Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
SEC316: BitLocker™ Drive Encryption
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
NETWORK SECURITY.
Public Key Infrastructure Ammar Hasayen ….
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Storage Security and Management: Security Framework
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Week #7 Objectives: Secure Windows 7 Desktop
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 21 Distributed System Security Copyright © 2008.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Cryptography and Network Security (CS435) Part One (Introduction)
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Database Laboratory Regular Seminar TaeHoon Kim Article.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
TAG Presentation 18th May 2004 Paul Butler
Web Applications Security Cryptography 1
TAG Presentation 18th May 2004 Paul Butler
Hardware Cryptographic Coprocessor
UNIT 19 Data Security 2.
Module 8: Securing Network Traffic by Using IPSec and Certificates
IS3230 Access Security Unit 9 PKI and Encryption
Module 8: Securing Network Traffic by Using IPSec and Certificates
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security Product Management Christopher Gorog, PMP February 2, 2011

Misconceptions about Security I have encryption, isn’t that all I need Encryption is a property of data Data is scrambled using mathematical equations Data can be encrypted in transit, or at rest (memory) Encrypted data is unusable without the proper key Process of using encrypted data poses the security risk Keys to encrypt and/or decrypt have to be available Challenge is to control who or what has access to these values Encryption Key Encrypted Information Encrypt Decrypt Commonly used for data confidentiality Encryption

Transmission Networks Composed of many different types of systems Vast difference in resources (processing, memory, bandwidth, etc) Making the network operate together requires a unified security model that is the same in each system What needs to be considered for each system to get them all seamlessly working together

Components of System Security Initial Root of Trust (secure boot) Validation of operating software Identifying who is on either end of communications (Authentication) Confidentiality of data (Encryption) Verify communications are unaltered in transit (Integrity) Management and Storage of Identity (Keys and Certificates) Single system security model

Typical Advanced Metering Infrastructure (AMI) Network of microsystems interconnected Each component of system security implements cryptography Standard key management for each node Smart Grid Networks

Cryptographic IC for Network Management System of unmanned devices Security model spans the confines single device Management of network as a system Augmenting, updating the network Rotating and refreshing Recover from event or incident

Cryptographic IC for Product Management Ability to uniquely identify each and every product Where it has been, who has used it, where was it produced, etc.. Valuable data that allows 100% product verification anywhere Product chain security

The Business of Security Justifying the ROI on addition of a security IC Obvious result – network security and identity protection The best selling point for security is as a business enhancement – Management of deployed products – Organization of supply chain – Positive enforcement of usage – Verification of quality products

Product Management Solutions Enforcing a licensing model How to ensure that only licensed partners can use your design How to control numbers of licensed products on the market What happens to companies products after they are released to production? Many companies do not know the answer to this question Many that have tried to find out do not like what they discover Need a positive control of all aspects of supply chain Customer Quote “We have more products sold under our name that are not produced by us than what we produce”

Supply Chain Management Collect market trend and sales data Ensure revenue streams Track subcontractors success levels Market saturation control Limit warrantee and technical support cost Pricing control Control model compatibilities Track end user information Supply Chain auditing

Optional Material

Firmware and software protection Firmware root of trust Firmware download protections Confidential file protection Media download Facilitating key exchange Encrypting memory contents User authentication Tokens, dongles and two factor logon Call center support Battery authentication Networked device security Peer-to-peer systems Key Management (but used in many apps) Protecting communication Signatures and Certificates Verifying and encrypting Wireless network systems security Removable component authentication Consumable, peripheral, daughter card, etc… Mutual authentication Additional Product Uses

Key Management Entire network becomes one system System attributes Load keys securely Provide uniqueness Enable Authenticate (non - repudiation) Operate uniformity (synchronize with network) Refresh implementation (key rolling) Prevent tamper (software / key extraction) Etc. Modularity Core security uniformity Address all required attributes PKI, certificates, CA

Network Key Management Encrypted PII Every node produces unique and one-time use session keys Session keys can encrypt Personally Identifying Information (PII) Any node can be authenticated uniquely on network Each node can produce the same key anywhere on the network Create cryptographic communication keys on the fly Verify communication transmission Key PII Key AES Verify MAC

Authentication and Key Management

Key Management

Working Key Generation Hash & Secret Hash & Secret

Key Utilization

Why Hardware Security is Better ICs architected from ground up for security No exposed regular structures, no exposed test capability Internal clock generation, power regulation, environmental tamper detection Keys stored in memories have additional layers of protection Security procedures and protocols are hard coded, not subject to attack Only well protected information crosses the security perimeter Key Detection on Hard Drive Disk Standard chip design Tamper-resistant shielding