IEEE P1619.3 Architecture Subcommittee Conference Call January 24, 2008 1IEEE P1619.3 Architecture Subcommittee.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

Dynamic Symmetric Key Provisioning Protocol (DSKPP)
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Ferry Astika Saputra Workshop Administrasi Jaringan TELNET & SSH.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
6/3/20151 MARS... and the YEAR 2000 Management Administrative and Reporting System Commonwealth of Kentucky.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Saturday May 02 PST 4 PM. Saturday May 02 PST 10:00 PM.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Key Management in Cryptography
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
ATIS Liaison Pre-letter Ballot Review Security Management System (TMOC Issue 56) Chris Lonvick Joe Salowey Personal Liaisons to the TMOC Chair.
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CS 162 Discussion Section Week 1 (9/9 – 9/13) 1. Who am I? Kevin Klues Office Hours:
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
DICOM Security Lawrence Tarbox, Ph.D. Chair, WG 14 Mallinckrodt Institute of Radiology Washington University in St. Louis School of Medicine.
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
1 The OASIS KMIP Standard: Interoperability for the Cryptographic Ecosystem Jon Geater OASIS KMIP TC With thanks to Bob Griffin, co-chair,
Kuali Rice – ARC / TRC Update May 18, 2010 Eric Westfall – Kuali Rice Project Manager.
Proposed Revision of IEEE Standard SCC41 Meeting – Delft – 6 July 2010 Jim Hoffmeyer Western Telecom Consultants, Inc. Chair, IEEE Vice Chair,
SWIM-SUIT Information Models & Services
Query Health Distributed Population Queries Implementation Group Meeting January 17, 2012.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP Library Encryption - LTO4 Key.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
WEP Protocol Weaknesses and Vulnerabilities
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Operating Systems and Systems Programming CS162 Teaching Staff.
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
MNF SOP 18 After Action Review (AAR) 8-12 June 2015
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Doc.: IEEE /011 Submission January 2000 Al Petrick, ParkerVision TGd IEEE – TGd Jan 10 –15, 2000 Tel Aviv, Israel.
IEEE P Architecture Subcommittee Model Update and Discussion November 1, 2007.
May 9th 2011 IETF SIPREC INTERIM - draft-ietf-siprec-architecture 1 An Architecture for Media Recording using the Session Initiation Protocol draft-ietf-siprec-architecture.
Query Health Technical WG Update 1/12/2011. Agenda TopicTime Slot Administrative stuff and reminders2:00 – 2:05 pm Specification Updates QRDA HQMF Query.
Electronic Submission of Medical Documentation (esMD)
ATML Test Description Orlando, FL January ATML Test Description2 September 2006 Agenda Status Feedback from Candidate evaluation Review standard.
I2RS security Susan Hares (editor) And Discussion Team.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
Keyprov PSKC spec Philip Hoyer 71-st IETF, Philadelphia.
Portable Symmetric Key Container (PSKC) Mingliang Pei Philip Hoyer Dec. 3, th IETF, Vancouver.
IEEE P Architecture Subcommittee Conference Call November 15, IEEE P Architecture Subcommittee.
Keyprov PSKC spec Philip Hoyer 71-st IETF, Philadelphia.
Kelly Whitacre, Kunal Bele, and Mike Gerschefske.
Colorado Springs Producer-Archive Interface Specification Status of standardisation project Main characteristics, major changes, items pending.
May 2010 Slide 1 SG Communications Boot Camp Matt Gillmore 11/1/2010.
IEEE Security in Storage Working Group 1 Overview of the IEEE Security in Storage Working Group (SISWG) Matt Ball, SISWG Chair August 19, 2008 (As presented.
Draft-srinivasan-xcon-eventpkg- extension-01 IETF July 2007 Srivatsa Srinivasan Roni Even
SIPPING Working Group IETF 67 Mary Barnes Gonzalo Camarillo.
IEEE SISWG (P1619.3)‏ Messaging & Transport. AGENDA Transport Protocols & Channel Protection Messaging Layer Capability Exchange & Authentication Groups.
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
IEEE P Architecture Subcommittee
CS691 M2009 Semester Project PHILIP HUYNH
File Transfer Protocol
Web Conference Information Conference Call Information
CS691 M2009 Semester Project PHILIP HUYNH
nd Vice Chair’s Report – Jan 2013
nd Vice Chair’s Report – March 2013
March Liaison Report Date: Authors: March 2010
Overview of Improvements to Key Holder Protocols
Overview of Improvements to Key Holder Protocols
nd Vice Chair’s Report – Jan 2013
Interoperability Test Message Patterns for IEC
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

IEEE P Architecture Subcommittee Conference Call January 24, IEEE P Architecture Subcommittee

Agenda Review Previous Actions Discuss how to divvy up work on “General Concepts and Models” Proposal Levels of protection in architectural model Sequence model discussion Next Steps 2IEEE P Architecture Subcommittee

Review Past Action Items Publish next draft of model proposal Mike will publish next draft before face-to-face (Friday) This has been published. Commented at the face to face in Santa Ana. Create new policy model to replace figure 1 in D1 Landon (due by face-to-face, Friday) Still Open. Check with Landon. Refine sequence models and send to Landon/Bob Mike (due by next meeting ) Still Open? Check with Mike. Send P1619.3/D1 source to Mike Bob L. (by this week) This has been completed. Matt and Bob have this and it is on the website but password protected. Create new model that depicts passing key blobs between KMS to CU through KMC; also show policy passing between KMS/KMC Matt (by this Friday) Next call will be Thursday, February 10AM PST (1PM EST) 3IEEE P Architecture Subcommittee

Update l Mike will be temporarily unavailable as chair of the ARCH subcommittee for the time being. l Walt has agreed to act as acting chair.

P1619.3/D2 Outline Discussion The following is what was agreed to during the call: 1.Overview 2.Normative References 3.Definitions, Acronyms, Abbreviations 4.General Concepts and Models A.Overview B.Architecture Model C.Conceptual Model D.Key Lifecycle Model E.Key Management Sequence Models F.Key Management Objects 5.Key Name Space 6.Key Management Operations A.Key Management API Definition 7.Key Management Messaging 8.Key Management Transport 9.Requirements for KM Servers (shalls) 10.Requirements for KM Clients (shalls) 11.Requirements for KM SW Lib (shalls) 12.Annex A: Bibliography 13.Annex B: Example Use Cases 14.Annex C: XML and TLV Schema Definitions 15.Annex D: Comparison of Key Lifecycle Models 16.Annex E: Reference KM API Implementation 17.Annex F: Glossary 5IEEE P Architecture Subcommittee

P1619.3/D2 Outline Discussion Normative References (Mike) Definitions, Acronyms, Abbreviations (Mike) General Concepts and Models: 4.1Overview – need material from D1, Bob/Subhash will supply (Mike/Bob?) 4.2Architecture Model – In progress (Mike/Walt?/Subhash) 4.3Conceptual Model – In progress (Mike/Walt?) 4.4Key Lifecycle Model – In progress (Jon/Mike) 4.5Key Management Sequence Models – (Mike will base on OO proposal) 4.6 Key Management Objects – (Landon/Ravi) (Mike will use existing D1 material for now) 6IEEE P Architecture Subcommittee

Architecture Model Requirement Levels of Protection for keys and policies Protection for keys and policies may be different Potentially two authentication/certification/integrity-check mechanisms One between KMC and KMS KMCs manage policies, but may not manage encryption function itself (especially if KMC is distinct entity from CU) Used to protect policies and authenticate clients to servers KMC’s may not have visibility into key blobs (protected by the second protection mechanism); in this case the KMC is a pass-thru in relation to the key material One between CU and KMS Can the protected (wrapped) via symmetric or asymmetric key wrapping mechanisms Required when CUs must be FIP 140 compliant 7IEEE P Architecture Subcommittee

Sequence Model Discussion Requirements Keep to high level operations Accommodate synchronous and asynchronous ops Single threaded KMCs Multithreaded KMCs Requests with multiple object lists Questions about how to deal with partial responses 8IEEE P Architecture Subcommittee

Action Items Publish next draft of model proposal Mike will publish next draft before face-to-face (Friday) Create new policy model to replace figure 1 in D1 Landon (due by face-to-face, Friday) Refine sequence models and send to Landon/Bob Mike (due by next meeting) Send P1619.3/D1 source to Mike Bob L. (by this week) Create new model that depicts passing key blobs between KMS to CU through KMC; also show policy passing between KMS/KMC Matt (by this Friday) Next call will be Monday, Jan. 7 10AM PST (1PM EST) 9IEEE P Architecture Subcommittee

Models In Progress 10IEEE P Architecture Subcommittee

KM Sequence Models Purpose: High level model for API and KM Ops 11IEEE P Architecture Subcommittee

Completed Draft Models 12IEEE P Architecture Subcommittee

Architectural Key Mgmt Model 13IEEE P Architecture Subcommittee KM Server Storage Medium Data Transfer (outside of KMS) KMCS Ops KMSS Ops Key Backup/Archive KM Server Key Backup/Archive Encryption Entity Storage Medium Encryption Entity KM File Import/Export KMCS Ops Out of Scope Legend File transfer KM User In Scope

Conceptual Key Mgmt Model KM Server Encryption Entity Cryptographic Unit KM Client Encryption Users KM SW Lib (optional) KM API Storage Media Data Plane KMCS Ops Control Plane 14IEEE P Architecture Subcommittee Plaintext Data Encrypted Data Out of Scope Legend In Scope

Key Lifecycle Model 15IEEE P Architecture Subcommittee