Securing Data at the Speed of Light with gkrypt
|
|
|
- Violet Bishop
- 10 years ago
- Views:
Transcription
1 White Paper Securing Data at the Speed of Light with gkrypt V1.2
2 Table of Contents Introduction...3 gkrypt Overview...6 Functionality & Support...6 Ciphers...6 Hashing...6 Compression...6 Supported GPUs...6 Supported CPUs...7 gkrypt Architecture Overview...8 gkrypt Usage Scenarios Data at Rest Data in Motion Network Data Data in Process Usage Scenarios Enhanced Performance Performance Implications for Consumer Applications Performance Implications for Enterprise Applications... 13
3 Introduction As enterprise and consumer software transitions to the Cloud, there s an acute need for painless data security solutions which help protect your conversations, data and transactions in all their states. Every year, billions of dollars go down the drain as a result of data breaches. The centerpiece for any data security solution is encryption, which scrambles data, rendering it useless for an intruder and represents the last line of defense. Strong encryption schemes like AES, however, put an undesired burden on the processor, something known as performance tax in the industry. gkrypt eliminates encryption induced performance degradation by hyper-accelerating encryption on graphic chips or GPUs, all the while supporting hardware accelerated CPU based encryption. While startups may decide to compromise the security of their consumer data through unencrypted data storage on the cloud, enterprise is still reluctant to buy into the promise of PaaS. Regulations like HIPAA, HITECH and PCI-DSS etc. have developed teeth, exponentially increasing the cost of a data breach, both financial and the loss of business credibility. Cryptography is at the core of any effective data security solution since it scrambles data datain-motion illegible. When all data is encrypted, in an event of security breach, the confidentiality of the data will not be compromised even if the physical storage medium is stolen and under current regulations, if the stolen data is encrypted, the company does not has to reveal the breach to its customers which ultimately saves its business credibility and customer confidence. As lucrative as cryptography may sound, it comes at a cost, commonly referred to as performance tax in the industry because data encryption is a compute intensive process which requires dedicated processor power. The most widely adopted cipher is AES, approved by US Government in 2001 and incorporated by NIST as FIPS 197 publication. It is offered by almost every crypto module. Its w i d e s p r e a d adoption was primarily fuelled by the fact that up to this day, no AES crack has been reported.
4 Introduction Challenge Solution Implications Immunize confidential data: Prevent compromising confidential data in all its states, a) Data at rest b) In motion and c) data in application, as a last shield of defense. Achieve this with no impact on performance or increased TCO. Secure all data with AES: Implement AES cipher as the core component of data security strategy. Achieve zero impact on performance by utilizing gkrypt for AES encryption and decryption. Customer confidence: Business credibility and customer confidence is reinforced when you make your security policy compliant with relevant regulation/s, immunizing sensitive data even in the case of data breach. Lower implementation, operating costs and TCO: The use of gkrypt eliminates the need for acquiring new high-end CPUs like Intel Xeon processors for encryption.
5 This paper presents gkrypt as an attractive solution to secure data without compromising performance and lowering the implementation and operational costs at the same time. I will walk through usage scenarios in both states of data: At rest and in motion. gkrypt s architecture is discussed and finally performance gains are shown when compared with Intel AES-NI, the gold-standard in AES performance. Some useful definitions before we begin. Advanced Encryption Standard (AES) AES is a variant of Rijndael block cipher which limits the data block size to 128 bits and permits three key sizes, 128-bit, 192- bit and 256-bit. AES has been adopted as encryption standard by U.S. government since 2001[1]. Deflate Deflate is a lossless data compression algorithm that uses a combination of the LZ77 algorithm [2] and Huffman coding to achieve better compression ratio compared to either of its building blocks. It was originally defined by Phil Katz for version 2 of his PKZIP archiving tool, and was later specified in RFC 1951[3]. Deflate is currently being used in PKZIP, gzip, zlib and 7-zip compression tools. Hash Function Cryptographic hash functions are algorithms that take an arbitrary block of data (message) and return a fixed-size bit string, referred as hash value or message digest, such that an accidental or intentional change of data will change the hash value with very high probability. Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (MACs), and password verification. Block Cipher An encryption algorithm which works on fixedlength groups of bytes, called blocks, is referred as Block Cipher. The inverse of block cipher is stream cipher which can encrypt and decrypt data with arbitrary length. Huffman Coding Huffman is an entropy encoding scheme which achieves compression by assigning smaller codes to frequently used symbols and longer codes to less frequent symbols. Huffman coding is frequently used for lossless data compression. Lempel Ziv (LZ77) LZ-77 is a lossless data compression algorithm, published by Abraham Lempel and Jacob Ziv in 1977; hence the name LZ77. The algorithm operate by searching for matches between the text to be compressed and a set of strings contained in a data structure (called the 'dictionary') maintained by the encoder. When the encoder finds such a match, it substitutes a reference to the string's position in the data structure and achieves compression.
6 Rijndael Rijndael is a collection of block ciphers proposed by Belgian cryptographers, Joan Daemen and Vincent Rijmen, for NIST initiated AES selection process. The Rijndael comprises three block ciphers with 128, 192 and 256 bits block sizes. Each of these block ciphers can be used with key sizes of 128, 192 and 256 bits; providing nine possible variants. HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L , 110 Stat. 1936, enacted August 21, 1996) was enacted by the United States Congress and signed by President Bill Clinton in Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers. Secure Hashing Algorithm (SHA) SHA is set of cryptographic hash functions designed by National Security Agency (NSA) and published as U.S. Federal Information Processing Standard (FIPS). The first member of SHA family was published in 1993 and was replaced by SHA-1 in 1995, to address a security flaw in the initial version. HITECH Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment Act of 2009, addresses the privacy and security concerns associated with the electronic transmission of health information. The HITECH Act requires HIPAA covered entities to report data breaches affecting 500 or more individuals to HHS and the media, in addition to notifying the affected individuals. PCI-DSS The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards. Defined by the Payment Card Industry Security Standards Council, the standard was created to increase controls around cardholder data to reduce credit card fraud via its exposure. Validation of compliance is done annually by an external Qualified Security Assessor (QSA) for organizations handling large volumes of transactions, or by Self- Assessment Questionnaire (SAQ) for companies handling smaller volumes.
7 gkrypt Overview gkrypt is the first crypto module customized to use GPUs as accelerators to swiftly secure your applications with increased system responsiveness. gkrypt supports both CUDA and OpenCL technologies to run on a wide range of hardware including Nvidia Tesla, Geforce, Quadro as well AMD Radeon and FireStream series for both desktop and mobile variants. Furthermore, due to highly optimized parallel pipelines, it delivers many times performance gains compared to current solutions, including Intel AES-NI, while retaining the security characteristics. Being fully backward compatible with CPU only machines, you always know that the best resources of your system are utilized without sacrificing compatibility using gkrypt. The added support for multi-gpus and Nvidia Kepler based GPUs ensures maximum performance for devices supporting PCI Express 3.0 bus giving up to 80Gbps application throughput per device for AES 256-bit in consumer and enterprise systems. Functionality & Support Ciphers gkrypt supports complete set of Rijndael block ciphers with all possible block sizes and key sizes. A brief list of the primary cipher routines is listed below. This is a condensed list which covers the core cipher routines available in gkrypt. For complete list of functionality, refer to the Documentation which comes with the package. gktrijndael128[encrypt/decrypt]ecb Encrypt/Decrypt with Rijndael 128 Supported Key Sizes: 128,192 and 256bits gktrijndael192[encrypt/decrypt]ecb Encrypt/Decrypt with Rijndael 192 Supported Key Sizes: 128,192 and 256bits gktrijndael256[encrypt/decrypt]ecb Encrypt/Decrypt with Rijndael 256 Supported Key Sizes: 128,192 and 256bits Hashing Compression Supported GPUs Supported CPUs GPU APIs Multiplatform Multilingual SHA-1 and MD5 LZ-77 variant data compression NVIDIA and AMD Intel and AMD. AES-NI is used for Sandy Bridge and later architectures NVIDIA CUDA and Khronos OpenCL Microsoft Windows, Linux and Apple Mac OS C/C++, Java*, C#* and Python*
8 gkrypt Architecture Overview
9 gkrypt Usage Scenarios There are two distinct types of data that may be secured with encryption: Data at rest and data in motion. Data in motion is further expanded into data in application and network data. This section lays out potential use cases for different types of data. There are standards and protocols governing data in each of these types and AES encryption is already supported in most if not all of them. With gkrypt, we attain two primary benefits: Improved encryption speed. Extremely low CPU occupancy which means minimal performance tax. The combination of accelerated encryption and no additional workload for the CPU manifests in all three types of data. The following subsections give an overview of protocols and standard used in each type of data. 1. Data at Rest This consists of all types of data storage mediums including magnetic disks, SSDs etc and the solutions for encrypting data at rest are broadly categorized as FDE (Full Disk Encryption). With the adoption of Cloud model, the demand for data storage has risen exponentially and so is the threat to the stored data which is why enterprise applications are still reluctant to move valuable data to public clouds. Securing peta-bytes of data using encryption is a natural solution but it comes at a very cost to performance and demands hefty investment in more computing power to make encryption a feasible solution. One possible solution is Intel s newly introduced AES-NI (AES New Instructions) in Xeon 5600 series processors but it also has the downside of (still) putting additional workload on an already occupied CPU. Commercial as well as (Free) Open Source solutions have adopted this for their FDE offerings. With gkrypt, the need for purchasing expensive Xeon series processors is eliminated since the bulk of the encryption work is done on the GPU, sparing the CPU to continue processing business logic of the application. As already explained, gkrypt implements the AES standard and therefore, since it is backward compatible, ISVs as well as end-user scan easily put gkrypt s AES encryption/decryption functions in their libraries/applications.
10 2. Data in Motion As already mentioned, data in motion is further categorized into network data and data in processing. We will briefly touch both these types and where gkrypt fits in the stack. 2.1 Network Data Millions if not billions of transactions conclude every hour over the internet and intranet (local LAN). The secure set of protocols like HTTPS, SSL, TLS, IPSec etc all use some form of data encryption for secure communication over the internet. These protocols also support AES- 128 encryption. A typical transaction would begin with a handshake between the client and the server. Once that s established and keys are shared, which in case of asymmetric cipher would be a pair of keys and in case of symmetric cipher technique, would be one key shared with both server and client, actual communication begins. Client encrypts outgoing bytes and decrypts incoming bytes. This is where gkrypt comes in. As in the case of data-atrest, CPU based AES routines are replaced with gkrypt s AES routines. No change in code required and the result is improved encryption speed and drastically reduced CPU workload. 2.2 Data in Process One of the primary examples of data in process is the database encryption at cell, column and database table level. Every enterprise database offers something called TDE Transparent Data Encryption where, as the name specifies, data is encrypted in real-time, transparent from the user/admin which saves additional complexity while inserting and fetching data and also gives database manufacturers the option to keep the business logic separate from data security functionality. There are 3 rd party solutions for adding TDE in popular databases like MySQL, Oracle, MS SQL Server. These TDE solutions in turn use cryptography libraries to perform the encryption/decryption of data. Out of all other use cases for data encryption, this is the most demanding use case in terms of performance since database transactions need to happen in real-time and we cannot wait, for example, to insert rows in bulk while they re being encrypted. Again, Intel IPP Cryptography (which uses AES- NI on Xeon 5600 series processor) is a viable option but gkrypt adds even more value by eliminating the need to buy more expensive computing resources to add encryption while keeping up with the same level of performance.
11 Usage Scenarios
12 Enhanced Performance This section compares gkrypt s performance with Intel IPP (AES-NI ) which is a gold standard for high performance AES routines. Performance gains are two-fold, first it shows how fast gkrypt s AES routines are compared with Intel IPP and second is the fact that this performance is achieved without putting any encryption related workload on the CPU, hence zero performance-tax. Performance of a cipher implementation may be gauged by metrics like the function/kernel level throughput, application level throughput which is also an indicator of the specific implementation methodology used. We will use the application throughput metric to compare gkrypt against Intel IPP with and without Intel AES-NI. The Benchmarking system is equipped with a second generation Intel Core i7 2600k CPU running at 3.4 GHz, 8GB DDR3 RAM and NVIDIA TESLA C2050 GPU.
13 Performance Implications for Consumer Applications In consumer applications that require real-time and high throughput processing, the CPU is completely or partially paralyzed due to increased overload of cryptography and the application performance suffers. This causes stutters, reduced system responsiveness, resource failures and hang-ups. Such applications include video conferencing, file sharing/sending software, desktop virtualization, online collaboration tools, network gaming, web browsers, cloud applications, full disk encryption and many more. The gkrypt can offload the encryption functionality if a GPU is available in the system, sparing the CPU to focus on the application processing. This improves system responsiveness and speed while keeping your data equally secure.
14 Performance Implications for Enterprise Applications The enterprise solution developers can easily cash upon the parallel processing potential of GPUs. gkrypt provides up to 10GB/sec per GPU application throughput for AES 256-bit Encryption/Decryption. This can be scaled to up to 8 GPUs with as much as 1536 processing cores per device to get up to 8X performance increment. This is ideal to tackle the huge workloads in database encryption (TDE), cloud based services, backend servers, CRM and ERP applications, online payment systems, full disk encryption software, RSA and SSL handshaking, networking applications, online data storage and retrieval, operating systems and low level transport protocols among others. Due to higher performance per watt, ease of deployment and scaling as well as reduced costs, the gkrypt supporting GPU technologies for CUDA and OpenCL ensures most optimized systems for compute intensive cryptography workloads. Conclusion The need for securing sensitive information cannot be overemphasized. gkrypt boosts the encryption performance without requiring dedicated expensive processors, which effectively removes the performance-tax by reducing the cost and complexity from cryptography.
15 Download & Contacts You can get started right away by contacting us on the website for evaluation. We have made a very nice, easy to use Windows file encryption app which uses gkrypt for encryption. You can download this app and try it on your PC. It has a Speed tab which tells you real-time encryption throughput for your CPU and GPU. Finally, you can contact us through and/or phone. Website gkrypt.com Evaluation Request gkrypt.com/contact [email protected]
16 REFERENCES [1] Announcing the ADVANCED ENCRYPTION STANDARD (AES) Federal Information Processing Standards Publications, November 26, [2] A Universal Algorithm for Sequential Data Compression, Jacob Ziv and Abraham Lempel; IEEE Transactions on Information Theory, Vol. 23, No. 3, pp , May 1977.
17 Notice ALL INFORMATION PROVIDED IN THIS WHITE PAPER, INCLUDING COMMENTARY, OPINION, GKRYPT ENGINE DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, MATERIALS ) ARE BEING PROVIDED AS IS. GKRYPT DSS MAKES NO WARRANTIES, EXPRESSED, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO MATERIALS, AND EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. Information furnished is believed to be accurate and reliable. However, TunaCode assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of TunaCode. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. TunaCode products are not authorized for use as critical components in life support devices or systems without express written approval of TunaCode Inc. Copyright 2013 TunaCode Inc. All rights reserved
NVIDIA VIDEO ENCODER 5.0
NVIDIA VIDEO ENCODER 5.0 NVENC_DA-06209-001_v06 November 2014 Application Note NVENC - NVIDIA Hardware Video Encoder 5.0 NVENC_DA-06209-001_v06 i DOCUMENT CHANGE HISTORY NVENC_DA-06209-001_v06 Version
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
NVIDIA GeForce Experience
NVIDIA GeForce Experience DU-05620-001_v02 October 9, 2012 User Guide TABLE OF CONTENTS 1 NVIDIA GeForce Experience User Guide... 1 About GeForce Experience... 1 Installing and Setting Up GeForce Experience...
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
NVIDIA GeForce GTX 580 GPU Datasheet
NVIDIA GeForce GTX 580 GPU Datasheet NVIDIA GeForce GTX 580 GPU Datasheet 3D Graphics Full Microsoft DirectX 11 Shader Model 5.0 support: o NVIDIA PolyMorph Engine with distributed HW tessellation engines
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE
HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
Oracle White Paper October 2010. Oracle Advanced Security with Oracle Database 11g Release 2
Oracle White Paper October 2010 Oracle Advanced Security with Oracle Database 11g Release 2 Introduction... 1 Oracle Advanced Security... 2 Transparent Data Encryption... 3 Support for hardware-based encryption
Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012
Securing Your Sensitive Data with EKM & TDE on SQL Server 2008/2012 About The Speaker Founder & CEO of Townsend Security Leading data security expert 30 years IT industry experience Introduction Organizations
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
NVIDIA GRID DASSAULT CATIA V5/V6 SCALABILITY GUIDE. NVIDIA Performance Engineering Labs PerfEngDoc-SG-DSC01v1 March 2016
NVIDIA GRID DASSAULT V5/V6 SCALABILITY GUIDE NVIDIA Performance Engineering Labs PerfEngDoc-SG-DSC01v1 March 2016 HOW MANY USERS CAN I GET ON A SERVER? The purpose of this guide is to give a detailed analysis
Alliance Key Manager Cloud HSM Frequently Asked Questions
Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager
End-to-End Enterprise Encryption:
End-to-End Enterprise Encryption: A Look at SecureZIP Technology T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents SecureZIP Executive Summary SecureZIP: The Next Generation of ZIP PKZIP:
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Summary of Results. NGINX SSL Performance
NGINX SSL NGINX is commonly used to terminate encrypted SSL and TLS connections on behalf of upstream web and application servers. SSL termination at the edge of an application reduces the load on internal
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Tools for Managing Big Data Analytics on z/os
Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID 14948 Test link: www.share.org Introduction Heterogeneous Analysis Addressing
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
The Encryption Technology of Automatic Teller Machine Networks
Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller
Query Acceleration of Oracle Database 12c In-Memory using Software on Chip Technology with Fujitsu M10 SPARC Servers
Query Acceleration of Oracle Database 12c In-Memory using Software on Chip Technology with Fujitsu M10 SPARC Servers 1 Table of Contents Table of Contents2 1 Introduction 3 2 Oracle Database In-Memory
Key Management in the Multi-Platform Environment
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
SierraVMI Sizing Guide
SierraVMI Sizing Guide July 2015 SierraVMI Sizing Guide This document provides guidelines for choosing the optimal server hardware to host the SierraVMI gateway and the Android application server. The
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets
WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
All Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
Vormetric Encryption Architecture Overview
Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732
Whitepaper. NVIDIA Miracast Wireless Display Architecture
Whitepaper NVIDIA Miracast Wireless Display Architecture 1 Table of Content Miracast Wireless Display Background... 3 NVIDIA Miracast Architecture... 4 Benefits of NVIDIA Miracast Architecture... 5 Summary...
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
Blaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs
Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of
Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery
WHITE PAPER Cost-Efficient SSL Application Delivery Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery Always On SSL Since 1994, enterprises looking to protect the security
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise [email protected] Agenda Evaluation
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE By Libby McTeer CONTENTS ABSTRACT 3 WHAT IS ENCRYPTION? 3 WHY SHOULD I USE ENCRYPTION? 3 ENCRYPTION METHOD OVERVIEW 4 LTO4 ENCRYPTION BASICS 5 ENCRYPTION
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Several tips on how to choose a suitable computer
Several tips on how to choose a suitable computer This document provides more specific information on how to choose a computer that will be suitable for scanning and postprocessing of your data with Artec
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:
Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Haswell Cryptographic Performance
White Paper Sean Gulley Vinodh Gopal IA Architects Intel Corporation Haswell Cryptographic Performance July 2013 329282-001 Executive Summary The new Haswell microarchitecture featured in the 4 th generation
Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database
JIOS, VOL. 35, NO. 1 (2011) SUBMITTED 02/11; ACCEPTED 06/11 UDC 004.75 Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database University of Ljubljana Faculty of Computer and Information
How to choose a suitable computer
How to choose a suitable computer This document provides more specific information on how to choose a computer that will be suitable for scanning and post-processing your data with Artec Studio. While
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications Ruei-Ting Gu [email protected] Kuo-Huang Chung [email protected]
Fast, Low-Overhead Encryption for Apache Hadoop*
Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software
Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration
Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration Windows Embedded Technical Article Summary: Microsoft RemoteFX is a new Windows Server 2008 R2 SP1 feature that enables
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
NetScaler 2048-bit SSL Performance
WHITE PAPER NetScaler Performance NetScaler 2048-bit SSL Performance July 2010 www.citrix.com/netscaler Overview NetScaler 9.2 boosts SSL performance with 2048-bit keys 5X to meet the needs of customers
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Encryption Key Management for Microsoft SQL Server 2008/2014
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
HOW MANY USERS CAN I GET ON A SERVER? This is a typical conversation we have with customers considering NVIDIA GRID vgpu:
THE QUESTION HOW MANY USERS CAN I GET ON A SERVER? This is a typical conversation we have with customers considering NVIDIA GRID vgpu: How many users can I get on a server? NVIDIA: What is their primary
Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services
International Journal of Recent Research and Review, Vol. IV, December 2012 ISSN 2277 8322 Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services Vidhi Agarwal 1,
