5 October 1997
Source:
http://www.dcs.ex.ac.uk/~aba/ukcrypto/zergo.html
Thanks to ABA and RJA
See the BMA response to this report at http://www.cl.cam.ac.uk/users/rja14/zergo/zergo.html
Published by the NHS Executive
April 1996
© Crown Copyright 1996
IMG E5254
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61
1 Management summary
2 Introduction
3 The context for Security Services
4 Recommended approach
5 Implementation issues
6 Benefits
7 Implementation
Appendix A Terms of reference from the NHS
Executive
Appendix B An outline architecture
Appendix C Algorithms and key management
Appendix D Glossary of terms
This report has been accepted by Ministers and by the NHS Executive. The report confirms that provision of cryptographic services for NHSwide use would be costly and complex. Acceptance of this report only implies commitment to start piloting. Further action will depend on the outcome of the trials.
The report is being made available to individuals and bodies known to be interested. Further copies may be obtained from:
Department of Health
PO Box 410
Wetherby
West Yorkshire
LS23 7LN
Tel: 01937 840250
Fax: 01937 845381
Zergo Limited has been commissioned by The Information Management Group of The NHS Executive (IMG) to undertake a study looking at the ramifications of using encryption and related services across the NHS-Wide Network (NWN) also known as the NHSnet. The principal requirement, which is for the confidentiality of Person Identifiable Data, is assumed. The study is to consider the ways in which encryption could be provided across the network, in the context of those networked systems that exchange Person Identifiable Data. It is then to recommend how encryption could best be provided to meet the NHS's requirement given the current relevant technical and business strategies, and to advise the NHS on the ramifications of that approach including the likely costs and benefits that would arise. Finally, it is to consider in what ways the encryption approach could be extended to provide other related network security services in a cost-effective manner.
The main results of this study are that:
The study considers the range of contexts with which encryption might be appropriate and concludes that there are many. From this it goes on to deduce that what is required is a small family of related encryption products rather than just a single product. The family of products would allow encryption to be provided according to the needs of individual systems. Encryption could be provided either as part of the user's application or in conjunction with the user's networking facilities. It could be provided for those systems that require it without it being necessary for all systems to use it regardless of need. And the needed central management facilities (one or more TTPs - trusted facilities to manage cryptographic keys on behalf of users) would be readily scalable, allowing an initially small management facility to be established, and for this subsequently to take on the support of a growing community of users without the need for a large central management or Head Office team.
There are a number of established providers of the needed types of security products that should be able to support the NHS's needs, allowing the NHS to enjoy the benefits of a competitive marketplace. The central management facilities could be provided in a number of ways including either as a bespoke development for operation by the NHS or as a Private Finance Initiative for operation by an external trusted third party service provider.
The study recommends that the encryption facilities should be implemented in a staged manner which allows the management and technical issues to be addressed in a controlled and steady way. A staged pilot should be defined to prove the feasibility of using encryption across the NHSnet, to test its use with a number of different types of system, and to allow the measurement of a number of technical and management parameters. After consideration of the results of the first stage of the pilot, a strategy should be defined for implementing the encryption facilities in stages to cover both new and existing networked systems according to priority and need. It should be expected that implementations could be started before all the stages of the pilot have been completed. The implementation program is likely to extend over a number of years, though the benefits from using encryption will be felt from the first stage of the implementation. An outline of the steps that will be needed for the pilot and subsequent implementations is given within this report.
The NHS is in the early stages of implementing the NHS-Wide Network (NWN) also known as the NHSnet. The NWN has an associated NWN Security Policy and Codes of Connection, and guidelines on the use of access controls on the network. The network does not presently have any general provision for the use of encryption or related cryptographic services for protecting the confidentiality of data transmitted across the network.
However, a number of technical barriers which have made the use of encryption by the NHS difficult in the past have been lowered recently. These include general product developments in the cryptography marketplace, greater experience in the security management of large and diverse networks, and a change in policy and approach by the relevant government department (CESG the Communications-Electronics Security Group). These have, amongst other things, shown that encryption can be employed by organizations which are large and diverse and which do not follow a strictly hierarchical organisational structure.
As a result, and mindful of the possible need for such services, the NHS Executive in September 1997 commissioned Zergo Limited to undertake a study to investigate the ramifications of providing encryption and related services across the NWN.
The Objectives of the study were:
This report draws on a requirements study carried out by C International Ltd. The scope of that study was to identify all current and expected future information flows (both interactive sessions and messaging oriented) that might need to use encryption facilities across the NWN. Given the high number of potential data flows, it was decided to focus the analysis on the primary healthcare sector. This was expected to embrace all the issues concerning security and would be focusing attention on an area of particular security concern. This analysis was supplemented by a high level review of other areas of the NHS to ensure that all significant security requirements had been identified. The findings of the requirements study were ratified through a workshop held in December 1995. A summary of the findings is included within Section 3 of this report.
The organization of this report is as follows.
Further technical detail and discussion underpinning the recommended approach to the provision of cryptographic facilities (given in Section 4) is contained in two appendices:
The original Terms of Reference for the study from the NHS Executive are included as Appendix A. Finally, a Glossary of the main security terms used within the report is provided in Appendix D.
The Terms of Reference for the study refer to a number of services relating to the protection of data exchanged across the NWN. These services, primarily the use of encryption, form just a subset of the full range of security services to be found within the overall IT security framework and security infrastructure needed for the protection of NHS data. Consequently, only a subset of the security threats applicable to NHS data has been addressed within this study, principally those that arise from eavesdropping on or tampering with data transmitted across the NWN. Other threats are being addressed separately, for example:
It is important for the reader to understand that the use of encryption on the NWN will not be a universal security panacea and that it will not address all of the NHS's security requirements; in particular, encryption should not be seen as a substitute for having adequate access controls on the end-systems. Other controls will be required within the end-systems themselves, and these are the responsibility of the owners of each end-system. These fall outside the scope of the current study.
Finally, it must be noted that this study has been commissioned by the NHS Executive in England in the context of the use of encryption on the NHSnet available to the NHS in England.
Current concerns about NWN security are centred on two main threats:
The primary concern is that, by either of these methods, an attacker might gain access to confidential Person Identifiable Data The threat of unauthorised access to the network is being addressed through a number of controls including strong user authentication methods, and these are the subject of other work. Addressing the remaining eavesdropping threat is the subject of the present study, and it is this which leads to the consideration of encryption as a possibly suitable countermeasure. However, encryption, if used appropriately, does have further value in that it can help prevent unauthorised access to networked systems or data. Unauthorised users would find themselves unable to access these systems because they would not possess the correct decryption keys. Again according to implementation, authorised users might obtain some protection against accidental or deliberate misrouting of data (posting confidential data to an open discussion group, sending a confidential email to the wrong e-mail address) if the (unintended) recipient did not posses the correct decryption keys.
It can be argued that that the type of Person Identifiable Data which will shortly be passed over the NWN has in the past been transmitted between healthcare professionals by mail or by telephone, and that similar risks of disclosure have long existed. However, it is important to realise that the use of electronic means of communication does introduce new security threats and security risks. For example, it is relatively easy to automate the process of sifting through a large amount of text-based message traffic searching for key words and information of particular interest. This kind of eavesdropping is a threat to communicated Person Identifiable Data and is less laborious than that of steaming open mail or tapping telephone conversations.
The types of cryptographic techniques needed to counter network eavesdropping can often be used to deal with a number of other data security threats which also exist on the NWN, though those requirements may not be as much to the fore as eavesdropping. These include:
However, there are a number of other threats that will not be addressed by the use of network encryption, for example, the abuse of access by authorised users. As has been said, these other threats are being addressed separately by the NHS Executive, and they are not dealt with within the scope of this report.
The conclusion drawn from the study of communications contexts by C International was that there is, or will be, a wide range of information flows between a wide range of communicating entities where unauthorised disclosure could, potentially, give rise to significant and undesirable impacts.
Looking closer across the many dataflow contexts that need securing, the characteristics of the sum total of the data flows are that it:
Messaging (including E-mail) is the largest single type of NWN communications context and is expected to remain so for some time. However, other types of communication (file transfer, interactive system access, tele-medicine) are significant and will become more so with time. Many users are expected to access the NWN via dial-up links. Hence, it is important that any solution adopted should be capable of protecting these. The NWN will also be used for broadcast traffic (though, by its nature, most of the broadcast traffic will not be confidential), and it is important that any solution adopted should be capable of protecting this.
Also, with time, it is expected that the development of more sophisticated health care systems will lead to the exchange of more comprehensive and, therefore, more sensitive clinical data over the NWN. New applications of networking in the health environment are already appearing which also bring further confidentiality demands, for example remote consulting. This particular example would require confidentiality protection of multiple synchronised channels, and possibly of digital mobile radio channels, carrying voice and image as well as data.
From our study of the characteristics of the communications contexts we derive the conclusion that, if encryption is to be effective in preventing eavesdropping and in preventing outsiders not equipped with the necessary technology and encryption keys from communicating with networked systems, then it should be capable of being made available at all endpoints in the network and in a form capable of protecting any data transmitted to any other endpoint.
What is required to achieve this is not so much a single encryption product as a general encryption service based upon a family of encryption products, a service which can be used to protect any type of communication involving any pair or group of NWN network endpoints. The protection needed will be against eavesdropping and to prevent anyone, either insiders or outsiders not equipped with the necessary encryption facilities and keys, from communicating with networked systems.
The study of contexts also revealed a potential need for other cryptographic services such as message integrity protection, source authentication, and non-repudiation. For example:
However, confidentiality is seen to be the widest requirement. This justifies the requested approach which was of focusing first on the encryption solution and then examining ways by which the encryption solution could be extended cost-effectively to support these additional security services.
It is worth remarking that the contexts studied place a range of different performance requirements (in terms of response time and throughput) on any cryptographic service. At one extreme, there are pure messaging applications, for example the transmission of pathology test results. A several second delay for cryptographic processing would be unlikely to cause problems for the users. At the other extreme is remote consulting where high bandwidth data streams would need to be encrypted with minimal delay and in real time.
The table below summarises this situation.
Delays of a second or more unacceptable |
Delays of several seconds acceptable |
|
Low data throughput | Text-based interactive session |
Messaging |
Medium data throughput | Windows-based interactive session |
Some file transfer |
High data throughput | Remote consulting, high data rate link between acute unit and FM supplier |
Some file transfer |
Any technical solution intended to provide countermeasures to the threats discussed above will have to be capable of working with the variety of computer systems that are candidates for connection to the NWN. Some important characteristics of these systems are:
Probably the most common computing environment found around the NWN will be a PC running DOS or Windows. The cost of any encryption facilities introduced will need to be modest or small in proportion to the base cost of this common IT platform.
This section presents a summary of Zergo's recommended approach to the provision of encryption facilities. Further supporting detail describing the rationale behind the recommendations is presented in Appendices B and C towards the end of this report.
This section, and the remainder of this report, employ a number of technical terms which may not be familiar to some readers. Appendix D contains a glossary to assist the interested reader.
The study of the communications contexts has shown that there are many cases where the value or sensitivity of the information exchanged is sufficient that the use of encryption would be appropriate. This judgment is based on an assessment of the magnitude of the possible impact on one or more parties if confidential data were to be disclosed.
Adding encryption across the NWN as a whole has recently become technically feasible. And, drawing on the wealth of experience available from the Financial Services sector, the operation of encryption across a wide and diverse user community (of many thousands of users) has been shown to be manageable. It is not necessary for the encryption facilities to be implemented everywhere at once. A planned and phased implementation programme can be adopted with the benefits of encryption beginning to flow from the start. The implementation process will require care and effort, and the implementation programme is expected to take several years to complete. A number of technical and management issues will need to be addressed in the early stages. For those users in need of encryption capabilities in the short term, alternative interim options are available. These are discussed at the end of this section.
A number of encryption algorithms, public domain and proprietary, exist. However, strong encryption algorithms are not available for general use, and those algorithms which are available for general use (for example, in the form of commercial off-the-shelf products) are not regarded as adequately strong for the protection of Person Identifiable Data. Consequently, the selection of a suitable encryption algorithm is not, in this situation, straightforward.
Given the national interest in the proper protection of Person Identifiable Data, the advice of the National Technical Security Authority, CESG, has been sought on the choice of encryption algorithm. CESG's advice is that, in the case of the NHS, there are security benefits to be obtained from avoiding the use of encryption algorithms which are in the public domain. CESG has recently been able to make available to the NHS (and to others, including non-financial sector organizations) a suitable non-public domain algorithm known as Red Pike. This encryption algorithm is very new, but there are already a small number of products available on the market which use it, and a wider range of products which use related algorithms and which could quickly and simply be modified to use Red Pike. Consequently, the NHS need not fear that it might become locked in to a single product or single supplier if it were to adopt Red Pike as its preferred encryption algorithm.
For the suppliers of encryption products, the NHS would represent a large user community, and this size of potential market would encourage the development of an active and competitive market in Red Pike products. Also, the NHS is not alone in wanting to encourage the development of an active Red Pike marketplace. Many large international Organizations outside the Financial Services sector are in need of similar encryption facilities. And, at the same time, HMG has a number of initiatives currently underway which will lead to the development of Red Pike-based systems. For example, a CCTA-driven initiative to allow suppliers to government departments to submit proposals electronically, and an Inland Revenue-driven initiative to allow small businesses to file Tax returns electronically. These Organizations should add their weight to the NHS's to encourage a wide range of commercial off-the-shelf (COTS) products to be developed.
In light of the conclusions drawn from studying the many dataflow contexts described in the previous section of this report, and in view of the NHS's networking strategy, the NHS's network security strategy should, in the large, favour providing the encryption facilities to the host system whenever possible and, only if justified on a case by case basis, provide it directly on the network itself.
There are several advantages to be gained by providing the encryption facilities to the host rather than the network:
However, despite these benefits, in the early stages of the implementation programme it may be appropriate to provide the encryption predominantly in the lower levels of the networking protocols in order to minimise some of the technical risks.
Encryption facilities will be needed in a variety of forms according to communications context and IT platform, and should be provided in a range of forms to meet this need; there is no single solution to meet all needs.
The encryption facilities could be needed:
The preferred form of implementation in any situation will vary according to a number of considerations. The two considerations most likely to influence the form of implementation are:
In whichever of the above forms the encryption facilities are implemented, it is expected that they will, on the whole, be incorporated into the NWN on a system by system basis. Over a period of time, increasing numbers of systems will be brought on stream using encryption until all the systems that have a business case for using encryption are so protected.
The encryption facilities could at the same time, also be implemented in the form of a general purpose security package independent of any one system or context, for example as a general purpose message/file/data encryption package such as PGP (see Appendix C), though PGP itself would not be appropriate to the NHS's needs1. If equipped with a suitable general purpose package, the user would be able to use encryption or not according to an explicit decision that they would make at the time as to whether the traffic they were about to transmit warranted its use.
Hence, there are a number of routes by which users might arrive at the use of encryption, as follows:
[Footnote 1] 1 As is discussed in Appendix C, PGP has a number of shortcomings in this context. The main shortcomings are:
- it is designed for a messaging environment and would not be usable for interactive communications
- it uses an algorithm controlled by a single Swiss company
- it does not integrate well with commonly found of office e-mail packages, making it difficult to use for the non-technical user
- its key management does not make it easily scalable beyond small numbers of users.
This approach means that:
New applications will be able to incorporate the encryption facilities they need, in the form that is most appropriate to them, from the start within their design. Hence, for each new system, the cryptographic sub-system could be designed according to business and technical needs, and in line with the applicable NHS cryptographic standards or guidelines. The use of NHS cryptographic standards will channel the systems developers towards the reuse of a standard set of cryptographic products.
In the case of existing applications that might need to be upgraded to use encryption, it will be necessary for developers to incorporate the encryption facilities in to the existing system following the analysis of a business case comparing the perceived needs and expected costs.
With Red Pike, as with any symmetric encryption algorithm, for two parties to be able to exchange encrypted traffic they need to have a way to establish and manage the shared keys. Again, the advice of CESG was sought about the possible need to interwork with any future national key management infrastructure. CESG's advice was most helpful and, while not leading to the introduction of any specific functionality into the recommended NWN key management infrastructure, has influenced the recommendations made in this report so that they allow for this possibility.
Given the size of the NHS community and the need for the simplest of means for initialising the users' encryption facilities, the NHS will need to develop a key management infrastructure which is built on the use of what are known as asymmetric methods, and using one or more Trusted Third Party (TTP) facilities. These TTPs would play a role in the secure initialisation of the users' encryption facilities (they could, for example, perform EDIFACT-style key notarisation) and in the periodic changing of some of the users' keys. The TTPs would provide a secure means by which users could obtain the appropriate high-level cryptographic keys of other users to allow two parties ultimately to exchange encrypted data. These high-level keys obtained from the TTPs would not normally be the keys used to protect the exchanged data; those keys would be generated and exchanged automatically and bilaterally between the two communicating parties. Hence, the TTPs themselves would not need to be involved in each exchange of encrypted data. The TTPs would represent only a small overhead to the use of encryption on the network and would add only a negligible amount of additional network traffic.
The TTPs would not require a large establishment for their daily operation. TTP services could be provided by one or more external service providers or by the NHS itself. As the keys being managed will include end-system keys, not just network keys, the TTPs should not be provided by the NWN suppliers as part of the NWN service. Indeed, the TTPs could be used to manage a wide range of cryptographic keys, not just those associated with the use of these Red Pike encryption facilities, and to provide associated services which are not essentially cryptography based. For example, if there were the need, a TTP could be used to provide a general Directory Service for the NWN. The NHS will need to investigate the liability issues associated with the operation of these TTPs (for example, any liabilities that might arise from errors leading to the creation of a key certificate for an unauthorised user), to determine whether there are any constraints or limitations on the TTP services being provided by external suppliers or whether they would need to be provided by NHS entities, and to determine for itself the services they could be allowed to provide and the operational constraints and controls that will be needed.
There are two options for the type of technology that could be used for the key management infrastructure, RSA technology or Diffie-Hellman (D-H) technology (see Appendix C for a description of these terms and technologies). The technology that Zergo recommends the NHS should use is the D-H technology. This will allow the NHS to reserve its options regarding the possibility of interworking with any future national key management infrastructure. It is highly likely that any such national infrastructure would be based on D-H technology. It is almost certain that it would not be based on RSA technology. In all other significant aspects, including intrinsic security strength, the two technologies are equivalent. Hence, a D-H key management infrastructure is the more strategic of the two available options.
A D-H key management infrastructure would not preclude the use of other algorithms, for example RSA, if that were needed for interworking with other systems such as those in use in other European countries. A D-H based infrastructure could easily be extended to support DSA (a standard Digital Signature algorithm) based functions which could then be used for the generation of suitable RSA (or, for that matter, DSA) key certificates.
The actual design of the NHS's key management infrastructure will emerge in the early stages of the proposed pilot programme (see Section 5.1). The first stage of the pilot will carry the main burden of establishing the core key management infrastructure. Hence, the design for this will need to be covered early in the pilot. Though it would not be wise or appropriate to design the key management infrastructure within this study, the expected general shape of the infrastructure can already be sketched out (see Appendix C).
It is acknowledged that the strategic approach recommended in this report will require some time to be piloted and implemented, and that this would not provide all users with encryption capabilities in the immediate term. For those users that have a more urgent need to use encryption other, interim options are available. These could be used within the NWN on a case-by-case basis and would not inhibit or interfere with the strategic developments as they come on-stream. However, they would not allow the users to interwork with the strategic approach as it was increasingly implemented. They should, therefore, be seen as interim steps for the short term, and it should be expected that they would need to be replaced at some time in the future when interoperability with other strategically protected end-systems was required.
Possibly the most attractive of the available short-term solutions would be to use products such as E-mail packages that implement the Red Pike algorithm. There is at least one such product available now, and it is expected that more will follow. These will remain short-term or non-strategic solutions, for the reasons discussed in Appendix C. Further investigation by the NHS is recommended before this class of product can be endorsed.
Other interim solutions are possible but have disadvantages, as follows.
Adding encryption onto the NWN is technically feasible, the encryption processes and encryption facilities could be managed, and a planned and phased implementation approach would be needed. Adding encryption across the network would not be a simple task, and it would bring with it a number of technical and management issues that would need to be addressed carefully, as well as bringing many benefits. These are discussed here.
Each will have its own interests and legitimate concerns, and will require specific attention from the NHS.
Zergo believes that each stakeholder should be able to support the recommended encryption approach. Significantly in the NHS's favour is that, by using Red Pike, the NHS will (subject to independent confirmation of the strength of the algorithm - see Section 5.2 below) be using a stronger encryption algorithm than the Data Encryption Standard (DES), an algorithm that has been used for over ten years within the Banking sector. This should assure all concerned that the NWN can be a suitably secure vehicle for the exchange of confidential Person Identifiable Data. In addition, the NHS can demonstrate that it has sought and taken expert advice from both HMG s security advisors and from independent experts on the cryptographic tools it should use. Zergo is confident that no significant criticism of the Cryptographic adequacy in today's environment of the NHS's current encryption proposals should remain outstanding.
An Executive Board policy decision would be needed on the approach to be adopted with respect to the take-up of encryption facilities within NHS systems and the NWN. It will need to be decided where the responsibilities should lie for deciding on the extent to which encryption should be used, and on what would be considered suitable timescales over which the take-up of encryption should occur. Then, guidance will be needed for system owners to support them in complying with the policy, and for system providers to help them interpret the policy consistently. The NHS might wish to facilitate a forum of user representatives and other interested parties which issues guidance to the wider user community on the use of the encryption facilities with the NWN. This presents the NHS management with an opportunity to take the initiative on the setting and presentation of security issues and standards. The guidance would need to be written in the context of the current Data Networking Security Policy, Guidelines, and Codes of Connection.
The pilot will allow these TTP issues to be exercised and will help the NHS to determine its long term position with regard to the provision of TTP services. From these and related considerations, the NHS will then be able to determine its requirements for controls on the TTPs. The contracting of TTP services will then need to be framed with attention being given to the relevant legislative frameworks as they exist within English law.
However, there are many drawbacks associated with the use of the ITSEC/ITSEM scheme for software products, chiefly those of cost and delay. Other options include the use of expert and independent system testers but without using the formal ITSEC/ITSEM methodology, and the use of the NHS's own IT resources. The NHS would need to evaluate carefully whether to use the ITSEC/ITSEM scheme or one of the other evaluation options.
It will be desirable to have more than one system used within the pilot programme, in order to prove the feasibility of encryption across the wide range of different systems. For example, it will be important for one of the pilot systems to be one which involves GPs directly. Consequently, the pilot should be a staged pilot with each stage being of successive complexity.
It is important that the whole life cycle costs of introducing encryption onto the NWN are considered, not just the purchase costs of the equipment. The life cycle costs include, along with the equipment purchase or licence costs, the manpower costs of:
Though much of the above project manpower could be provided by the NHS from its own staff resources, there will be the need for the NHS to obtain external assistance at a number of stages.
Below, the general size of the possible lifecycle costs of introducing encryption and other security services onto the NWN are indicated, grouped separately into manpower and equipment costs. It must be stressed that, for both groups, these costs are only indicative and should be taken as broad planning estimates, not as upper limits. The actual costs to the NHS will, of course, depend on many parameters including the balance between the use of NHS staff and outside assistance, the balance between hardware and software implementations, and so forth. Whilst it must be understood that the costs are only indicative, every effort has been taken to ensure that the costs given are reasonable and useful.
The day to day operation of the encryption facilities should be essentially transparent to the users. For this reason, there will not be the need for, and associated costs of, many thousands of users being trained up before encryption can be used. Similarly, the day to day operation of the TTP(s) will require only a small number of staff and, consequently, will require only modest on-going resourcing. The main manpower costs relate to the running of the pilot and subsequent implementations. For these, the NHS will need to provide of order a few tens of man-years of staff resource, some proportion of which might be bought-in general project consultancy rather than provided from internal staff. In addition to this, there is the potential, overall, for of order £250,000 worth of external expert security consultancy to assist in these programmes.
We use two different global cost models to calculate the possible equipment costs for introducing encryption throughout the NWN. The purpose of these two models is to show the order of magnitude of the equipment costs for two widely differing models with different assumptions as to how the facilities would be implemented. These two models should not be taken as giving upper and lower bounds to the possible total costs. Indeed, the two results derived are still of the same order of magnitude as each other. Hence, we can conclude that the possible equipment costs for introducing encryption across the NWN could well be in the range £15M to £20M. These would be spread throughout the implementation programme which would last for several years. At the end of this, the annual on-going costs could be in the range £2.5M to £3M.
Planning and outline specification
The first step for the NHS after accepting the report will be to develop
a plan to carry the strategy forward. This will include determining an outline
specification for the technical architecture, for which the NHS will require
some expert security consultancy assistance. Possible security consultancy
fees - at least £20,000.
Procurement, design, development, testing and implementation of the
pilots
The first stage of the pilot will carry the burden of establishing the core
of the key management infrastructure. Successive stages of the pilot and
subsequent implementations may enhance and build upon this core infrastructure
but will each carry a rapidly diminishing share of the infrastructure development
For a modestly sized first stage pilot, this part of the work may take of
order nine to twelve months to execute. For an extensive first pilot, it
is likely to take considerably longer. As well as the NHS staff involved,
there will be the need for a mix of external security assistance. Possible
security consultancy fees - £100,000. Successive stages of the pilot
should require a lower level of external security assistance, possibly
£50,000.
Running the pilot
Each stage of the pilot should be operated for at least six months, assuming
it is successful. During this time there will be phased evaluations to ensure
that the results of the pilot stage are taken on-board as they become available.
This task can be performed primarily with NHS staff.
Updating the Accreditation Specifications
At some intermediate stage, the Accreditation Specifications for GP systems
will need to be amended to include the encryption facilities. The changes
to the specifications will need to be agreed with representatives of the
GP systems supplier community and signed off by the NHS Executive. A period
of time, at least a year, will then be needed to allow the suppliers to respond
to the changes. This task can be performed primarily by NHS staff with some
expert security consultancy assistance. Possible security consultancy fees
- £20,000.
System Migration and Implementation
The cost of this part of the programme is largely the cost of bringing each
new system in under the security umbrella. For each system there will be
the normal planning, design, development, testing and implementation cycle,
and this cost will vary widely according to the nature of the system and
the manner in which encryption is added. Different approaches to covering
the costs may well be appropriate for different types of system:
and that will affect the distribution of the costs between different funding sources. For each new system brought in, the normal costing cycle w ill need to be followed, business cases developed and procurement managed.
It can be expected that each system's implementation programme would require a few man-years of NHS staff resources in total. However, only a small part of this would be extra to the normal implementation costs for the system and attributable directly to the implementation of the encryption facilities. Hence, if encryption is added in to a system's existing implementation programme, for example either for a new system or for a revised one that is put back into service following other system enhancements, the marginal extra resources needed to manage the encryption aspects of the implementation will be only a small part of the whole programme's resourcing needs.
The resourcing required for the development of the encryption facilities by the system vendor will be borne by the NHS within the equipment costs of the products purchased. For further guidance on what these costs might be, see the equipment costs given below.
Training
The encryption facilities should operate with a high degree of automation
and the users should not need a high level of training in their use. A degree
of user security awareness training could be beneficial but this would be
general training and would not need to be specific to the use of the encryption
tools. Specific training will be required for the operators of the TTP, and
it is assumed that this would be provided as part of the development of the
TTP (see below). Possible cost of training the TTP operators - at least
£20,000.
Operation, Maintenance and Support
The first TTP will require a small team of staff to handle the initialisation
of the users security facilities in whichever form they are implemented,
and for the periodic management of high-level cryptographic keys. The lower-level
keys will be managed automatically. The level of staffing at the TTP will
depend on the rate at which users are brought onboard, the need to operate
dual-control over some of the more sensitive TTP operations, and the need
to provide cover for absence (holidays and sickness). It is not expected
that the TTP would need to provide support out of normal daytime working
hours; the period of cover provided each day could be determined according
to perceived need. On this basis, a manning level of four to six staff is
suggested. During periods of active implementation, these staff may be fully
utilised; during steady-state operation of the TTP, they need be only part-time
utilised, allowing them to perform other tasks. It is assumed that maintenance
and support of the equipment (TTP and user equipment) would be provided as
part of the equipment purchase costs.
Beyond the pilot, the NHS has two options for the development of further TTP support. It could:
either
Or
The strategy for the development of TTPs would evolve as the NHS gained experience in their use. If only a single TTP were developed, even once the encryption facilities were fully implemented across the NWN, it should not be necessary for there to be a sizeable number of staff performing central administration tasks. If multiple TTPs were developed, the accumulated TTP staffing would be higher owing to the reduction in the economies of scale achieved. However, each TTP would likely have only a small staffing requirement, with the minimum number of staff being four, and these might be involved only part time in performing TTP functions. In either situation, the full time equivalent staffing level for the TTP functions should be no higher than, say, eight staff.
Review and On-going Enhancement
There will be the need to monitor the performance of the encryption
infrastructure and there may, periodically, be the need for its enhancement.
These will become apparent as the use of encryption advances within the NHS
and cannot be predicted. They will fit within the normal cycle of infrastructure
development.
The equipment needed will include the equipment in the TTP and end-system encryption equipment, and the latter will vary according to the manner of the various implementations. It is not possible for this report to provide a definitive overall cost for implementing encryption on the NWN because there is a wide range of parameters which will influence each implementation and which cannot be determined at this stage. The overall cost will vary according to the balance of hardware versus software implementation, the number and variety of systems running on large or midrange hosts, the allocation of development risk between the NHS and suppliers, and so forth. Also, the distribution of costs between the various funding sources will vary to some decree depending on the financing approaches used.
Consequently, the approach we have adopted is as follows. We begin by presenting typical indicative costs (both one-off costs and on-going annual costs) for some of the main components that are likely to be needed somewhere within the NWN. We then, in the following sub-section, use these to derive broad indicative costs for adding encryption to the NWN for a number of general user examples. Finally, we derive broad indicative costs for the NWN as a whole using two Global Cost (GC) models based on broad global assumptions.
We give both one-off costs for the item of equipment and the annual on-going costs for running the items.
One-off Costs | ||
Key Management Infrastructure The development of the key management and other facilities for the TTPs, including conformance testing tools for evaluating conformance of the users' encryption facilities to the NHS's key management specification |
£250,000 | Applies equally to both Global Cost (GC) models |
Modification of an existing application in a "non-invasive" manner to utilise communications encryption facilities |
£20,000 | Applies equally to both GC models |
Modification of an existing application to incorporate full application level communication encryption facilities using an API and an encryption tool-kit. |
£75,000 | Applies to GC model 2 only |
The price of a (PC) software license for upgrade/additional software adding software encryption facilities to an existing PC application where there is a large market (1000 or more eg. at a GP Practice). This price will be for negotiation with the supplier and could be lower than $100 if the number of user licenses purchased is high |
£100 | Applies to GC model 2 only |
The price of a (server) software licence for upgrade/additional software adding software encryption facilities to an existing server application (eg. at a Trust Hospital). This price will be for negotiation with the supplier and could depend on the number of users supported |
£5,000 | Applies to GC model 2 only |
The price of a hardware unit to handle encryption of a 64Kbit/sec communications link |
£2,500 | Applies to GC model 1 only |
The price of a hardware unit to handle encryption of a dial-up communications link |
£1,800 | Applies to GC model 1 only |
On-going annual costs | ||
Key Management Infrastructure On the basis of the TTP(s) requiring a total of eight full time equivalent staff. |
£400,000 | Applies equally to both GC models |
Maintenance charges | 15% of the one-off equipment costs |
Applies equally to both GC models |
To illustrate the use of these costs, we have applied them to some representative situations.
Example 1: Small GP Practice | ||
5 GPs with 3 support staff sharing a single PC running a UNIX based practice system. |
Procurement cost £100 for a software upgrade licence, adding software-based communications encryption facilities to the existing application |
Support cost assumed as 15% of purchase cost, ie. £15 p.a. |
Example 2: Large GP Practice | ||
10 GPs with 7 support staff and 2 health visitors, using 15 terminals on a UNIX client-server system running over a LAN. The system has connections to the LAN at the local hospital |
Procurement cost £100 per terminal for a software licence, adding software-based communications encryption facilities to the existing application, ie. £1,500 |
Support cost assumed as 15% of procurement cost, ie. £225 p.a. |
Example 3: Acute Hospital | ||
PAS System MUMPS based, supplier no longer maintaining the system |
Procurement cost 5 hardware encryption units at £2,500 each to handle traffic from GPs etc. across the NWN ie. total procurement cost £12,500 |
Support cost assumed as 10% of procurement cost, ie £1,250 p.a. |
Order Communication System |
No encryption as its communications are internal only. |
|
Standalone Theatre System Recent and UNIX based, supporting the main theatre on the hospital campus and a small theatre in the community which is linked to the system via the NWN. |
Procurement cost 2 hardware encryption units at £2,500 each. Total cost £5,000. |
Support cost assumed as 10% of procurement cost, ie. £500 p.a. |
Radiology System MUMPS based, due to be replaced in the next two years. |
It is assumed it would be decided not to add encryption facilities to this system. |
|
Pathology System Recent, UNIX based. |
Procurement cost £5,000 for a software upgrade licence adding encryption capabilities to the existing application. |
Support costs at 15% of procurement cost, £750 p.a. |
Contract Management | Procurement cost £5,000 for a software upgrade licence adding encryption capabilities to the existing application. |
Support costs at 15% of procurement cost, £750 p.a. |
Office System This is used to communicate via E-mail with GPs, Health Authorities and Community Trusts. It is assumed there are 10 terminals on this system |
Procurement cost 10 software licences at £100 each adding encryption facilities to each of the ten terminals. Total cost £1,000. |
Support costs at 15% of procurement cost £150 p.a. |
Link to FM Supplier This hospital is linked to its FM supplier, where the main systems are located, over the NWN. |
Procurement cost for 4 hardware encryption devices at £2,500 each to secure the link, £10,000. (The link is assumed to be duplicated for resilience |
Support costs at 10% of procurement costs, £1,000 p.a. |
Total | Procurement cost for acute unit £38,500 |
Support cost for acute unit £4,400 p.a. |
The total cost of implementing the recommended encryption approach is obviously an important parameter. This cost will depend on a large number of imponderables, for example the outcome of discussions with suppliers about the feasibility and cost of adding software-based encryption facilities to their products.
In view of imponderables of this nature, costing based on detailed analysis of systems would require a large number of assumptions and could not be accurate to better than an order of magnitude. We have, therefore. here, derived costs based on two grossly simplified models representing two extremes of implementation, in order to show the range of costs that might be experienced. All the costs are based on current values and make no allowance for inflation or for depreciation.
This model is based on the assumption that all encryption is carried out in hardware | |||
Global Cost Model 1 | |||
Item | Description | Setup-up cost (£) |
On-going cost (£) |
---|---|---|---|
Key management | Development of Infrastructure Assume at most 8 full-time equivalent staff at the TTP |
£250,000 | £400,000 |
External Security Expertise |
Primarily relating to the encryption pilots |
£250,000 | |
Acute sites | 250 sites, 2 encryptors per site @ £2,500 each plus 15% p.a. maintenance |
£1,250,000 | £187,500 |
Community sites | 200 sites, 2 encryptors per site @ £2,500 each plus 15% p.a. maintenance |
£1,000,000 | £150,000 |
FHSA sites | 100 sites, 2 encryptors per site @ £2,500 each plus 15% p.a. maintenance |
£500,000 | £75,000 |
DHA sites | 1000 sites, 2 encryptors per site @ £2,500 each plus 15% p.a. maintenance |
£500,000 | £75,000 |
GP practices | 9000 sites, 1 encryptor per site @ £1,800 each plus 15% p.a. maintenance |
£16,200,000 | £2,430,000 |
National Systems2 | Assume 15 additional systems, 2 network encryptors per site |
£75,000 | £11,250 |
Total cost for Global Cost Model 1 |
£20,025,000 | £3,328,750 |
[Footnote 2] 2 The analysis focused on systems "owned by" acute/community/primary organisations. There are a number of patient-based systems that do not fit within any one of these categories such as Breast Screeening, Organ Donor, etc. To cover these, the costs for an additional 15 systems was added.
This model is assumes that all encryption is carried out by software. For costing purposes all but the GP systems are assumed to be done as software modificatoins delivering a full applicatoin-level solution. The GP solutions are to add software for communications encryption only. | |||
Global Cost Model 2 | |||
Item | Description | Setup-up cost (£) |
On-going cost (£) |
---|---|---|---|
Key Management | Development of Infrastructure Assume at most 8 full-time equivalent staff at the TTP |
£250,000 | £400,000 |
External Security Expertise |
Primarily relating to the encryption pilots |
250,000 | |
Acute Systems | |||
PAS | Software modifications to 10 systems @ £75,000 each plus 15% p.a. maintenance |
£750,000 | £112,500 |
HISS | Software modifications to 6 systems @ £75,000 each plus 15% p.a. maintenance |
£450,000 | £67,500 |
Pathology | Software modifications to 20 systems @ £75,000 each plus 15% p.a. maintenance |
£1,500,000 | £225,000 |
A&E | Software modifications to 6 systems @ £75,000 each plus 15% p.a. maintenance |
£450,000 | £67,500 |
Nursing | Software modifications to 6 systems @ £75,000 each plus 15% p.a. maintenance |
£450,000 | £67,500 |
Maternity | Software modifications to 6 systems @ £75,000 each plus 15% p.a. maintenance |
£450,000 | £67,500 |
CMS | Software modifications to 6 systems @ £75,000 each plus 15% p.a. maintenance |
£450,000 | £67,500 |
Office Systems | Software modifications to 5 systems @ £75,000 each plus 15% p.a. maintenance |
£375,000 | £56,250 |
Community systems (Provider and Child Health Systems) |
Software modifications to 9 systems @ £75,000 each plus 15% p.a. maintenance |
£675,000 | £101,250 |
FHSA/DHA systems |
The Exeter system, which is MUMPS based, and district support systems. |
£2,000,000 | £300,000 |
National Systems | 15 systems, such as Breast screening, which are not owned by any of the identified organisations |
£1,125,000 | £168,750 |
GP Systems | Licence fees: 3000 sites @ £1,500 each and 6000 sites @ £100 each, plus 15% p.a. maintenance |
£5,100,000 | £765,000 |
Total cost for Global Cost Model 2 |
£14,275,000 | 2,466,250 |
There will also be a requirement for a few tens of man years of NHS internal resource (some of which may be provided by external agencies).
Information about the above systems is not complete. Details about the number of different systems used within the NHS and the number of major versions of these systems will need to be reviewed. For purposes of high-level costing, it is assumed here that there are four versions or types of each of the above systems.
Summary | |||
Setup-up cost (£) |
On-going cost (£) |
||
---|---|---|---|
GP systems | Global Cost Model 1 | £16,200,000 | £2,430,000 |
Global Cost Model 2 | £5,100,000 | £765,000 | |
Other systems | Global Cost Model 1 | £3,835,000 | £898,750 |
Global Cost Model 2 | £9,175,000 | £1,701,250 | |
Total | Global Cost Model 1 | £20,025,000 | £3,328,750 |
Global Cost Model 2 | £14,275,000 | £2,466,250 |
Each stakeholder will obtain some benefits from the use of encryption on the NWN, though these may well be different for different stakeholders.
Patients
Patients will benefit from the actual increase in security on the NWN, and
the level of benefit will increase in time with the degree of implementation
achieved. As Person Identifiable Data exchanged over the network is increasingly
protected, the risk to the patient of its disclosure and the possibility
of embarrassment or consequential financial penalty, will fall. Patients
will also benefit from having increased confidence in the practices of the
NHS, and from the increased quality of service provided by the healthcare
professions that will come with the increased automation and networking of
NHS systems enabled by NWN encryption.
Clinicians and health care professionals
These will benefit from being able to make wider use of the NWN so that they
achieve a reduction in bureaucracy and give better service to their clients.
Lack of encryption may have been a barrier to this in the past, and this
need no longer be the case with the introduction of encryption-enabled systems.
The level of benefit will increase with the extent of the implementation
of the encryption facilities.
To the degree that the encryption facilities are used to provide services other than network encryption, the clinicians and health care professionals would be able to protect confidential information in their care against other threats. For example, the use of encryption to protect data stored on PCs or hand-held equipment would protect the data from disclosure if the equipment were lost or stolen.
Health Care Managers
Health Care Managers are responsible for the end-systems and are, amongst
other things, responsible for ensuring that their systems are adequately
secure for the purposes to which they are to be used. To the degree that
their systems are exposed to networking security risks and these risks are
not otherwise covered by other countermeasures, the addition of encryption
to the NWN will provide them with an effective tool to manage those risks.
Encryption could be added in a way that was responsive to the business need
and technical environment. They will then be able to direct their attention
to addressing the other non-networking security risks to their end-systems,
and to fulfilling their responsibility to manage the full profile of risks
faced by their systems. Health care managers will also benefit from being
able to develop systems and automate processes that could not have been developed
or automated without the improved security facilities that would now become
available.
The Data Protection Registrar
The DPR will wish to be assured that Person Identifiable Data is protected
when transmitted across the NWN. Neither the current Data Protection legislation
nor the recently agreed EU Data Protection Directive mandates the use of
encryption; that is a matter of national interpretation. However, it should
be expected with confidence that the DPR would be pleased to see that personal
data was encrypted on the NWN.
The NHS Executive would benefit in a number of ways from the introduction of encryption on the NWN.
It is envisaged that many of the actions outlined below would be managed and carried out by the NHS Information Management Group, calling on assistance from external consultants as required. Owners of the applications may have to play a part in negotiating with application suppliers regarding the addition of encryption facilities, particularly if suppliers are not willing to carry the full development risk of the modifications themselves. The procurement strategy will need to pay attention to this possibility and aim to avoid it where possible.
A number of preliminary steps will be required to establish a firm direction for subsequent work. It is estimated that these will take in the order of three months to complete.
Following the satisfactory completion of the preliminary confirmations, the NHS will be able to advance into the planning of its implementation strategy. It will need to:
A multi-stage pilot programme may be needed before major implementation is attempted. The initial tasks within this programme will involve specification and development work before pilot testing can begin. It is estimated that the first stage of the pilot would take between a year and 18 months to complete. The successive overlapping stages of the pilot could each take nine to twelve months to complete.
Major steps within the first stage of the pilot would include:
Depending on the nature of the pilot implementation, the following may be required
Agreement will need to be reached with the early adopters of encryption regarding the relative implementation priorities to be given to each of their systems. These priorities will be drawn up on the basis of commercial, practical and security risk considerations as well as in the light of the pilot results. If the results of the pilot show that few modifications to the pilot technology (user, system or TTP technologies) are required for the initial phases of implementation, then the implementation process could begin almost immediately after the completion of the first stage of the pilot. The priority phases of implementation would probably take at least two years.
Steps to consider in the implementation process would include:
The Terms of Reference for the study, provided by the NHS Executive are given below.
Proposals are invited for carrying out this study. An early start is essential, but the completion date will be determined in the light of chosen study proposals.
There are two principal ways in which end-to-end encryption can be provided:
The preferred strategy must be to favour providing the encryption facilities to the networked application whenever possible and only where needed on a case by case basis to provide it directly on the network itself. There are several advantages to be gained by this:
Many applications in the NWN are of the messaging or file transfer type so that throughput is not a prime consideration. Cost is of importance, particularly at the GP end. Consequently, the software solution will often be the most appropriate. Having said that, there may well be some situations where hardware may still be appropriate, for example:
For any system, the preferred form of implementation will need to be determined by an analysis of the options and constraints. There should be no system or platform for which, if encryption or related services are required, it would not be possible to find a feasible implementation. Hence, encryption in one or other of the forms mentioned above should be feasible for mainframe or midrange host systems, client/server and PC-based systems, messaging and interactive systems, and so forth. It is believed that there are a considerable number of systems within the NHS which have been developed using MUMPS. MUMPS contains its own communications handlers and it has been suggested that these cannot readily be adapted to call encryption routines. If this is confirmed by further technical analysis, MUMPS systems may find they are not able to use the network-level security software option. In this case, they would be constrained to use other options, either application-level (Security API) software or network-attached (hardware) line encryption devices.
This appendix describes the process by which the study has arrived at its recommendations regarding the encryption algorithm and key management infrastructure that should be used. We do not attempt in this report to provide the user with an introduction to the use of cryptography or to the measurement of its capabilities. There are a number of available texts and reference sources which make the subject accessible to the interested reader and which should be available in any good sized technical library.
Two entities exchanging encrypted data across the NWN will need to share common cryptographic keys whilst ensuring that the keys used for decrypting data are kept secret. The mechanisms for exchanging these keys securely must, as far as possible, be invisible to the users of the systems involved.
This problem can be overcome with the use of a Trusted Third Party (TTP), and, indeed, a TTP is required for the proposed solution. However, this means that PGP could not be used as a strategic solution in its current form. Its wide scale use would require the modification of the package by the supplier to include interfaces to a TTP infrastructure
The NHS is, therefore, in the constrained position of needing to use an encryption algorithm that is sufficiency strong for its protection needs but which can also be made available across the NHS as a whole and to the NHS's many systems suppliers. Until recently, no such algorithm existed to be used by the NHS. However, within the last 12 months, this situation has changed. CESG has responded to this situation, which the NHS shares with many other large organisations outside the government or Financial Services sectors, by developing an algorithm known as Red Pike. The recommendation from CESG, and supported by Zergo, would be that the NHS should use this algorithm to meet its data encryption needs.
Red Pike has been released only recently and a number of necessary National Policy decisions were made by CESG in the last months of 1995 relating to its distribution and use. Red Pike can be implemented in software as well as in hardware, and in a number of forms to facilitate its use with a variety of systems and on a variety of platforms. There are no standards covering the use of Red Pike. However, Red Pike has been designed to share a number of characteristics with DES, for which there are many public standards. Hence, Red Pike could easily be used in accordance with those standards. And Red Pike can be released in appropriate forms to the NHS's suppliers, including those that are not solely UK-based.
Among the users of the NHS-wide networking system, there will be many users of encryption and, for each user, potentially many other users for which it will require new or unique keys to ensure secure communication. Hence, for many of the users, and certainly when looking across the NHS community as a whole, there will be many keys to be managed. For this reason of very large scale, it will be essential for the NHS to have a Key Management infrastructure that includes the use of asymmetric key management methods.
This would exclude the use by the NHS of the most long-standing and, therefore. widely used key management standards (for example. the ANSI X9.17 standard). However, asymmetric key management methods have been used and well proved in large networks (many thousands of users) in the last five years, and suitable international standards are now in existence for these.
It is strongly expected that the UK national scheme will be built around the use of D-H techniques. It is even more certain that the UK national scheme will not be built on the use of RSA techniques. Consequently, the advice from CESG, supported by Zergo, would be that the NHS should develop a Key Management infrastructure that uses D-H rather than RSA techniques.
The NHS could reserve its options in this regard by following a two stage strategy: it could develop a first stage infrastructure which used D-H without the KR capability; to be extended in a second stage when or if desirable to include the KR capability. The first stage might be needed only for the pilot. Alternatively, if the NHS so wished, the first stage could be used all the way through nation-wide implementation. It must be realised that, if the KR capability were to be introduced, it would lead to very tight operational controls being needed at the TTPs.
[Footnote 3] 3 DSA uses cryptographic keys and fuynctions which are very close to those used by D-H. Consequently, even though Digital Signatures cannot be provided by Red Pike, they can be introduced easily using functions implemented within the D-H key management scheme.
This use of encryption keys to encrypt other encryption keys is a well established Key Management technique and can be used to allow the frequent and automatic changing of message keys without the overhead of renewing frequently the higher-level D-H keys. Indeed, it is not unusual to have a multi-layered hierarchy of symmetric keys allowing the key at the top of the hierarchy to be changed only rarely whilst the keys at the bottom of the hierarchy can be changed automatically with each and every message. The NHS should build in to its Key Management infrastructure the flexibility to allow this key hierarchy technique to be used wherever needed.
The general problem with COTS products which do not use Red Pike are that they are either not available for the NHS's use or, if they are, they do not have an adequate level of cryptographic strength. There is one specific product, PGP, which does not suffer from these drawbacks. That has been dismissed as not being a suitable strategic solution for the NHS (see earlier in this Appendix), and a number of those reasons would also limit its suitability as a short-term solution. There are a growing number of E-mail security products, either on or coming to the market, which address some of the shortcomings of PGP, and one of these (at least one, to Zergo's knowledge) has recently been upgraded to incorporate the Red Pike algorithm. That product would have the following advantages as an interim solution for the NHS:
This product should not be seen as a strategic solution for the NHS for many of the same reasons that PGP is not (see earlier in this Appendix), and those are:
However, it might have some value as a short term, interim solution for a limited range of applications, and would warrant further investigation for adoption in this capacity. That further investigation should also identify any other such products which may be on or about to enter the market.
[Glossary missing from the photocopied text this was scanned from, if you have the glossary, please send it to me <aba@dcs.ex.ac.uk>, or snail mail me a paper copy of the glossary]