Aircraft is a Node on the Internet

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Internet Protocol Security (IP Sec)
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Security Controls – What Works
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Cloud Usability Framework
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Washington System Center © 2005 IBM Corporation August 25, 2005 RDS Training Secure Socket Layer (SSL) Overview z/Series Security (Mary Sweat, Greg Boyd)
Public Key Infrastructure (PKI) Chien-Chung Shen
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
The Federal Information Processing Standards (FIPS) Encryption Suite Sean Smith COSC
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
CompTIA Security+ Study Guide (SY0-401)
NAAS 2.0 Features and Enhancements
Presentation transcript:

Aircraft is a Node on the Internet The aircraft shall require connectivity The aircraft shall require local processing and storage The system shall require access to data by users To achieve the first three items an approved measure of security is required This presentation will address the existing RTCA requirements, industry activities, and one solution

RTCA Aircraft Security Standards exist DO-326A - Adds to current guidance for aircraft certification to handle the threat of intentional unauthorized electronic interaction to aircraft safety. It adds data requirements and compliance objectives, as organized by generic activities for aircraft safety. DO-355 - A resource for civil aviation authorities and the aviation industry when the operation and maintenance of aircraft and the effect of information security threats can affect aircraft safety. Operation and maintenance of the aircraft related to information security threats are defined. DO-356 - This document describes guidelines, methods and tools used in performing an airworthiness security process.

RTCA DO-356 Minimum Assurance Levels Security has to meet DO-254 and/or DO-178 design assurance levels DO-356 indicates having layered security modules will allow for a jump up in design assurance level. E.g. Two Orthogonal HSMs in series at DAL C could provide DAL B data. Layered security should always be considered in a system’s design. (RTCA , “Airworthiness Security Methods and Considerations”, DO-356, 2014)

NIST Algorithms and Security Standards FIPS is a testable US government standard FIPS PUB 140-2: Specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive information in computer and telecommunication systems. FIPS PUB 191: Understanding the necessity to provide security on a LAN and how to decide the appropriate security measures needed. FIPS PUB 197: Specifies the Advanced Encryption Standard (AES), which is a symmetric block cipher that can process data using cipher keys. FIPS PUB 186-4: Specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of the signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory.

Certificate Authority One step in the process Certificate Authority (CA): is a trusted third party who validates keys for exchange in public domain Digital Certificates: Are electronic credentials that are used to assert the online identities of individuals and entities. Digital certificates are analogous to a passport or drivers licenses. Organization does due diligence to prove you are who you say you are and then issues you documentation proving it. Public Key Infrastructure (PKI): Certificates are issued to a specific public key, which is paired to a private key.

Cryptographic Key Management System Cryptographic key management system (CKMS): is how all the keys in a system, hierarchal or other, are managed. NIST SP 800-130: CKMS consists of policies, procedures, components and devices that used to protect, manage and distribute cryptographic keys and certain specific information, called metadata. Each vendor can create a CKMS, a standard for certificates similar to X.509, and everything else needed. Or we can produce a standard method and benefit together.

Manufacturing and Provisioning Security starts at unit Production (Atmel, “CryptoAuthentication”, 2014)

Security In Automotive Solutions exist Automobile industry is already doing this and there are many IC manufacturers supporting them. Freescale white paper: e.g. of manufacturer meeting the auto industry security requirements. Industry Standards used: National Institute of Standards and Technology (NIST), Hersteller Initiative Software (HIS) Working Group, Trusted Computing Group (TCG)

Malware Resistant Software: Is always changing, therefore, opening itself up to new security vulnerabilities everyday. Hardware: Never changes! Built to seasoned standards so trial and error is out of the way. Hardware implementations such as a Trusted Platform Module (TPM) from the TCG standards. ASICs standing on the back of well established standards like AES, SHA, ECDSA, etc. are the solution found by other industries thus far.

1NetTM Solution Beta tested and available System has moved 100s of millions of secure records 1NetTM v2 was launched to meet FIPS 140-2 and RTCA requirements Solution addresses security and certification issues for aircraft Thompson Aerospace will make patents and/or security modules available to any third parties based on a license agreement

Data Security is the Overriding Requirement for 1Net™ FIPS 140-2 Level 3 for Data Validity, Security and Access FIPS 140-2 Level 3 of security is used by the US government for secret information. FIPS is a verifiable standard and this level of data management will allow uploading and downloading of the most critical type of data. Hardware based Aircraft Trusted Platform Module (TPM) A TPM is the industry standard for creating, storing, and encrypting/decrypting keys. A hardware TPM provides an unhackable means of key management. An ECC trusted module that uses ECDSA (security means) validation for users ECDSA type security provides the best solution for embedded key protection. The application provides a hardware means of user identification to allow access to system data. Users are provided with an ECDSA dongle as a secure means of determining the Access Control List applicability. RTCA (Regulatory Group) DO-326, DO-355 and DO-356 provides the method for certification 1Net™ complies with RTCA requirements and FIPS 140-2 Level 3 data requirements. This provides the airline with the capability to meet the security system requirements for ISO 27001:2013. Security The RTCA requirements define methods to certify information technology for aircraft. Federal Information Protection Standards (FIPS) provide specific requirements to management data. 1Net™ hardware based data management solution is able to meet both FIPS and RTCA data management while meeting RTCA aircraft certification. Security is Available NOW

Our Patent Pending Hardware Security Solution CLOUD AIRCRAFT SYSTEMS DATA VPC AIRCRAFT Application HSM Client CSUv2 TLS TLS VPC Instance CloudHSM Virtual Private Cloud

Hardware Security Solution Off aircraft communications are handled by one eHSM and on aircraft communications handled by the other. This inherently uses dual orthogonal security modules in series. CLOUD AIRCRAFT SYSTEMS DATA Patent Pending

Amazon EC2 and HSM in the Cloud A good partner for aerospace Amazon Elastic Compute Cloud (Amazon EC2) allows computing instances in the cloud that can be attached to an HSM via a Virtual Private Network (VPC). Amazon Web Services (AWS) known for security prowess. Helped setup CIA’s private cloud computing network. Extremely convenient, secure, scalable way of setting up infrastructure Green Hills and Thales eSecurity offer solutions

ARINC 848 Considerations Authentication using a trusted CA certificate should be considered for units communicating off the aircraft. CKMS implementation shall be required to achieve security Hardware vs software security solutions need to be considered The solution need to be interoperable between suppliers Effective connectivity solutions will not be deployed without security