© Synopsys 20121 IP Licensing Recommendations for P1735 Rev 4/16/12.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Cryptography and Network Security Chapter 17
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 8 Web Security.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
TLS PRF Considered Harmful Issues with implementing Hardware Security Module Support for TLS.
Cryptography CSS 329 Lecture 13:SSL.
1 Example security systems n Kerberos n Secure shell.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
The Secure Sockets Layer (SSL) Protocol
Security Outline Encryption Algorithms Authentication Protocols
Symmetric and Asymmetric Encryption
Cryptography and Network Security
Cryptography Why Cryptography Symmetric Encryption
Reactive Android Development
CSCE 715: Network Systems Security
Radius, LDAP, Radius used in Authenticating Users
Security.
Introduction to Security
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
Encryption
Cryptography.
Presented by: Dr. Munam Ali Shah
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS
Cryptography and Network Security
ANALYSIS OF WIRED EQUIVALENT PRIVACY
CS 465 TLS Last Updated: Oct 31, 2017.
PART VII Security.
Security in Network Communications
Cryptography and Network Security
Introduction to Symmetric-key and Public-key Cryptography
SSL (Secure Socket Layer)
Security.
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
Public Key Infrastructure
Secure Electronic Transactions (SET)
Chinese wall model in the internet Environment
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Advanced Computer Networks
Operating Systems Concepts
Protection Mechanisms in Security Management
Cryptography and Network Security
Introduction to Cryptography
Digital Signature Standard (DSS)
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

© Synopsys IP Licensing Recommendations for P1735 Rev 4/16/12

© Synopsys Introduction Motivation –Encryption and rights management covers per-tool rights –Also need per-user rights –A license can be used to allow any use or to expand rights Internal licensing (SNPS tool checking out snpslmd feature for example) is a good mechanism for EDA company’s own IP. Contractual restrictions on commercial licensing plus EDA company’s operations make internal licensing a bad choice for licensing third-party IP. Focus on external licensing where EDA tool communicates with a new licensing application.

© Synopsys Requirements Syntax in IP rights block supports internal and external licensing External licensing application can be on different machine/platform Communication standard allows new parties to participate without updates to EDA tools No shared secrets among parties

© Synopsys External Licensing EDA Tool IP IP License Proxy FLEXnet client or other authorization EDA Vendor IP Vendor

© Synopsys License Proxy Features Standardized secure communication with EDA application Socket-based communication for platform-independence, simplicity, and reliability Proxy has two parts. One communicates with the EDA tool. Other can be FLEXnet, Reprise, Safe-net, etc. client or can use arbitrary other authorization mechanism P1735 working group should supply a sample implementation

© Synopsys License Specification Specification is in rights block (common or tool-specific) The license can be associated with permission to use the IP at all or as a condition for granting other rights Example where license is required for any use: –control use=1,license a b c d e Example where license grants additional rights –control visibility=none –control visibility=all, license a b c d e Note that one IP can contain multiple envelopes. If more than one has the same license specification, proxy sees multiple requests but counts only one license

© Synopsys License Attributes (labeled a b c d e in previous slide) –Licenseproxy_name −Name of proxy. Tool will find proxy through an environment variable ${NAME}_LICENCE_PROXY. Value will be –Licenseproxy_pubkeymethod −Asymmetric cipher such as rsa2048 –Licenseproxy_symkeymethod −Symmetric cipher such as aes128-cbc –Licenseproxy_pubkeyblock −The public key that matches the private key hidden in the proxy. Encoding is same as for key block. –Licenseproxy_licensestring −A fixed feature name and/or string containing tokens that the EDA tool replaces with user name, host name, etc. for the case that license will only be granted for certain values.

© Synopsys License Attributes For case of internal licensing –Licenseproxy_name −Daemon name; must match daemon name of EDA tool –Licenseproxy_pubkeymethod −The digit 0 –Licenseproxy_symkeymethod −The digit 0 –Licenseproxy_pubkeyblock −The digit 0 –Licenseproxy_licensestring −A fixed feature name and/or string containing tokens that the EDA tool replaces with user name, host name, etc. for the case that license will only be granted for certain values.

© Synopsys Cryptography EDA Tool to Proxy –Key exchange −Generate a random session key −Encrypt session key with public key and transmit to proxy –Messages −Use session key with random IV to encrypt message −Transmit to proxy Proxy to EDA Tool –Messages −Use session key with random IV to encrypt message −Transmit to EDA tool

© Synopsys Message Details Initial message for key exchange –2 bytes indicating Length –1 byte indicating message type –The message Other messages after key exchange –2 bytes indicating Length –1 byte indicating message type –One block containing the initialization vector –The message

© Synopsys Communication Steps Launch the Proxy Contact the Proxy Initial Handshake License Request Grant or deny a license Heartbeats Release a license Details on each coming in white paper before end of April