Draft National Encryption Policy

The Department of Electronics and Information Technology (DeitY) released a draft Encryption Policy in PDF. They also released an addendum to the draft to clarify about what was exempt from the purview.

Addendum to the draft encryption policy

Everyone has time till the 16th of October to reply to the draft and share their opinions with DeitY. You can email your comments/feedback/objections etc. to akrishnan@deity.gov.in.

What is encryption and decryption?

Encryption is simply a way to store information in such a way(algorithms) that only authorised users(someone who has the key) can read it.

Plain text which can be read by anyone just by looking at it is converted to cipher text using an encryption algorithm. This generated cipher text can become plain text if the key used to encrypt is used to decrypt.

Why should you care?

The draft encryption policy dictates different things for different kinds of users. In this article we will focus on Consumers(C) and Businesses(B). The exchange of data between them can be listed as follows

Type of Users Example Application Encryption Requirement
B2B Sharing a contract Contract may be digitally signed
B2C Online Shopping Password information, confidential comms
C2B Provide Payment information Credit card number, CVV
C2C Whatsapp Sending messages to each other individually or in groups

Data at Rest and Data in Motion

Data or information needs to be protected when it is stored(rest) and not doing anything and it also needs to be protected when it is travelling(motion).

How does one protect data?

Data is of use when it is accurate, easily available and doesn't become bad over time. Data that we think is sensitive needs to be hidden from others as well. Depending on the type of sensitivity, we might want to share somethings with our friends, colleagues, family, doctor or maybe the government (fingerprints maybe).

So if the data is in your computer/smart phone/server and it is in plain text there is no way for you to be sure that someone else hasn't had a peek at it. If they did, you would have no way of knowing as your data is still accurate, available to you and worth something.

The only way one can be absoutely sure that our data is not visible to anyone who we don't want to share it with is by encrypting it and storing the key safely. This is similar to storing your cash and valuables in a safe and making sure only you know the combination to open that safe.

Key management is an important albiet a complex problem to solve. If the cipher text will be decrypted by the same key, then that key needs to shared in advance in a safe manner with all those who should be able to see the data. If the cipher text can be encrypted with one key of a pair and decrypted with another, then the decryption key can be shared easily.

What does the draft policy say about this?

The draft policy wants to forego commonly known wisdom and knowledge about secure ways of doing this and wants

What does the draft policy say about this

Why is this a problem

What doesn't work

TBD

Things which are un clear

TBD

References and Other links

Authors and Contributors

Akash Mahajan (@makash) founder and community manager of null - The Open Security Community

Support or Contact

You can chat with me on twitter