. This paper defines a
special language in terms of which the security structure can be stated,
and for which software will have to be written for each machine and/or
software. system that is placed into operation.
The security structure language described below formally.def ines
a set of relations between entities. These entities, include special
accesses, code words, etc. The structure below can be though of as
defining a set of decision rules which the computer system can then
consult when it wishes to make a decision concerning security parameters.
It is immaterial as to how these decision rules are actually stored in
a computer, and this is (for the present) left to the individual software
system designers.
To define either a major or minor element of the security structure,
we propose the following syntax. The traditional notation and format
of a programming language is used. The default condition of definition
is mutual independence in that, unless otherwise indicated, two defined
entities will be assumed mutually independent.
ATTRIBUTE
NOTES
Define Name
(1)
Clearances:
(2)
Synonyms:
(3)
Required Labels:
(4)
Structure:
(5)
Approved For Release 2005/06/098 CIA-RDP71R00510A000200130003-7
~
C RET
Approved For Release 2005/06/09 : CIA-RDP71 R0051 0A000200130003-7
ATTRIBUTE
NOTES
Access Rules:
(6)
Relational:
(7)
NOTES:
(1) "Name" is the word which acts as a label to'identify
the security element to be defined.
(2) The names of the clearance(s) which exist within this
security element.
(3) Any commonly occurring synonyms or abbreviations of
names of clearances, labels, etc.
(4) Any required labels which must be associated with the
information to which access is controlled by the security
element being defined.' There is a special reason for
these labels which will become clear in an example
below, but it is assumed that all of the clearances of
the security element being defined are permitted access
information labelled by one or more of the required
labels. Of course the other access criteria must also
be satisfied.
(5) Structure information is regarded as being totally
internal to the security element being defined. Within
Approved For Releasl" }.d~ P71 R00510A000200130003-7
4M'~+ L~+..:'2 +tifr~,Y ~jx~?~'rjF y~,rsTM,,,.j ~;~
Approved For Release;gbgl" 0,71 R0051 0A000200130003-7
(o
the "Structure" part of the syntax there is only one
functional operator called "Imply". This is interpreted
to mean that access authorized by a given clearance
implies the automatica access (unless otherwise limited)
authorized by other clearances lower in the hierarchy.
If an individual has a TOP SECRET clearance, "TOP SECRET"
implies "SECRET" in the sense that an individual cleared
TOP SECRET has access to information to which an-individual
cleared SECRET also has access.
,Under "Access Rules'! there is only one operator called
"Accesses" which has been previously defined as "permits
access to information labelled as". These rules explicitly
state the relation between the names of.the clearances
in the security element being defined and the labels on
the information to which this security clearance permits
access. In many cases, the same word.is used to specify
a clearance and. as a label to indicate classification of
information.
(7)- The "Relational" information establishes any links between
the security element being_.def.ined and other parts of the
security structure; thus, it is regarded.as external to
the element being defined.. Two operators are allowed:
(1) .the "Imply" and (2) "Requires"." The "Imply" means
the access granted by the security element being defined
Approved For PiQA..,,HDRlRO0510AO002100130003-7
130003-7
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
automatically denies or authorizes access (unless
otherwise limited) to stated other categories of
information. "Requires" provides for the case in which
access to information labelled by the security element
being defined requires the simultaneous existence of
a particular other clearance or access authorization.
Boolean expressions are allowed for both operators.
3.3 Examples
Several examples are given to illustrate the use of the security
structure language , syntax.,... The subsection may be safely skipped by the
implies' a SECRET clearance implies a CONFIDENTIAL clearance implies,
UNCLEARED,'and in which access is (in,three of the four cases) controlled
according to the rule that a particular clearance may access information
labelled with the same word; e.g., a SECRET'clearance authorizes access
..needed, which ha. the hierarchical structure that aTOP SECRET clearance
Let us define an element of the security system whose name is
"National Clearances", which contains the clearances TOP'SECRET, SECRET,
-CONFIDENTIAL, and UNCLEARED, for which no special access labels are
casual reader.
to information labelled'as.SECRET.
done as follows:
Approved "F6r :Release'. 2l'05/DD/09 :" CIA-FkbO71,R6O5l OA00O200130003-7
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
Define: National Clearances
Clearances: TOP SECRET
SECRET
CONFIDENTIAL
UNCLEAR D
Synonyms: TOP SECRET-TS
SECRET-S
C ONE' IDENT IAL-C
UNC LASS IF IED-US
UNCLEARED-UR
Required Labels: None
SIX =" ^V~. i
Approved For Release 20 . /06 O - i
DP.71 R00510A000200130003-7
Approved For R Q /'9&'!09 ,,,q46 RDP71 R0051 OA000200130003-7
Let us now consider the base of cryptographic information as
discussed earlier and define a class of information called "CRYPTO"
which is to be regarded as a further restriction
National Classification System.-
Define:
Clearances:
Synonyms:
Required Labels:
Structure:
Access Rules:
Relational:
CRYPTO
CRYPTO
None V
Handle via special channels
None
CRYPTO accesses CRYPTO
CRYPTO requires TS OR. S
END
This example illustrates the use of a label as an access control.
It has been assumed that CRYPTO information is to be transmitted via
special channels. However, there may be administrative traffic which
will not have the classification label CRYPTO, but access to which must
be confined to CRYPTO-cleared people. Thus, TOP SECRET or SECRET
information carrying the special handling label assumed in this example
can be identified as CRYPTO-class information and access controlled
accordingly. In effect, a required label can be regarded, when necessary,
as a pseudo-clearance, accessed by any of the clearances listed in the
definition. The notation OR. identifies'the. Boolean operation of
disjunction.
Approved For RJ *4
7 C l4-RDP71 R00510A000200130003-7
Approved For Release 2005/06/09 : CIA-RDP71 R0051 0A000200130003-7
~~FF
Lt
Of course, it would have been sufficient just to put Ssince TS
implies S.
Let us define next a special class of information called Restricted
Data which is assumed to exist within the National Classification structure.
Restricted Data
RESTRICTED DATA
Restricted Data-RD
None.
None
RD accesses RD
RD requires TS OR. S
Here we note that there is only one way to identify information
that belongs to this element, and that is through the use of the label
RESTRICTED DATA. Yet, the access rule is necessary to specify the fact
that TD is both a clearance and a classification (label). Note again
the' use of OR. in the relational statement; the Boolean operators
.OR., AND. and NOT. should all be allowed wherever needed in the
syntax.
Define:
Clearances:
Synonyms:
Required Labels:
Structure:
Access Rules:
Relational:
EN'D
Approved. For Releases, ( Q~ 7?R00510A000200130003-7
~J./.7L7Q 'si
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
Let us now define a hypothetical clearance called DATATEL having
.three clearance levels within it referred to as III, II, and I. DATATEL
information of clearance level III carries the code word ABLE; II
carries the code word BAKER' and I carries the code word CHARLIE.
Define: DATATEL
Clearances: III, IT, I
Synonyms: None
Required Labels: Handle via DATATEL channels only:
.Structure: III implies II implies I*
III accesses ABLE
II accesses BAKER
Relational:. III requires TS
II '.requires S
I requires.C
Let us now define a compartment of information within the DATATEL
structure whose name is APPLE, and for which the label ALICE is used
to identify information.contaiied in this special grouping.
As in the first exaxr
*This is an alternate notation to that used in the first example.
Approved' For Release 2005/06'L69 : CIA-RDP71-R00510A000200130003=7
Approved For Relea "OM, AE 71 R0051 0A000200130003-7
Define :
Clearances:
Synonyms:
Required Labels:
Structure:
Access Rules:
Relational:
APPLE
APPLE
None
Handle via APPLE channels only
None
APPLE accesses ALICE
APPLE requires III
This illustratesa variation possible in this syntax. It has been
;assumed that APPLE information is not labelled as such, but is to
/carrY the additional label ALICE. The APPLE definition relates
APPLE to III; the earlier DATATEL definition relates III to ABLE and
also to TOP SECRET. Thus the system can correctly determine that
the proper label for APPLE information is TOP SECRET ABLE ALICE. A
required label of ALICE need not.be given since the access rule contains
the information.* We now observe something else about required labels.
APPLE information would have two required labels (in this case, two
*The examples have contained only handling rules as required labels.
In general, it is suggested that information not be given twice in a
definition. For example, the compiler can acquire the ALICE label from
the access rule. If other kinds of information must be specified as
required labels, then some rules about the format of information in the
required label block will have to be developed.
16
a- is :u ani A
Approved For Release S / CIA-RDP71 R0051 0A00.0200130003-7
Approved For Relea0TQ5/3 6P71 R0051 0A000200130003-7
handling requirements), and logical rules have yet to be established
to handle such situations.
Let use define an example in which it is assumed. that at the
SECRET level there are two categories of information called AGILE and
BANANA accessing information labelled respectively as ANN and BETTY.
Further assume that an individual cannot be concurrently authorized
access to AGILE and BANANA information. To have access to both,
assume that an individual must be cleared TOP SECRET, in which case
he will be said to have access to CHERRY information labelled CHICO,
as well as all AGILE and BANANA information.
The specification of these three security elements will then
be as follows:
Clearances: .AGILE
Synonyms: None
Required Labels: Handle via AGILE channels only
Structure: None
Access Rules: AGILE accesses ANN
Relational: AGILE requires S AND. NOT. BANANA
CHERRY. implies AGILE AND. BANANA
Approved For Releas?20U5108109---Eh*-R R00510A000200130003-7
Approved For Release 2
Define :
Clearances:
Synonyms:
Required Labels:
Structure:
Access Rules:
Relational:
~900510A000200130003-7
BANANA
BANANA
None
Handle via BANANA channels only
None
BANANA accesses BETTY
BANANA requires S AND. NOT. AGILE
CHERRY implies AGILE AND. BANANA
Define:
Clearances:
Synonsyms:
Required Labels:
Structure:
Access Rules:
Relational:'
END
CHERRY
None
Handle via CHERRY channels only
" None'
CHERRY accesses CHICO
CHERRY requires TS
CHERRY implies AGILE AND. BANANA
Approved For Release
81DJ1 R0051 0A000200130003-7
,-~~
Approved For Release tRJ'1R00510A000200130003-7
Note that in these examples Boolean operators have been used
in the "Imply" statements. With reference to the definition of AGILE,
for example, the relational rules state that AGILE access requires
SECRET National Clearance and not the concurrent access to BANANA
information, and that CHERRY access implies automatic access to both
AGILE and BANANA. While access control to the AGILE compartment would
not normally require the statement that simultaneous access to AGILE
and BANANA requires CHERRY access, nonetheless this relation is given
as part of the AGILE and BANANA definitions to facilitate the automatic
assignment by the computer system of access controls to new files
which a user may create from.old files. Thus, should a user merge
AGILE and BANANA information to create a new file, the merging. algorithm
in checking for access controls to be applied to this new file would,
in consulting the definition of AGILE and the definition of BANANA,
discover that the simultaneous presence of both require a CHERRY access
control on the new file. Then in consulting the definition of the
CHERRY element, the merge alforithm would discover that CHERRY requires
TOP SECRET, and hence would label the new file as TOP SECRET CHICO.
(Note in this particular example that the label on a file and the
clearance required to access it are different. In other cases the same
word might be both a label and a clearance.)
Approved .For Release 2005/06/09 : CIA-RDP71 R0051 0A00.0200130003-7
Approved For Releas
Si 1 R0051 0A000200130003-7
3.4 General. Discussion
In general, it is believed that the file merge algorithm probably
should assign to a new file the highest National Classification of the
set of. National Classifications attached to the information from which
the new file was assembled, and further, that it should concatenate any
special names to be applied to the new file, subject to any exclusion
rules which may exist among them.
The algorithm which compares the parameters of a user requesting
access to some file with the parameters carried in the header of that
file is visualized .as first checking the National Clearance and National
Classification involved; then any special compartment names, special
group names, or other names; then any restriction which the required
label may impose on access; then any special access designators which
may exist, but which are not explicitly identified as a label; and
finally verifying access by a name check.
It is believed that the mechanism which has been outlined above
will suffice for the description of all parts of the security control
system. In a document at this classification level, it is not possible
to include the examples which demonstrate that it does work in all places,
but it has been checked that it is adequate for all those systems about
which sufficient knowledge is available. On the other hand, exhaustive
knowledge of all details of the entire security control structure is
not claimed, and it is possible that pathological cases exist which
cannot be described in the language.
Approved For Re1eai0 .; RP71 R00510A00.0200130003-7
0. ki ", A
Approved For Release : f i ;- 1 R0051 OA000200130003-7
It should be noted that the actual dynamics of the system have
yet to be formally specified. That is, the programming algorithms for
all relevant decisions are not yet formally. specified. That is, the
programming algorithms for all relevant decisions are not yet formally
defined, since this is the basis for future work. For example, it
appLrs that the access algorithm would examine the "Requires" statement
in 'the Relational section prior to the "Imply" statement, while the
merge algorithm would proceed in the reverse order. The latter must
be the case in.order to avoid tricking the system into thinking it
had discovered a logical inconsistency because a CHERRY cleared person
ha 4 accessed both AGILE and BANANA information, the clearances for
which cannot be mutually coexistent.
Security is not the only issue which concerns access control to
files. While the present section deals only with the security aspect,
related problems are mentioned here because the software procedures will
have to be designed to deal with all aspects of the.problem.
One related problem is that of file management. Even though a
given user may have the clearance which authorizes him access to a
particular file, in the interests of controlling who takes various
actions on the file, the file management system may not grant him access
or may limit what he can do with the file. This can be looked on as a
form of need-to-know and can, in principle, be dealt with by keeping
several need-to-know lists with each file. For example, authority
VWM - -- W4 do-24
Approved For Release J5~: F 1 R0051 OA00.0200130003-7
Approved For Release 2005-6" %o 1 JO0510A000200130003-7
might be granted for:
1. Reading only of the file.
2. Changing existing specified fields.
3. Adding new entities or new fields.
4. Purging the file by deleting old entities or fields.
5. Creating a new file from the given file.
This need not beseveral lists but could in reality be one list in which
each name carried authority codes with it. On this point, the file
management problem and the security problem intersect.
File creation is a second problem not discussed in this work. Many
coonditions might have to be accounted for, some of which are:
1. A file might be duplicated which implies that the
complete header information of the original file
would also be copied.
2. Concatenating two files. with elimination of no entities
which implies that the two headers will be joined
according to some merge/replacement algorithm.
3. A file may be partially copied, which implies that
(probably) only part of the header information from
the original file is relevant to the new file. It
might be necessary to add new header information to the
second file on the basis of.such things as:
Approved For Release 20L)P9"10510A000200130003-7
Approved For Release 2 I
ff, I EM0051 OA000200130003-7
.a. Whether the new file was created by a program
that has been cataloged and certified; or
b. Was created by a program that is experimental or
in debug, or
.c. Was created by a program that was finished but
uncertified.
A file may be duplicated by simply renaming
Partial copying could result in lowering of the classified level
of the file.-and, thus, the header information will have to be modified.
It may prove possible to design logic which will handle such downgrading
automatically, but certainly many cases will have to be determined by
the security officer.
This section does not discuss in detail the various ways in which
the catalog of user, ,catalog of terminals, and file header must be
manipulated. For the record, the following (not necessarily complete)
list is given.
1.. -A user clearance and the terminal clearance at which he
is presently working must be properly conjoined to establish
the present job clearance. .
2. Job clearances and file calssifications must be compared to
control access.
23
Approved For Relea
71 R0051 OA000200130003-7
Approved For Release 2005/06/09
CIA 1 R0051 0A000200130003-7
3. File header information, particularly of internally
created files., must be utilized to properly label printed
or displayed information. This includes not only national
classification, but also special compartment or group
names, informational labels, and other required labels.
4? File header information in conjunction with other logic
must be used in the automatic assignment of classifications
and the automatic generation of headers for new files.
At present, no provision for classifying the deck of cards (or
whatever) containing the description of the security structure for a
given installation has been included. This is because this information
can have a classification outside of the structure it defines. Rather,
this information is considered to be so sensitive that its access must
be controlled on a specific name authorization only. Thus, when this
information is resident in the computer system, its access must be
controlled-by a special purpose mechanism not part of the regular file
system. In general,-this attitude is adopted toward all of the critically
sensitive portions of the software system.
24
Approved For Releas
`_31 R0051 OA000200130003-7
Approved For Release 2 CIA-RDP71 R0051 OA000200130003-7
mitt
1. The central computer system,.all remote terminals and
communication lines are physically secured according
to already-established regulations and precedents for
providing such physical security;
2. All personnel who have access to terminals or the central
facility have a security clearance acceptable to the
responsible officer;
These procedures should apply at any time that there are information-
storing devices which may contain classified material physically
connected and accessible to the operating system. Provision may be
made for switching off, removing or purging such storage devices.
It is then possible for the computer system to be operated without
the above assumptions in force, providing that all classified information
is physically inaccessible during such operation.
For a system which proposes to provide privacy, it is presumed that
the certification that it actually does will be done by the official
who is responsible for the security of all of the information which
is available through the system. This section is intended as a guide
which may be used by that official in making his judgement, and by a
supplier of a computer system hoping to achieve certification. It is
recognized that no currently available computer system in fact meets all
the suggested guidelines. To the extent various features are not avail-
Approved For Release 2005/06/09 R P71 R0051 OA000200130003-7
Approved For Release 20
CIA-RDP71 R0051 OA000200130003-7
4. STATE-OF-THE-ART PRIVACY SYSTEMS
4.1 Introduction
The purpose of this section is to provide guidance to groups which
need to install a time-shared computer system to process classified
information, but based on state-of-the-art understanding of measures
to provide. information protection. It is'apparent that the general
problem,'of providing security for classified information stored in
a time-shared computer system is currently unsolved. However, in view
of the evident interest in providing time-sharing capability for-the
processing of classified information, there is a need to suggest such
considerations and guidelines as may be practicable at the present state-
of-the-art. These guidelines are provided so that one may determine to
what extent a proposed system may be adequate for a particular application
which does not require full-multilevel security procedures.
The following guidelines take the point of view that currently
available. system construction techniques are potentially capable of
providing what is technically termed privacy.
A system providing privacy,
by definition, provides safeguards against releasing classified information
to individuals who are cleared for the information, but have no need-to-
know. In such a system, security is presumed provided by mechanisms
external to the computer system itself. For example, the following
two procedures might be used:
1161
Approved For Release 2005/06/09: C lS Y1 R0051 OA000200130003-7
Approved For Release 200 t1CIA-RDP71 R0051 OA000200130003-7
able management controls and manual features may be substituted if
the resultent restricted operation can be accepted. Such lack of
achievement should not necessarily prevent certification, but it should
indicate to the certifying officer the risk he is taking if he accepts
The comments in this section apply to a generic class of computer
theisystem.
systems,,.Jcommonly referred to as "time-shared", which have all of the
following properties:
1. They are based on a general-purpose digital computer.
2. They store information (programs and.data) on a long-term
I basis for the users of the system. The system takes on
the responsibility for reliability of storage as well
as insuring that stored information is not compromised.
3. The system provides simultaneous access for several users
using techniques commonly referred to as "multiprogramming",
"time-sharing", or "multiplexing", which distribute common-
resources (e.g., central processor and primary and secondary
memory) among the several users according to instantaneous
demand.
In addition, the system may be accessible from a distance by a
typewriter or other terminals connected to the system by communication
lines. Such systems may supply differing services to users which
present progressively more difficult environments in which to realize
a privacy system, e.g.:
1. A system which permits the user to execute only programs
Approved For Release 2005106f09 : O NW? 1 R0051 0A000200130003-7
Approved For Release 200=: IA-RDP71 R0051 OA000200130003-7
provided as part of the system.
2. A system which interprets a user-provided program.
3. A system which permits direct execution of only programs
generated by a system-provided compiler.
4. A system which permits direct execution of any user-
provided program.
We I concentrate our attention on the fourth (and most difficult)
form of service (although the line between 3. and 4. above is often
difficult to draw) because the current need for time-shared privacy
systems appears to extend to such service.
To afford privacy, such a system must provide an authentication
mechanism by which users of the system may be appropriately identified
and a protection mechanism by which identified users are given access
only to information to which they are entitled. Furthermore, the system
must be constructed in such a way that imely certification by competent
authority is feasible.
4.2 Authentication
Authentication is the means by which the computer system is assured
that the individual at a terminal is who-he represents himself to be.
User authentication is usually provided on existing systems through a
pass-word. This technique can provide adequate protection for privacy
purposes if:
Approved For Release 2005/06/09.: 71 R0051 OA000200130001-7
Approved For Release 2005/06/_E fDP71 R0051 OA000200130003-7
1. The pass-words are given protection comparable to that
required for the most sensitive information available
to that user;
2. They are changed periodically to minimize potential
loss (comparable to changing safe combinations);
3. They are not user-generated (to prevent penetration by
educated guessing).
More elaborate schemes such as one-time pass-words or challenge-
dependent pass-words may not be necessary to achieve the objectives of
privacy. However, installations handling sensitive material or attempting
to approximate secure environments should require them.
4.3 Protection
To provide protection of information stored in the system, certain
hardware features can be described as essential for a system which allows
execution of user-specified machine language instructions. These same
hardware features can also-help simplify certification of systems which
do not allow machine-language programs, although supervisor procedures
can in some cases can be provided as a substitute.
Approved For Release 2005/06dMU -RDP71 R0051 OA000200130003-7
Approved For Release 2005/06/09 : CIA-RDP7.1 R0051 OA000200130003-7
SECRET
1. The execution state of a processor should include one or
more variables (the protection state variables) which
determine the interpretation of instructions executed by
the processor. (For example, a processor might have a
master 'mode/slave mode protection state variable, in which
certain instructions are illegal except in master mode..)
Modification of the protection state.variables can only
be performed under circumstances in which control of the
process is simultaneously transferred to a procedure
qualified to operate in the new protection state. (For
example,. an interrupt may switch the protection state to
master mode and simultaneously transfer control to a
supervisor provided interrupt handler. When the handler
completes its operation it may explicitly restore the old
perfection state, as well as the program formerly in control.)
3. The ability of a"processor to.access locations in primary
memory should be controlled on a permission basis which
may depend on the. protection state of the processor. (e.g.,
in slave mode, a memory permission register might allow
access only to primary memory locations belonging to the
user in control,.)
Approved For Release 2005/MR -RDP71 R0051 OA000200130003-7
Approved For Release 2005/0 O@g i -RDP71 R0051 0A000200130003-7
The correct operation of certain instruction should
depend on the protection state of the processor. (For
example, instructions which indicate input or output
operations on a shared storage device (e.g., disk or drum)
would execute properly only when in master mode. Any
attempt to use such "privileged" instructions in slave
t' mode should cause interruption of the program containing
the instruction.)
Note that it may be acceptable.'if the.user can execute
input/output instructions directed to devices assigned
exclusively to him.
5. All possible operation codes, with all possible'tags'or'.
modifiers, whether legal or not, must produce known
responses by the computer.
The system software should utilize these.hardware features to
limit access to data to authorized users. In particular:''
l.. Any violation of memory bounds or attempted execution
vision should be made for the security, officer` to deny
.of privileged instructions should. cause monitor action
to log entries, and a reasonable time delay before the.
user may continue execution.: time delay should
be long enough to discourage methodical probing. ,.Pro-
access in'suspicious.situations.
Approved For Release 2005/06/0.x' ? CIA7. DP71 R0051 0A00020013000-7
Approved For Release 20
CIA-RDP71 R0051 OA000200130003-7
2. The monitor should be organized in such a way that it is
not necessary to suspend security procedures in order for
users to debug their programs.
3. Procedures should be available for clearing from the system
of information which has ever'been`,stored,-on a device, so
shutdown' of. the system when desired.
6. Logs should be kept of the highest:level of classification.
The monitor should insure that sensitive data does not
remain as accessible residue in primary memory or on secondary
storage devices.
(or making inaccessible) all classified information during
actions which must be run without the normal protection.
5...The monitor, system should include procedures for an orderly'.,'.
7. ,System data bases and tables should be interlocked when
be met.
that disposal .and decontaimination policy requirements can
updated in such a way that access to a table is prohibited
whenever other tables are'.not consistent with it. For example,,
adding or deleting a user of.the system may require modifying
.several tables. Interlocking. techniques-should-be used which
is own deletion, ,will.be.delayed' until.,the'deletion'is.
Min
Approved. For Release 2005/06/09 A-R 71 RO051'0d0002001'30003-7
Approved For Release 20 90-9k CIA-RDP71R0051 OA000200130003-7
8. Supervisor. data bases should have consistency checks in
them which are routinely checked whenever the data base is
referenced. For example, a string pointer list might
include both forward and back pointers.
9. Procedures should be provided to adequately protect duplicate
copies*of stored files as well as the originals.. For
1.. example, if files are copied onto magnetic tapes for
backup, the tapes must be guarded as carefully as -the on-line information storing devices.
In addition,,to ensure that hardware and supervisor information
protection features are operating correctly,'the design of the system
should include provision for automatic periodic testing'of protection
features. For example, periodic.tests might include:
1.1 Verifying sensitive portions of the monitor (e.g., the
security tables) against master copies for possible change.
2...*Generating unauthorized addresses or privileged instructions
in user mode to insure that protection hardware is working.
3. Verification that less frequently used features which the
supervisor depends on.(e.g.', privileged instructions or
time of day clock). are. operating' properly.:.
Approved For.Refeas+ 2005/06/09: CIA=F DP71R0051OAG O2U01300037.
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
SECRET
Q. Verification that supervisor data base consistency
checking features are working correctly. This verification
can be done by temporarily damaging the consistency
check data, and exercising the appropriate supervisor
procedure to see if it notices, the damage.
5..: Periodic comparison of counters kept by the supervisor
r' with counters maintained by the hardware of the number
of read or write requests issued to information storing
devices.
Error detecting and correcting techniques may be useful
in assuring correct operation of devices used to speed up
the processor such as associative memories, instruction
stacks, or look ahead registers.' In any case provision
should be made for the supervisor. program to verify their
correct operation. For example,.one.should have the ability
to turn speed-up hardware on and, off by privileged instruction,
and to store-contents. of related registers to verify correct
Approved For Release 2005/06/09: CIA-RDP71 R0051 OA000200130003-7
Approved For Release 2005/06/09_:.CJA , DP71 ROO51 OA000200130003-7
Since it is common on a time shared system for the programs of the
supervisor to be maintained on the system itself, certain special pre-
cautions must be taken regarding these programs, in both their source
and executable form:
1. It should be possible to separate the authority to modify
the supervisor actually in use from the authority to debug
a proposed modification. In other words, the authority
to obtain a copy of a supervisor procedure, modify it, and
...:.test it under. special operating conditions may be vested
in a number of system programmers; the authority to install
such a checked out modification as part of the working system
routinely offered to user may be vested in a single person.
.2. The source program of the system should be protected
against changes by unauthorized programmers, since a later
authorized change, if installed, would also introduce the
unauthorized one. One procedure to insure that unauthorized
changes do not occur is to allow access to modify the system
master copy of a source program only to a person authorized
to modify the actual running system. A system programmer
would debug proposed changes on.a copy of the master, not
the original. When he is.satisfied with his changes, he
Approved For Release 2005/06/09 : CIA-RDP71 R0051'0A000200130003-7
Approved For Release 2005 f. E:IA-RDP71 R0051 OA000200130003-7
turns a list of changes over to the person responsible
for introduction of changes into the working system.
These changes are edited into a new copy of the master
source program, which is then compiled, tested,. and
then introduced on the new master.
4.4 Certification
In the process of certification, the combination hardware/software
systems is to be subjected to inspection and test by expert technical
personnel to determine the degree to which it conforms to the requirements
of appropriate regulations and policies. The extent and duration of the
inspection and testing is left to the discretion of competent authority
and will depend heavily on. the manner in which the hardware and software
is constructed. In order to keep the certification period to an acceptably
short period of time it is advisable to follow certain practices in
constructing the system, i.e.:
1.' Reasonable (an. ill-defined term) hardware reliability features,
--such as memory parity checking hardware, etc., should be
provided so.that the other safeguards of the system can be
assured to be operating correctly. In this regard, unduly
complex hardware design will 'complicate the certification
process, as it will cast doubts both on its reliability and
the integrity of the hardware protection mechanisms; therefore:
Approved For Release 2005/0~ IA-RDP71R00510A000200130'003-7
Approved For Release 200% CIA-RDP71 R0051 OA000200130003-7
1.1 The use of complicated schemes which make the
operation of instructions potentially erroneously
dependent on the operation of adjacent instructions should
be avoided. Features such as look ahead or pipe line
organization require very careful analysis to determine
if they are free from this class of fault.
,V 1.2 It is advantageous to use a standard addressing
mechanism so that the memory protection mechanisms are
independent of machine instruction operation code decoding.
.1.3 Asynchronous organization of hardware logic provides
hardware interlocks against unexpected delays caused for
example, by component drift or misadjustment. Such
organization therefore, can ease certification.
2. .Other hardware: features which would enhance the certifi-
ability::of the system include:
2.1 Program readable hardware conf igur.tion status
switches, thus-insuring that the software is aware of
the hardware configuration in which it resides. If it
possible to-set up illegal or inconsistent configurations,
there must be available a program which can detect such
illegal or inconsistent settings. In particular, a test
to insure that all maintenance switches are in their
normal operating positions should be provided.
Approved For Release 2005/06/091 A-RDP71 R0051 OA000200130003-7
Approved For Release 2005 ?M IA-RDP71 R0051 OA000200130003-7
2.2 Provisions to control unauthorized or accidental
changes to configuration and peripheral control switches.
A key lock on a control panel cover is an example.
2.3 Program readable clocks which provide date and time
of day for use in controlling audits and recording file
dreation instants.
As the monitor will, in the large part, be produced by
uncleared personnel, it will be necessary for the certifiers
to assure themselves that no "trapdoors" (intentional or
unintentional) for unauthorized access will have been
introduced into the system. This certification may require
examination of the operating system code on a line-by-line
basis by certification authority. Therefore:
3.1 Use of esoteric coding techniques is to be discouraged.
3.2 Use of higher order programming languages where possible
is important. Since the compilers for such languages
are potentially capable of introducing such trapdoors into
their object code, the compilers must themselves be certified
and should be.written in (their own) higher order language
if possible.
3.3 The monitor should be constructed in a modular fashion
such that errors occurring in one module do not affect
the internal operations of another. As much of the monitor
as possible should operate under the memory protection scheme
Approved For Release* 2005/,06W DP71 R0051 OA000200130003-7
Approved For Release 2005/06/0' TP71 R0051 OA000200130003-7
(as opposed to supervisor mode). It is advantageous to
segregate. portions of the monitor which need not deal
with security matters.
3.4 Data should be separated from the instructions of the
program, as to simplify protection the instructions with
hardware facilities and insuring that fresh internal
storage areas are used when the program is reused.
Good documentation of both the hardware and software is
essential.
4.5 Summary .
1. A general solution to the problem of either security or
privacy in time-shared: computer systems is not currently within the
state-of-the-art.
2. Selective certification of such systems for specific privacy.
applications in the near future seems possible. The features that such
systems should possess,can be identified; systems possessing such
features are. currently in operation.
3. A critical problem in the near-term utilization of such
systems is the potentially excessive time required to achieve their
certification for particular privacy applications.: This section attempts
to indicate features these systems might offer Ito reduce this time to
15
11 RDP71 R00510A000200130003-7
Approved For Release 2005/0@
Approved For Rele ~"J: A DP71 R0051 OA000200130003-7
5. SEC U SYSTEMS
5.1 Introduction
By Secure Systems, we mean systems that permit uncleared users using
unsecured lines to share a time-shared facility with cleared users running
classified problems. We further assume that the time-shared facility
exists in a physically secure environment, and incorporates all of the
applicable methods discussed in previous sections.
The crucial difference between the security problem and the privacy
problem is the existence of (1) uncleared users, and (2) unsecured lines.
Even with the facility existing in a secured environment, the exposure of
the system to uncleared personnel (whether or not operating with "invisible"
secured lines) noses a set of requirements on the system that cannot be
solved by administrative of policy actions..
The "open" aspect of the systen(s)?also makes it more vur_erable to
various threats discussed below.
Approved For Release 2005/06/09 CIA-RDP71R0051 OA000200130003-7
. ? J
AF.!Zr I'VW" .,," .. Fwd K:.Y$
Approved For RelIl ff e?i 5/ X i;N ClAx RDP71 R0051 OA000200130003-7
5.2 Potential Threats and Countenn asures
The following table indicates advertent and inadvertent threats to a
system which can be broadly placed in three categories:
1. Recovery of Information
2. Denial of Use of System
3. Intelligent Deception;
and can occur through:
`1. Programming
2. Hardware/Software error
3. Physical Access
4. TEMPEST.
The table also indicates some countermeausres
although it is not complete.
Points of Vulnerability/Attack:
A. User - Programmatic Attack
Threats
1. Recovery of info by:
a. Misrepresentation
b. Illegal read/write (core)
c. Illegal access (files)
d. Tampering with operating systems
2. Overload (to deny use of system)
Local User input
to some of these threats,
Countermeasures
Authentication - User
Memory bounds
Access controls (see section 3)
Access controls (see section 4)
User limitations
Manual checks
'Audit trails
Alarms on violation
- Approved For Release 2005/061Q0:: CIA-RDP71 R0051 OA000200130003-7
Approved For Releaset sjIN R0051 0A000200130003-7
B.
Terminal - Physical Access/Machine Errors
Threats
Countermeasures
Alteration of input
Terminal authentication
Access controls (see section 4)
C.
Line
Threats
Countermeasures
1.
Intercept
Securing line
2.
Taping to manipulate systems
User/terminal authentication
3.
System Denial
(other checks against User
Prog. attacks)
Line isolation.
4.
TEMPEST
Line isolation
/5.
`third Party
Line isolation
D. Secured Facility
Threats Countermeasures
1. System Personnel
(op/Prog/Pla int )
a. Program/File change Access Control (see section 4)
b. Program error Certification
c. Unauthroized call out Audit trail
2. Hardware
a. `Mag retention Cipher only
b. Tampering
c. Logic faults Diagnostics
Approved For Release 2005/06/0_ CIA-RDP71 R0051 OA000200130003-7
Approved For Relea
A P71 R0051 OA000200130003-7
As examination of the table reveals, the points of vulnerability of
an "open" system are many, and assume the proper working of nearly all
of the operating system and the hardware mechanisms provided to assist
an operating system to isolate users from itself and each other. Further,
the proo1_(s) of certifying atine-sha?:ed system (taken in the sense of
both the software operating system and the hardware of the computer) are
very complex indeed. Even if a system. ,,:ere certified, a contiriuink; problem
would be tq.re-affirm the certification.
The present state of . operating system design is not so advanced that
the operating system will remain static for an extended period. of time,
consequently, it is probable that continuous certification would be
required (such.-that at.least each-'change to the "certified" system would
have to be certified).
5.3 Techniques for Protecting a System
in the face of the threats posed by having a partly open system only
three courses of action are available: (1) Close the system (2) Render
the material unclassified (3) Certify the system to permit running with
both cleared and.uncleared users, running classified and unclassified.'
programs.
Clearly the simplest course of actin, is (1) 'above. However, there
exists within the Government and among DOD Contractors, a sufficient
number of cases where a single system should-serve both cleared and
uncleared users. Closing a system is not necessarily the least expensive
method of attacking the problem.
Approved For Release 2005/06/0 ; CIA-RDP71 R00510A000200130003-7'
Approved For Release 2005/06/09 I RDP71 R0051 OA000200130003-7
Aside from actual declassification, which is not pertainent to this
discussion, the only method for transforming classified material so it
may be treated as unclassified is through encryption. As aconsecuence;
use of encryption techniques is one method of making a time-shared system
secure, :van one having uncleared user using unsecured lines. It should
be noted, however, that the principle threat countered by use of encryp-
tion techniques is recovery of information. Other controls, already
discussed, .re required to prevent intelligent deception or denial of
Use of encryption techniques may have an additional benefit
that of reducing the scope of. the system certification problem to more.
manageable proportions..
Approved: For. Release 2005/06/09_ CIA-RDP71 R0051 0A0002001.30003-7
Approved For Reid
i/ P71 R0051 OA000200130003-7
5.3.1 Encryption Techniques
Three types of encryption, for use in securing the operation of a
time-shared system have been identified. They are
1.- Line Encryption.
2. P imaxy (Computer Ope;:ation) Encryption.
3. rile Encryption.
The first, line encryption, is presently employed to secure transmission
paths carrying, classified information. Internal and file encryption
techniques are not now in current use.
5.3.1.1
Line Encryption
Objective - To prevent intercept of information being; passed over the
line and to make it more .difficult to introduce data into the system that
could result in either false,. information or manipulation of the system
(intelligent deception).
Method'- Employ approved. cryptographic devices which will provide point-
to-point encryption of the information being transmitted..
Requirements High speed, long-term security, mini?razm size, power
requirements, etc.
Conclusion - Although there exists today communications encryption
devices which provide the required security protection; equipments which
viill possess the desired physical characteristics will not be generally
available until,the
early 1970's. ado additional special research'require-
Approved For Release 2005/0109: CIA-RDP71 F200510A000200130003-7
Approved For Release 2005y/ /LQL: 1R 51OA000200130003-7
5.x.1.2 Primary Encryption
Objective - To prevent compromise through unauthorized access to data
residing in primary storage. The objective of primary encryption is to
operate a time-shared system WA16 all data and programs residing in primary
storage in encrypted form. Decryption for the purpose of executing programs
is done as-the data/instructions pass from the primary storage to the CPU
logic. As data is returned to primary storage, it is.again encrypted. This
is illtiptrated in Figure 5.1. Incorporation of this technique will prevent
compromise through unauthorized access -to data residing in primary storage.
Methods - The encryption-system envisioned is independent in operation.
A cryptovariable is generated as a function of the user ID; other crypto-
variables that may be required are derived from classification of program or
data, user address space, etc. Other cryptovariable'sets required for oper-
ation of a program..(i.e., for, common programs, and other.system programs)
are derived or stored with the cryptovariables generated from the users
identification. These cryptovariables last only as long as'the user is
active. If the user returns after any time off the system, a new set of
cryptovariables is generated for him. Cryptovariables associated with common
Approved ForRelease 2005/06/09 Cl -RDP71 R00510A0002O0130003-7
Fig' 5.1
KEY '
STORE
SYSTEM DIAGRAM. .
SSED
SHOWING' LOGICAL PLACEMENT.;OF PRIMARY
STORAGE AND'SECONDARY STORAGE.ENCRYPTION DEVICES
Approved For ie0 `J'g- 9IA- py4
UNIT
RECORD
I/O
N~~~ARY) ~~
EVICE
=~; SECONDARY STORAGE. ENCRYPTION DEVICE
Approved For Re M1 5/ I DP71 R0051 OA000200130003-7
The detailed requirements of an Internal (Primary) Encryption Device
(call hereafter the IED) for use as outlined above should be developed
from detailed system design studies of the nature of such devotes. With-
out having performed such a study, some of the general requirements of
such a device can still be enumerated.
1. Cryptovariables for the IED must be derived from the program
execution parameters. The encryption offered each user of a
time-shared system must be unique to that user.
2. The IED must operate at memory transmission rates. Inter-
posing the IED between a CPU and the primary storage must not
slow the system due to the operation of the IED.
3. The TED, line encryption devices and the Secondary Storage
Encryption Device (SSED) must operate together in transmitting
information to and from primary storage such'that the infor-
mation never appears en claire. This requires that all of the
encipherment devices used to secure a time-shared system oper-
ate as transencipherment* devices. -
4. TED encipherment requires a cryptoperiod that is at least on
the order of several hours, and must be suitable for use with
a very large number of short, probably fixed length, units of
information. The short term characteristic Ls a reflection of
the nature of a time-.shared system.
-transencipherment: The application of a pair of (possibly different)
cryptographic transforms in such a way as to convert ciphertext,
enciphered under one transform to ciphertext enciphered under the
other-transformation such that no immediate plaintext results.
a~eec
4a") T
Approved For Release 2005/0649: CIA-RDP71 R0.051 OA0002001-30003-7
Approved For Releas~f:: k1 R0051 OA000200130003-7
Separate cryptovariables are required for each address space
accessible to a given user. In modern machines, address spaces
are accessed through base register relative addressing. The
general rule applies that each active base register has at
least its own cryptovariables associated with it. If the IED
technique is applied to provide an additional measure of file
security (see section 5.4), more than one set of cryptovariables
may be associated with a base register.
The IED must be able to switch cryptovariables between memory
cycles. This requirement stems from the nature of base register
addressing found in modern machines. The number of potential
sets of cryptovariables associated with a given job in execution,
exceeds two and maybe less than 64. If the IED technique is used
in connection with file security, many more are required (perhaps
several thousands in an extreme case).
7. The IED, in generating cryptovariables must be able to accept an
optional, user-supplied keying vairable, that can provide an
effective super-encipherment of a particular address space. The
keying mechanism must be such that the user-supplied keying
variable carries through the transencipherment process, and at
a later time permit reading of that information with`a different.
set of short-term cryptovariables only when the user-supplied key
:is present. This provision permits users to establish some or
all of their address space as compartmented, and not readable
even by file handling programs or other system programs.
_AJ
Approved For Release 2005/06W7 CIA-RDP71 R0051 0A000200130003-7
Approved For Rel
8. Only the operating system (not the user) must be able to change
the contents'of the base registers and the corresponding crypto-
variables. The IED must be designed in such a way that re-assign-
ment of the CPU to another user provides automatic secure safe
storage of the cryptovariables associated previous user. Because
such re-assignment will be frequent in a time-shared environment
the IED should have sufficient storage for all of the cryptovari-
ables for all of the active users* of a system.
*Active users: A user whose processes (programs) are known to a system,
- and are in some state of execution.
Approved For Release 2005/06/09 CIA-RDP71 R0051 0A000200130003-7
-U-
Approved For Rele4e100". -IIDP71 R0051 OA000200130003-7
5.3.1.3 Secondary Storage Encryption
Objective - To prevent compromise through physical access to memory
devices and to provide file isolation.
Method - The secondary storage encryption device is a transencipher-
ment mechanism, connecting directly to externally encrypted files. A number
of options for cryptovariables are possible with the device, the simplest
being a record address to provide keying variability. The secondary storage
encryption, device will operate on data in units natural to the secondary
storage device.
In order to provide transencipherment, the cryptovariables associated
with the users address space containing the data to be read or written must
be supplied from the key store, and the device address supplied from the
file handling program.
The requirements of the SSED are different from the IED in a number of.
particulars enumerated below:
1. The SSED is a long term device, with a cryptoperiod measured
in months.
2. The SSED must act as a transencipherment device, converting
from information in externally encrypted form to internally
encrypted form with no intervening plaintext.
Keying information for the SSED must be derived from the
file(s) identified as part of the users program. This
assumes that there is at least one "system" file containing
the file directory, from which all other files are identified.
It is further assumed that the "system" file is addressable
only by certified file handling programs.
Approved For Release 2005/06W:.CIA-RDP71 R0051 oAo00200130003-7
Approved For Release 2ftl C A 7 0051 OA000200130003-7
1+. The SSED must be able to treat information in units "natural"
to the specific secondary' storage device. For the range of.
current devices this may bary from 80. to several thousand
characters.
Approved For Release 2005/06/09 : CIA-RDP71 RQQ51 OA000200130003-7
-13-
Approved For R CjA-RDP71 R00510A000200130003-7
5.4 File Security
Objectives - To provide multi-level security to files.
Method
A users requests for data from files is mediated by a file handling
component of the operating system. Among its services are the collection
of file records and placement of them in a device-sized space (physical
record) before writing them onto secondary storage. On input, it accepts
physical records from secondary storage, and supplys logical records to a
user on demand.
With the services of an internal encryption device, it is possible
to provide security to files in a manner that will permit (if desired) a
single logical file containing records of various classifications (in the
widest sense of the word) to be accessed by authorized users fro only those
records to which their clearance permits.
5.4.1 Assumptions for the Internal Encipherment Service for File Security
The Internal Encipherment device (IED) previously described made pro-
vision for a user-controlled private and secure section of the memory by
utilizing a user-supplied parameter directly as a cryptovariable of the
.IED. In order to be applied to file security, it is necessary for the IED
to have access to as many user-supplied cryptovariables as there are unique
"classifications" of the data. Furthermore, it is necessary that the device
have "long-term" properties as well as or in lieu of the short-term proper-
ties described for the IED previously. Specifically the transform key
must have the properties:
SECRL:~ i''
Approved For Release 2005/06/01 _CIA-RDP71 R00510A0Q0200130003-7
Approved For Rele
,.r W V
talk-
P[T(SK, UK)] -, C
C[T(SK)] -~ C'
C'[T(UK)] P
where [T(SK, UK)] is read "transformed by the cryptologic
transformation T, with cryptovariables SK, UK."
It is further assumed that each record of the file contains a header
describing the classification and access control category.for the record,
and that the header may be read by the file handling program (i.e., is
enciphered only by a file key or an internal (system key)). The file
handling program passes records to a user program encrypted with both
an internal key, and the user private key.
R
Approved For Release 2005/06A1B55:-CIA-RDP71 R0051 OA000200130003-7
.Approved For RelefRY0 /0 jjA DP71 R0051 OA000200130003-7
&_ ft T
The file security capabilities are depicted in the following symbolic
steps.
1. Dx n SK SB 1.. Dx _E21 SK' SB
2. SB SK UK UWS 2. SB SK' UK'P UPWS
3. UWS UK UKP UPDB 3. UPWS UK'P?UK'P
uPWs
4. UPDB UKP~ SK SB subsequent referencing of a file
5. .SB SK F _ D
x
initial creation of a file.
1. Data (Dx) is read from an external device with a null file key (i.e.,
en claire) into system buffer (SB) storage keyed with a (local) system key.
2. Records are moved to a users work space (UWS), being fetch-keyed with
an internal key (SK), and store-keyed with a user key (UK).
3. Reocrd classification is determined.by'the user, and the record moved
from the users work space to a user buffer area that is user-private (UPDB).
Fetches are keyed with the user key (UK), and stores keyed with the user key
and a user private key appropriate to the classification (UKP).
4. The user buffer area is moved to the system buffer (by the system
file handling program). Because the system file handling program cannot have
the user ID, fetches are only keyed with the user key portion of the crypto-
variables. (UK), while stores are keyed wi,th the internal key. At this
point, the record is superenciphered with the users private key.
5. The system buffer storage is written onto an external device via a
transencipherment device. The data is fetch-keyed with the internal key for
the file handling program (SK) and write-keyed with the file key (F2).
Approved 'For Release 2005/06/CIA-RDP71 R0051 OA000200130003-7
Approved For Rele;
dada: A1- DP71 R0051 OA000200130003-7
A subsequent authorized reference to the file operates in a similar
manner.
1. The physical records of the file are read into the system buffer.
Data is read-keyed with the file key (F2) and store-keyed with a (possibly
. new) internal key (SK').
The classification data (in plain form) is examined by the file
handling programs and those records matching the users access authroization
are moved to a user private work space (UPWS). Data is fetch-keyed by an
internal key (SK'), and store-keyed by only the user key (UK') portion of
the cryptovariable for that user.
3. The user references the data-in the record using the private key
portion applicable to the data in the records (UK'P).
For files with a large number of individual classifications, it is
necessary for the user to have the key(s) corresponding to all of the records
to which he is entitled. This implies that the cryptovariable storage be
large enough to accomodate all of the user-supplied keys for the. various
records.
Since the original conception of the IED had a one-to-one correspondence.
between base registers and cryptovariable storage positions, it may be
necessary to "address" cryptovariables because each user-supplied key
corresponding to a different record classification would have to be applied
to the same users address space. Thus we have a sinejle address space (the
record) and multiple cryptovariables (user-supplied) applied to it.
The principle purpose of using encipherment techniques applied to files
is to reduce the scope of certification of a system by localizing the points
in a. system that require certification. Thus... if unauthorized attempts at
Approved For Release 2005/061'9- CIA-RDP71 R0051 0A00020013.0003-7
Approved For Re 594CIAI-RIDP71 R0051 OA000200130003-7
access to file records succeeded, nothing is lost since the data is super-
enciphered. Users with only limited access to a file cannot read data
they are not entitled to even if through error or attack-they gain access
to the data.
Approved For Release 2005/06/0918CIA-RDP71 R0051 OA000200130003-7
Approved For RelootsS 0!5~ '~DP71R0051OA000200130003-7
5.5 CERTIFICATION
Objective - To protect against unauthroized recovery of classified
information, denial of system usage, and intelligent deception.
Method - Certify that the systems, hardware/software, provides
effective countermeasures (e.g? authentication, memory bounds, passwords,
etc.) and sufficient alarms in case of their failure or attempted defeats.
These countermeasures are those identified by applicable governing standards.
Countermeasures required of a multi-level system are similar to those identi-
fied for the closed system in order to protect information on the need-to-know
basis, though their probability of effectiveness may necessarily be higher.
An audit trail would provide a means of assessing possible compromist situa-
tions.
Requirements
Software: The entire machine listing must be "wrung-out" to verify
that those countermeasures accomplished by the software package are adequate
and effective as defined by governing standards and criteria.
Hardware: The components involved in the execution of required
countermeasures must be analyzed and the probability of failures resulting
.in compromise of information must be determined.
System: Adequate. operational tests must be performed, both to
exercise those countermeasures required and to attest that these cannot be
defeated. Operational testing of these countermeasures must be performed
with sufficient periodicity to certify that security effectiveness, once.
established, is maintained.
Approved For Release 2005/06L?~. CIA=RDP71 R00510A000200130003-7
Approved For Rel NC9` P71 R0051 OA000200130003-7
Conclusion - While reliability studies can be performed on the system
hardware to certify its security effectiveness; the software packages associ-
ated with multi-level time-shared systems present a formidable task, that, to
date, has not been totally accomplished. With regard to the software, not
only the security, and countermeasures, routines, but the entire listing, and
tables, must be certified to assure that these routines are not only sufficient
but also appropriately exercised and that there is no threat of their being
by-passed.,;j'Additionally, any certification must be continual.
A "black box" analyzer/certifier might be developed in order.to auto-
mate and accelerate the analysis process, but at best such an approach could
serve only to certify a specific system.
Approved For Release 2005/06/09 : CIA-RDP71 R0051 OA000200130003-7
-20-
Approved For Rele, 'CUP,-EZfvDP-71 R0051 0A000200130003-7
5.6 Research Recommendations
The conceptual framework for system security outlined above poses a
number of questions that cannot be answered from available information.
Broadly speaking, the questions are:
1. What is a suitable form for an internal encryption device
for time-shared systems? How does the form change as the
characteristics of the system vary?
What are the cryptologic techniques applicable to internal
encryption devices, and transencipherment equipment?
3. To what extent is the problem of software certification
reduced by incorporation of encipherment devices in the
internal operation of computer systems?
4. Since certification (at some level) is required even with
the use of LED's, what technology can be applied to auto-
mate or assist in the problem of certifying systems (with
or without the use of IED's)?
It is recommended that a research program be initiated to attempt to
answer some of these questions. Component of such a program are outlined
below.
5.6.1 Structure of Internal Encipherment Devices
The objective of this element of a research program is to develop the
systems requirements of internal encipherment and transencipherment devices
by describing functionally these devices and how they would operate in a
time-shared system. In addition to functional designs of LED's, their.
cryptologic requirements can be described as well.
4 r4
C ER
Approved For Release 2005/06/091 CIA-RDP71 R00510A000200130003-7
Approved For Releas 1 R0051 0A000200130003-7
5.6.2 Cryptologic Techniques
Specifically, what are suitable cryptologic techniques for use in
LED's and transencipherment devices. If the LED's follow the outline
presented, it would be necessary for them to be "long term" with respect
to user-private keys, and "short term" with respect to,system-supplied
keys. Furthermore,.the requirement that they operate on information in
transit between primary storage and the CPU indicates they should be fast
enough not',to cause any appreciable delay in operation of the system.
Furthermore, the IED concept treats programs and data as a large number of
identical length messages. Since the content of these "messages" may be
assumed in many instances, a Wealth of material is available for analysis
of the IED. Thus the IED and the other internal security devices may
require development and testing of new cryptologic techniques in order to
achieve a suitable level of security just as cryptologic devices.
5.6.3 Systems Sturcture and Certification Techniques
This entire area deserves considerable effort on a broad front.
Broadly specking, the problem is what are the points of security vulner-
ability of a system, and what is the behavior of the system under all
circumstances surrounding. attack on those points? Our present state of
capability for specifying systems is either too gross or too detailed to
permit much in the way of automated assistence.in certifying systems. We
need first a rigorous way of specifying both the hardware, and the program
of an operating system'(at least). This specification must be at some
level above the logic equations specifying the system, although it should
be possible to descend to the logic level for any or all portions of a
Approved For Release 2005/06/0_22CIA-RDP71 R0051 0A000200130003-7
system for detailed analysis. Coupled with rigorous specifications of a
system must be methods of expanding the specification, and ways of
observing the detailed behavior of parts of a system under different
assuiaptions of programs, data, and configuration. Equally difficult in
certification is enumerating unacceptable behavior. A considerable amount
of research is required before these problems can be coped with in. any
reasonable way.
Approved For Rele#, -.=W ? A9 DP71 R0051 0A000200130003-7
J4xes' bray See na 'A' k~. s i.-
Approved For Release 2005/06/0 CIA-RDP71 R0051 OA000200130003-7