Industrial Internet Security Framework v 1.0 | Page 81

Security Framework 8: Protecting Endpoints RSA is one of the most widely used asymmetric cryptographic algorithms. Other algorithms such as those based on elliptic curves 1 can provide similar cryptographic strength as RSA, but with smaller key sizes, offering benefits such as lower space and processing requirements 2. For example, a 283-bit ECC key is equivalent to a RSA 3072 bit key 3. This means elliptic curve cryptography (ECC) algorithms may be more suitable for resource-constrained endpoints. Many parameters must be considered in the choice of elliptic curve algorithms as described in [IETFRFC6090]. Configuration management can be done securely, and the device can safely contribute security telemetry to broader analytics systems in ways that the device’s telemetry can be authenticated. Run-time security can be provided either in-device, or in a trusted gateway. Implementing hardware acceleration in a field-programmable gate array (FPGA) enables algorithm agility, which allows changing algorithms in the future due to security considerations. custom application-specific integrated circuits (ASIC) cannot be changed, which is an important consideration for long-lived devices. Other constraints include wireless limitations, battery consumption, intermittent availability of communications and constraints on maintenance windows, making updates less frequent. This forces run-time security to be based on whitelists instead of blacklists, and increases dependency on third-party security. Support for updates as small as 40K bytes, in contrast to gigabyte-sized images, makes it possible to update with orders of magnitude less bandwidth and battery consumption compared to monolithic updates. Other impacts of unreliable communications include careful consideration of key ma