Attestation and Authentication Protocols Using the TPM
|
|
|
- Clement Garey Poole
- 9 years ago
- Views:
Transcription
1 Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (1/28)
2 Motivation Almost all TPM interactions can be thought of as cryptographic protocols. Many real-world scenarios need attestation and machine authentication protocols. The TPM gives us the necessary building blocks to create protocols that accomplish complex, real-world goals. Far more than just network access control! Us includes you! Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (2/28)
3 What is a Cryptographic Protocol? For this talk: A sequence of messages between participants All cryptography abstract Local assumptions about secret & fresh values Goal: each participant can prove their security goals met Exact goals vary based on protocol Looking to prevent structural flaws (For the interested: Strand Space method, Dolev-Yao adversary.) Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (3/28)
4 What is a Cryptographic Protocol? For this talk: A sequence of messages between participants All cryptography abstract Local assumptions about secret & fresh values Goal: each participant can prove their security goals met Exact goals vary based on protocol Looking to prevent structural flaws (For the interested: Strand Space method, Dolev-Yao adversary.) Notation: {M} K indicates that M is encrypted with key K { M } K indicates that K has signed M Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (3/28)
5 Attestation vs. Authentication For this discussion: Attestation: Providing evidence about a target to an appraiser Used for predicting future target behavior Authentication: Identification of a machine or user Usually, another partner in a protocol Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (4/28)
6 A Motivating Scenario A financial server contains sensitive financial and personal data. We wish to limit access to: authorized users on authorized machines running authorized software Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (5/28)
7 A Motivating Scenario A financial server contains sensitive financial and personal data. We wish to limit access to: authorized users Authentication on authorized machines Authentication running authorized software Attestation Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (5/28)
8 Basic Authentication Mechanisms Signature A s private key signed this message, so the message must have come from A Decryption Only A s private key could have decrypted this data, so if the data is used, A must have received it...assuming key secrecy, A associated with key Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (6/28)
9 Attestation Goal: Predict behavior of a particular target Anything that provides evidence about a machine can qualify User attestation could exist, but outside today s talk To be trustworthy: Evidence provider must be authenticated Target must be verifiable from evidence Example: TPM Quote attests to values in PCRs Not all attestation is signature based! CertifyKey allows decryption-based attestation as well Certifies PCR values that must be present to use a key Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (7/28)
10 A Straightforward Guess Let s say the server already uses TLS to authenticate the client and server, and would like to integrate the TPM for attestation and machine authentication. Client Server Initial Handshake Certificate Exchange Establish Shared Secret K Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (8/28)
11 A Straightforward Guess Let s say the server already uses TLS to authenticate the client and server, and would like to integrate the TPM for attestation and machine authentication. Client Server Initial Handshake Certificate Exchange Establish Shared Secret K {Quote Request, Nonce, Mask} K { { Quote, Nonce, PCRs } } AIK K Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (8/28)
12 The Attack Authorized Machine Client Server {Quote Request, Nonce, Mask} K Quote Request, Nonce, Mask { Quote, Nonce, PCRs } AIK { { Quote, Nonce, PCRs } } AIK K Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (9/28)
13 The Attack Authorized Machine Client Server {Quote Request, Nonce, Mask} K Quote Request, Nonce, Mask { Quote, Nonce, PCRs } AIK { { Quote, Nonce, PCRs } } AIK K By themselves, TPM quotes provide attestation, not meaningful machine authentication. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (9/28)
14 Basic Machine Authentication using a TPM Use a binding key to encrypt a session key Sign messages with an AIK, signing key Integrate protocol data into TPM Quote Nonce (if you re careful) Extended PCR (usually resettable) Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (10/28)
15 Basic Machine Authentication using a TPM Use a binding key to encrypt a session key Sign messages with an AIK, signing key Integrate protocol data into TPM Quote Nonce (if you re careful) Extended PCR (usually resettable) All of these assume that local software will only use TPM appropriately... Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (10/28)
16 Basic Machine Authentication using a TPM Use a binding key to encrypt a session key Sign messages with an AIK, signing key Integrate protocol data into TPM Quote Nonce (if you re careful) Extended PCR (usually resettable) All of these assume that local software will only use TPM appropriately... and therefore, we ll usually want attestation too. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (10/28)
17 Detour: Network-Accessible TPMs Systems can allow remote access to some TPM commands. Network-accessible commands cannot safely be used for machine authentication. These commands potentially allow remote parties to masquerade as the TPM s machine If a network-accessible TPM violates a protocol s security assumptions, you have a potential problem. Even if your TPMs don t provide access, communications partners may be less constrained. Attestation can reduce this risk Verify software stack, remote access configuration Note: Hard today! Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (11/28)
18 EVA: An Alternate Approach Client Server Connect, C, S {Nonce, Mask, S} C {K, S, Mask, { Quote, hash(c, S, Nonce), PCRs } } AIK S {Valid, K} C This substitutes for TLS in our scenario. The new session key can be used to run a user-authentication protocol, once machine has passed attestation. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (12/28)
19 EVA Features Client Server Connect, C, S {Nonce, Mask, S} C {K, S, Mask, { Quote, hash(c, S, Nonce), PCRs } } AIK S {Valid, K} C Encrypted nonce authenticates C to S Encrypted session key authenticates S to C Fresh nonce guarantees fresh quote for S Session key secret, shared by S and C Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (13/28)
20 Safer Ways of Using Standards Could we still use TLS? Standard protocols can often be extended to use attestation if the protocol issues a certificate, ticket, or other token. Change only the certificate issuance portion Can provide incremental upgrade path Kerberos: Add machine auth + attestation to original ticket granting User, machine auth, attestation tied together using EVA-like protocol TLS: Add attestation to certificate issuance, use short-lived certs Tradeoff: Frequency of reissuance vs. accuracy. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (14/28)
21 Kerberos from 50,000 Feet Resource on S? (Credentials) Ticket Resource? Here s my ticket. Okay, here you go. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (15/28)
22 Kerberos With Attestation (KAT) TPM User Kerberos Ticket Granting Server Server Password Evidence request Quote Ticket request Extended Ticket Resource request, Ticket Resource User ticket now implies verification of client machine. Services that accept Kerberos tickets require no modification! Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (16/28)
23 Why We Won t Discuss KAT Details E V ATS A C AS TGS S Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (17/28)
24 Mutual Attestation Protocols where multiple parties verify each other Very common, highly varied! Critical for scenarios handling high-security data Authorized users connecting to sites providing trusted data Upload of sensitive software updates to remote devices Establishing trusted communication among a variety of parties May involve trusted third parties May need to take privacy into account Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (18/28)
25 Secure Code Upgrade Scenario A company with a distributed network of servers wishes to upgrade their proprietary software. Servers should only accept software from legitimate central repositories Servers should never accept old software Proprietary code should only be released to legitimate servers All code should be encrypted in transit Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (19/28)
26 Authenticated Code Update Protocol Code Repository Server Update, C, S {Nonce, S, C} C {Code} {SymmetricKey, Nonce} SymmetricKey S { Hash(Code) } S Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (20/28)
27 Authenticated Code Update Protocol Code Repository Server Update, C, S {Nonce, S, C} C {Code} {SymmetricKey, Nonce} SymmetricKey S { Hash(Code) } S Here, TPM used for authentication only C decryption (binding) key S actually two: one binding, one signing Fresh symmetric key used for large-scale encryption Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (21/28)
28 Attesting Code Update Protocol What if we wanted to also attest to the state of one or both machines? Authenticating protocols using TPM keys can become attesting protocols easily CertifyKey can be used to remotely verify PCR bindings on any key Sealed data can have PCR constraints To decrypt, TPM must contain correct PCR values However, PCR-constraining methods require predictable values If there is a range of acceptable values, use quote-based protocol Remember, tying quotes to machine auth requires work Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (22/28)
29 A Few Other Interesting Problems Combined hardware user + TPM machine auth Smartcards? Biometric readers? Common challenge: Limited interface Trustworthy kiosks: Can I safely use this airport machine to check my ? Trustworthy clouds: Can I load my data or trust my results? What am I actually connecting to? E-cash and electronic purchases: Do I have control over my virtual wallet?... Common theme: Need a good architecture to trust, need protocols to verify Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (23/28)
30 Looks Easy, Right? Protocols can go wrong in many ways. Man in the middle Message replay Message swapping between multiple protocol instances Message modification Message swapping between multiple protocols!... Any structural flaw will allow failure regardless of the perfection of the implementation. A protocol designed for a particular purpose may have flaws when used out of context. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (24/28)
31 Know Your Goals When evaluating a protocol, consider: What information do you need? What information needs to be current? What information needs to be correlated? What needs to be kept secret? What does each participant need to know when the protocol completes? Normally, we discourage grow-your-own protocols. However, there is a shortage of protocols that fully utilize the TPM! Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (25/28)
32 Doing This At Home Cryptographic Protocol Shapes Analyzer (CPSA) Tool from MITRE for analyzing structural properties of protocols Discovers all possible executions of a protocol (shapes) using the strand space method What we used to design and analyze these examples Implementation being formally proved correct Note: Does not support every possible cryptographic feature Publicly available: Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (26/28)
33 Conclusion The TPM, particularly its key infrastructure, provides essential support for cryptographic protocols Real-world scenarios require a variety of attestation and authentication protocols It s easy to make mistakes that cause security failure; however: We can design reliable protocols that meet the needs of many important scenarios with today s TPM. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (27/28)
34 Questions? CPSA: For more information on learning protocol design and analysis, contact me. Approved for Public Release: Distribution Unlimited. c All Rights Reserved. (28/28)
Using the TPM: Data Protection and Storage
Using the TPM: Data Protection and Storage Ariel Segall [email protected] Day 2 Approved for Public Release: 12-2749. Distribution unlimited License All materials are licensed under a Creative Commons
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
Kerberos. Guilin Wang. School of Computer Science, University of Birmingham [email protected]
Kerberos Guilin Wang School of Computer Science, University of Birmingham [email protected] 1 Entity Authentication and Key Exchange In the last talk, we discussed key exchange and reviewed some concrete
Modeling and verification of security protocols
Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt [email protected] Paper and slides available
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party
Implementation of a Trusted Ticket System
Implementation of a Trusted Ticket System Andreas Leicher 1, Nicolai Kuntze 2, and Andreas U. Schmidt 3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany, [email protected] 2 Fraunhofer
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri ([email protected]) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Payment Systems for E-Commerce. Shengyu Jin 4/27/2005
Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
vtpm: Virtualizing the Trusted Platform Module
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA vtpm: Virtualizing the
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Enabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
A Framework for Secure and Verifiable Logging in Public Communication Networks
A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr [email protected]
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
NIST E-Authentication Guidance SP 800-63 and Biometrics
NIST E-Authentication Guidance SP 800-63 and Biometrics September 21, 2004 Bill Burr [email protected] OMB M-0404 Guidance on E-Auth Part of E-Government initiative put services online About identity
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
FIDO Trust Requirements
FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos
KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
Q: Why security protocols?
Security Protocols Q: Why security protocols? Alice Bob A: To allow reliable communication over an untrusted channel (eg. Internet) 2 Security Protocols are out there Confidentiality Authentication Example:
Opal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio [email protected], [email protected] Abstract Cloud
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
OPC UA vs OPC Classic
OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation
Secure Login Issues & Solutions
Secure Login Issues & Solutions Steve Parkinson Principal Engineer, Red Hat Certificate System Agenda Login problems and corporate security Solutions LDAP solutions with Red Hat Directory Server PKI solutions
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Technical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Kerberos authentication made easy on OpenVMS
Kerberos authentication made easy on OpenVMS Author: Srinivasa Rao Yarlagadda [email protected] Co-Author: Rupesh Shantamurty [email protected] OpenVMS Technical Journal V18 Table of contents
Acronym Term Description
This glossary contains definitions of terms created by TCG, or terms that have a particular meaning in trusted computing, or terms that cause particular confusion in trusted computing. Acronym Term Description
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Key Management and Distribution
Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Review On Incremental Encrypted Backup For Cloud
Review On Incremental Encrypted Backup For Cloud Rohini Ghenand, Pooja Kute, Swapnil Shinde, Amit Shinde, Mahesh Pavaskar, Shitalkumar Jain Department of Computer Engineering MIT AOE [email protected]
Lecture 10 - Authentication
Lecture 10 - Authentication CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Kerberos: What to know 1) Alice T rent : {Alice + Bob
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Public Key Infrastructure. A Brief Overview by Tim Sigmon
Public Key Infrastructure A Brief Overview by Tim Sigmon May, 2000 Fundamental Security Requirements (all addressed by PKI) X Authentication - verify identity of communicating parties X Access Control
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
Computer Security. Draft Exam with Answers. 2009.
Computer Security Draft Exam with Answers. 2009. Please note that the questions written here are a draft of the final exam. There may be typos in the questions that were corrected in the final version
