Understanding and Integrating KODAK Picture Authentication Cameras
|
|
|
- Nathan Black
- 10 years ago
- Views:
Transcription
1 Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images. Normally a compelling feature, the ability to modify images can be a serious problem when it enables business or legal records to be altered without detection. Increasing digitization of documents has raised concerns about maintaining the integrity of digital data as well as detecting and deterring fraud. In response to these concerns, Kodak has developed a Picture Authentication Module for the DC280 Camera to test captured images for authenticity with a high degree of confidence. While the concept of authentication is fairly straightforward, it is still new to most people. Like leaving your keys in the car or your house unlocked, it is possible have a top-notch security system that isn t managed well. The key is to understand the basic principles. Since it is relatively easy to design a workflow that incorporates picture authentication, it is likely that many businesses will choose to do so. The purpose of this document is to help you understand how KODAK Picture Authentication Cameras use encryption techniques to improve the security of your pictures. This document also explains how to integrate KODAK Authentication Cameras into your business workflow. Basic Digital Signature Technology Kodak has chosen to incorporate the Digital Signature Standard 1 (DSS) in its authentication product. The DSS technique is simple, robust, and sanctioned by the National Institute of Standards and Technology. The DSS uses public-key cryptography to carry out digital signature generation and verification. In the DSS scheme, the person or entity generating the digital signature (the signatory) holds a unique, secret key (the private key). An associated unique public key is freely distributed. The public key only allows verification of a digital signature created with the private key; it does not allow creation or modification of a digital signature. Broadly speaking, authentication is the process of determining whether an item has been altered since it was signed (that it is the same as it was when it left the signer s possession). Using a digital signature is a relatively simple way to enable authentication. Referring to figure 1, the process begins with a message that is to be transmitted. The first step is to represent the state of the message in a more condensed form by running the Secure Hash Algorithm (SHA-1) on the message, which generates a 160-bit message digest from the original message. The message digest is then input to the digital signature algorithm, which utilizes the signatory s private key to produce the digital signature. The digital signature is then appended to the message, and sent to the appropriate recipients. In essence, the digital signature is a locked record of the state of the message at the time it was signed. When the message is received, it passes through the same Secure Hash Algorithm, producing a new 160-bit digest value. The new message digest and the original signature are input to the digital signature verification algorithm, along with the signatory s public key. The verification algorithm essentially uses the public key to unlock the digital signature and then verify it against the new message digest. If it verifies, the message has not been changed since it was signed. 1
2 Fig. 1. The Digital Signature Standard This leads to an important point, and one that s not obvious in figure 1 the association between a signatory and the public key. If the receiver of the message had obtained the public key via a separate , there might be no assurance that the public key was indeed that of the assumed signatory. An impostor could have generated his own key pair and sent the impostor public key in the , posing as the actual signatory. He could have then forged the message to his own benefit, used his private key to sign it, and sent message and key to the receiver who would verify the signature. Therefore, without a certified binding between a public key and its owner, the digital signature is ineffective. In practice, including a mutually trusted party solves this problem; the trusted party certifies the association of a signatory and public key and then distributes the certified public key as necessary. In other words, a message is not authenticated until both the digital signature and the public key owner are verified. Of course, if an imposter discovers the private key without detection, then the system can be breached. KODAK Picture Authentication Module Overview The KODAK Picture Authentication Module architecture has three major components: authentication firmware on the camera, authentication software on a personal computer, and a simple public key management system to enable a trusted third party or third party proxy. In addition, a software API (application programming interface) is provided for integrating the digital signature verification and key management functions into a custom application. Camera Firmware In the KODAK Picture Authentication Module, a unique key pair must first be stored on each camera. The key pair is then used indefinitely; it can remain for the life of the camera or be replaced periodically as an additional security measure. A unique feature of the Picture Authentication Module is that the camera generates a unique key pair itself, without the need for another device. This increases security by confining the private key to the camera from the start. In contrast, if the private key was generated on another device and transferred to the camera, it might be stolen by intercepting the communication between devices. 2
3 Generating a non-deterministic, random key seed from a picture taken expressly for this purpose further increases security. The seed picture is taken during camera initialization and is destroyed immediately after the key seed is generated. Once the key pair is generated, the private key is hidden in the firmware, and the camera and authentication feature are ready for use. Signing Pictures The authentication firmware component signs the images. Referring to figure 2, Each image is JPEG-compressed by the standard camera firmware. Then the entropy-coded JPEG image data and the metadata are concatenated. The Secure Hash Algorithm is run on the concatenated data, generating the image digest. The digest and camera private key are input to the DSS Digital Signature Algorithm, which produces the digital signature for the image. The image file is written to the camera memory card, the digital signature and the camera s public key are written to the image file s authentication tag, and the process is complete. This process is repeated for every image captured, and cannot be disabled. Depending on the image size, the entire signing process adds only around 3-8 seconds to the standard image processing time for each image. JPEG Image data Metadata SHA-1 Private Key DSA Sign Operation Metadata Public Key Digital Signature JPEG JPEG or Image TIFF Data Image Data Image File Fig. 2. Digital signature generation in camera Image Signature Verification The KODAK Picture Authentication Software was written to perform the image digital signature verification. As illustrated in figure 3 (Application Window), the Picture Authentication Software first allows an image or group of images to be selected and loaded from a file browser. Once loaded, image thumbnails are displayed in the main window. You can then verify the digital signatures from one or all of the images by selecting the images and clicking Authenticate Pictures. 3
4 Referring to figure 4, the software reads the digital signature and camera public key from the authentication tag, concatenates the image data and metadata (excluding the authentication tag), and inputs the concatenated data to the Secure Hash Algorithm. The new message digest, the Fig. 3. KODAK Picture Authentication Software main window camera public key, and the digital signature are input to the Digital Signature Verification Algorithm. The results of the algorithm are posted next to each image. If no authentication data can be found in the image file, the user is so notified. Key Management Verifying the image s digital signature is a first line of defense, especially for detecting image tampering by an unsophisticated attacker. However, digital signature verification alone does not constitute image authentication, since the image could have been intercepted, altered, and resigned by a sophisticated impostor. Therefore, it is essential to know the possessor(s) of the private/public key pair used to sign the image and verify the signature, or at least to verify that the public key is legitimate and from a legitimate camera. As described earlier, a trusted third party is usually involved in a public key infrastructure in order to bind the identity of legitimate users to their keys and distribute the keys as required. When someone obtains a public key from a trusted third party, they have a degree of confidence that the key actually belongs to the particular entity (person, camera), depending on the degree of certification and the policies and procedures of the third party. The KODAK Picture Authentication Module has a provision for such a third party, or at least a proxy thereof, by allowing one to record and save public keys from each camera. 4
5 Image File Metadata Public Key Digital Signature JPEG Image Data SHA-1 DSA Verify Operation Signature Verified/Signature Verification Failed Fig. 4. Digital signature verification on host Key recording is done as follows: after the camera generates the public and private key pair, an initial picture is taken and transferred to a computer on which the Picture Authentication Software is installed. The subject of the image is not important, since the file is simply a vehicle for the camera public key. The Picture Authentication Software allows you to extract the public key and some other pertinent data from the image file to a special key file. Key files from all of the customer s cameras can then be gathered and managed in any way the customer wants, from storage in a vault to management by a full-fledged certification authority. Because this process is vulnerable to attack, for instance an impostor inserting his or her public key as a legitimate one, it is imperative that the customer extracts and collects the keys in a secure location and then brings them to a secure destination. Once the public keys are stored securely, the database can be consulted at any time to validate legitimate keys. How this is done in practice will depend on the customer, but the following scenario is illustrative. Customer Use Scenario The following use scenario illustrates how the KODAK Picture Authentication Module might be used in a larger organization. The customer procures cameras and they are initialized at a dedicated, secure workstation by a trustworthy technician. After camera initialization, the technician takes the first picture for key extraction. The resulting image file, which is the usual JPEG file, is transported to the computer. From the Picture Authentication Software window, the technician loads and selects that first 5
6 image and extracts its public key. The extracted key data is recorded in the key file in the designated directory. As the customer receives and initializes camera shipments in this manner, the camera key files are collected by the technician and transferred to the secure key database. Meanwhile, a third party software developer has written software that uses the digital signature verification and key extraction API s and has written automated image authentication software which integrates into the customer s secure image database infrastructure. As users at remote sites upload images to the image database, the authentication software on a secure server analyzes each image. First, the public key is extracted from the incoming image file and then compared with the existing key database. If a match is found, the public key is considered legitimate; it belongs to one of the registered cameras in the field. The digital signature verification is then run to determine if the image was altered since it was signed at the time of capture. If the signature is verified, then the image is considered authentic. If the key does not match the ones in the database or if the digital signature does not verify, a message is generated and the case handled appropriately. The image authentication system also allows authentication testing to be performed manually. This might be done routinely by a smaller organization or occasionally by a lawyer or administrator in larger organization if another party happens to challenge the authenticity of a particular image. In the case of manual authentication, it is assumed that all aspects of transporting images and other data are done so securely, even if they are manual operations. For instance, the image is transported under appropriate custody to a standalone personal computer, for example, where a pristine signature verification application resides. An authorized copy of the key database is also brought to the computer under careful custody. An authorized individual launches the application, locates the image, and runs the verification test. The application verifies the image s digital signature using the public key from the image file. Next, the user needs to know if the public key on the image file is a legitimate one. The user selects the key extraction function and extracts the public key to a new key file on the computer. The user then opens the file with a text editor and observes the public key value. Using a standard program to search files for text strings, the user searches the key database for the key value extracted from the file. A match is made. The user has now determined the key is legitimate and the signature is verified. The user is now confident that the image is indeed authentic. Security Considerations While the KODAK Picture Authentication Module provides the components needed for reliable picture authentication, the customer must deploy the system with the proper security measures. While detailed security instructions are beyond the scope of this document, it is assumed that the technical details disclosed provide sufficient information for qualified persons or groups to architect, deploy, and administer their picture authentication system properly. Camera Custodianship However unlikely, a camera is somewhat vulnerable to attack. An unsupervised camera could be reverse-engineered, revealing its private key. Possession of a legitimate private key by an impostor can allow images to be forged without detection. Therefore, proper custody of each camera is absolutely critical throughout its service life, beginning immediately upon receipt of the camera unit(s) 6
7 Initialization As described earlier, the unique private/public key pair is generated on the camera at initialization time. Trusted individuals should perform this initialization in a secure and properly supervised location. Key Extraction Once each camera is initialized and the public key is extracted, the public key should be transferred immediately from the camera to a secure file system* according to the product instructions. This is a vulnerable step, since this is where an impostor could enter an illegitimate public key to the collection of legitimate ones. Thus, key extraction must take place in a secure location on secure computing equipment. It is extremely important that the public keys be in secure custody from the time of extraction to their final destination. *In this step, the file system must not be accessible by unauthorized parties. It could be behind a secure firewall, or it could be simply on a properly initialized and supervised standalone (non-networked) personal computer. Camera Use Once the public key is extracted from a camera and stored properly, the camera can be put into service. Proper custodianship must continue as the camera is transferred to users. For example the camera must be used only by authorized individuals and either properly supervised or stored between uses. Authentication Picture authentication must also be performed in a secure location, since it is possible that an impostor could modify the authentication software to give incorrect results. The Customer Use Scenario described earlier covers two authentication procedures. One is done routinely as part of an automated process and the other is done on a standalone computer. In both cases, the following two important security issues must be understood. Recall that an image can be considered authentic only if both the digital signature and the public key are verified. Referring back to figure 3, note that the digital signature verification is performed using information carried in the image file. To alter the results of the digital signature verification, an attacker could simply alter the signature verification software on a computer. Thus this process must occur on a secure computer. The public key verification can only occur by comparing the public key in the image file with the public key in the key database. Not only must the key verification software be protected, the public key information must be retrieved from the database in a secure fashion, regardless of whether the key information is transmitted across a network, or by hand on a diskette. Decommissioning Keys It may be prudent to periodically decommission key pairs. Decommissioned public keys would be transferred to a separate, secure database, with a record of the decommission date for each key. Reinstalling the firmware and reinitializing each camera would generate new key pairs (the decommissioned private key is destroyed in the process). If routine decommissioning were practiced, each key pair would be valid only during the life of the key pair on the camera. In some cases, periodic decommissioning and regeneration of new keys could thwart reverse engineering of cameras to obtain private keys. Because keys are shortlived and valid only for the life of the key pair on the camera, reverse engineering a camera to discover it s private key is less advantageous. Illegitimate use of a stolen private key could be detectable once the key pair had been decommissioned. 7
8 Summary Through proper use of authentication-enabled digital cameras and key management techniques, businesses can greatly improve the security of images that move through their workflows. The DSS algorithm provides a trusted, secure method for enabling this process. References 1. U.S. Department of Commerce, National Institute of Standards and Technology FIPS PUB 186-1, 8
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, FIPS Publication 186-3 (dated June 2009), was superseded on July 19, 2013 and is provided here only for historical purposes. For the most current revision
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Digital signature in insecure environments
Digital signature in insecure environments Janne Varjus Helsinki University of Technology [email protected] Abstract Due to current legislation the digital signatures can be as valid as the hand written
Oracle WebCenter Content
Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: [email protected] Introduction In May 2011, US Data Management (USDM) was
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know
Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com [email protected] detecting the unknown Integrity
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
Voltage's Encrypted Email
Voltage's Encrypted Email October 2004. Report #471 Ferris Research Product Brief Sponsored by Ferris Research, Inc. 408 Columbus Ave., Suite 1 San Francisco, Calif. 94133, USA Phone: +1 (415) 986-1414
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Security Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Guideline for Implementing Cryptography In the Federal Government
NIST Special Publication 800-21 [Second Edition] Guideline for Implementing Cryptography In the Federal Government Elaine B. Barker, William C. Barker, Annabelle Lee I N F O R M A T I O N S E C U R I T
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures Overview One of the most popular applications of InfoCenter Suite is to help FDA regulated companies comply with
Vendor Questions. esignatures Request for information InsureSign
InsureSign Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
E-Book Security Assessment: NuvoMedia Rocket ebook TM
E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
www.studymafia.org Seminar report Digital Signature Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science
A Seminar report on Digital Signature Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance
ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1
Zentrum für sichere Informationstechnologie Austria Secure Information Technology Center Austria A-1030 Wien, Seidlgasse 22 / 9 Tel.: (+43 1) 503 19 63 0 Fax: (+43 1) 503 19 63 66 A-8010 Graz, Inffeldgasse
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
TERMS AND CONDITIONS OF REMOTE DATA TRANSMISSION
TERMS AND CONDITIONS OF REMOTE DATA TRANSMISSION I. Scope of services 1. The bank offers to its customers (account holders) data transmission by electronic means hereinafter referred to as remote data
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
