Suite B: Classified Network Security Goes Commercial
|
|
|
- Sara Howard
- 9 years ago
- Views:
Transcription
1 Suite B: Classified Network Security Goes Commercial By Bob Wheeler Senior Analyst July Copyright 2009 The Linley Group, Inc.
2 This paper examines the need for Suite B security, the underlying technology, chip-level requirements, and real-world implementations. This paper is sponsored by Exar, but all opinions and analysis are those of the author. Situation Analysis: The Need for Suite B Currently, two distinct markets exist for network-security systems that encrypt network data. High-volume commercial virtual-private-network (VPN) systems are built around industry standards such as IPSec that use published and well-known cryptographic algorithms of various strengths. By contrast, current U.S. government systems that carry classified data use NSA Type 1 equipment built around classified algorithms. Type 1 systems are evaluated and certified by the National Security Agency (NSA). Because Type 1 products are themselves classified, their possession requires a security clearance, and their export is severely restricted. For these reasons, Type 1 equipment is generally available to only the U.S. government and its contractors. Type 1 VPN systems use the High Assurance Internet Protocol Encryptor (HAIPE) Interoperability Specification (IS). This specification is based on IPSec but has both enhancements and restrictions as compared with the industry standard. Prior to HAIPE IS Version 3, all HAIPE products used a classified set of crypto algorithms known as Suite A. Released in 2006, HAIPE IS Version 3 added a new set of publicly available crypto algorithms known as Suite B, which is described in detail below. Unlike HAIPE IS, the IPSec and related IKE industry standards allow a wide variety of implementations using various crypto algorithms and key sizes. Commercial products must interoperate with a large installed base of VPN equipment. Interoperability requirements can lead to a least-common-denominator problem, where newer equipment cannot use a new or improved crypto algorithm because existing systems or software do not support it. In addition, relatively few commercial VPN systems are submitted to government-sanctioned or commercial laboratories for certification. Regardless of what crypto algorithms are used, hardware and software implementations may have other vulnerabilities due to design flaws. Thus, there exists a huge gap between mainstream commercial VPN products and Type 1 systems. Available commercial products are deemed inadequate for protection of classified data. By contrast, Type 1 systems are too tightly controlled and cost-prohibitive for commercial applications. Making matters worse, the two types of systems are incompatible. The issues of interoperability and broader availability of secure communications systems came to the forefront on September 11, 2001, and in the events that followed. The 9/11 Commission Report cited inadequate communications among responding agencies. In particular, public-safety personnel (or first responders) lacked interoperable radio systems The Linley Group - 1 -
3 Another problem was the lack of realtime information sharing between coalition forces involved in military operations. The U.S. Department of Defense (DoD) built its Global Information Grid (GIG) to enable secure realtime global communications for U.S. military forces. But DoD networks use Type 1 equipment that is not available to all coalition partners. As a result, cross-domain gateways must be used to connect these partners networks. These gateways require human intervention to release classified material and therefore do not operate in realtime. Goals for NSA Suite B Announced in 2005, NSA Suite B is part of the larger Cryptographic Modernization Program that began in NSA's stated goal in publishing Suite B was to provide the industry with a common set of cryptographic algorithms that would meet the needs of the widest range of U.S. government users. These include many users that previously required Type 1 equipment for the transmission of classified information. Within the U.S. government s classified community (which includes DoD, various security agencies, and research labs), about 1.3 million Type 1 devices are currently in service. These devices carry information at different classification levels, including the Top Secret (TS) level as well as the Secret-and-below levels. New HAIPE-IS products will support Suite B for all classification levels including TS. With Suite B, NSA plans to migrate about 80% of all Type 1 systems to commercial-off-the-shelf (COTS) products. To enable this transition to COTS, future HAIPE versions will use the IPSec protocol. Suite B will be NSA s default choice for all levels of classified traffic; only in very few exceptional cases will Suite A continue to be used due to overriding security concerns. For DoD, the move to Suite B will enable realtime communication with foreign military partners. Devices suitable for Secret-and-below classified information are sometimes called medium assurance or medium robustness products, although NSA no longer uses these terms. Conceptually, these medium-assurance products fill the void between highassurance Type 1 systems and existing commercial products. Practically, these Suite B enabled products help address the issue of interoperability between federal, state, and local governments. For example, the U.S. Department of Homeland Security (DHS) needs secure networks that enable cooperation and coordination with local law enforcement. Whereas NSA s goal was to enable COTS products for U.S. and partner government users, DHS is tasked with securing the nation s critical infrastructure and key resources (CIKR). Virtually every sector of the CIKR uses networks that could be compromised by cyber attacks. Important CIKR sectors include energy, water, transportation, banking, and communications. Increasingly, even control systems are connected to networks that are subject to attack. For example, the initiative to develop a more efficient Smart Grid creates new security concerns. To help address these concerns, authentication and encryption are being designed into the Smart Grid specifications from the start. Although 2009 The Linley Group - 2 -
4 specific algorithms have not yet been selected, the Suite B algorithms are good candidates due to the very long life cycles of utility systems. As of mid-2009, DHS had developed recommended practices for the protection of CIKR but did not have the authority to mandate their adoption. This could change, however, as the Obama administration has elevated the priority of cyber security. The Suite B Algorithms As Table 1 shows, Suite B specifies algorithms and strengths for bulk-data encryption, hashing, digital signatures, and key exchange. The Advanced Encryption Standard (AES) was approved by the U.S. National Institute of Standards and Technology (NIST) in AES was developed as a next-generation encryption standard to replace the aging Data Encryption Standard (DES). Using a key size of only 56 bits, DES had been broken, forcing the use of a triple-pass method called 3DES. Although 3DES remains secure, it is very compute intensive. This situation led NIST to seek a new algorithm that would be viable for the remainder of this century. AES is intended for broad use, with no intellectual property or export restrictions. Standard AES key lengths are 128, 192, and 256 bits. NIST estimates that AES with a 128-bit key is more secure than 3DES. Classification Level Usage Algorithm Secret and Below Top Secret Encryption AES-GCM 128-bit key 256-bit key Hashing SHA-xxx 256-bit digest 384-bit digest Digital Signature ECDSA 256-bit key 384-bit key Key Exchange ECDH 256-bit key 384-bit key Table 1. NSA Suite B algorithms and strengths by classification level. AES is a block cipher that can be used in various modes. Some modes in common use, such as AES-CBC, do not lend themselves to efficient high-speed hardware designs and also require separate algorithms for message authentication. AES Galois Counter Mode (AES-GCM) is a newer mode that solves both of these concerns. As a result, NSA selected AES-GCM for Suite B. AES-GCM with a 128-bit key is also the mandatory cipher suite for Ethernet link-layer encryption (IEEE 802.1AE). SHA-256 and SHA-384 are hash algorithms used in Suite B for multiple public-key generation and exchange functions. The hash function takes an arbitrarily long string of bits and generates a single fixed-length result called a message digest. As their names imply, SHA-256 and SHA-384 produce 256- and 384-bit results, respectively. They are an evolution of the commonly used SHA-1, which produces a hash result of 160 bits and is an improved version of the Secure Hash Algorithm (SHA). In 2005, SHA-1 was shown to be theoretically vulnerable to collision attacks. Consequently, Suite B specifies SHA- 256 at a minimum. SHA-256 and SHA-384 are members of a family commonly referred to as SHA-2, which also includes 224-bit and 512-bit variants The Linley Group - 3 -
5 Although modes and strengths vary, the AES and SHA families of algorithms are in widespread use in commercial systems. By contrast, ECDSA and ECDH use elliptic curve cryptography, which represents a break from common implementations. Most commercial systems use RSA for signatures and Diffie-Hellman (DH) or RSA for key exchange. Government systems alternatively use DSA for signatures in place of RSA. The problem with these existing algorithms is that, as computing power has grown, they began requiring very large key sizes to remain secure. Computing large keys is computationally intensive, and large keys increase packet overhead, which can consume precious bandwidth in wireless applications. Elliptic-curve cryptography (ECC) is based on the elliptic-curve discrete-logarithm problem, which is an evolution of the discrete-logarithm approach used in traditional Diffie-Hellman and DSA. RSA uses a different approach based on integer factorization. Methods for solving the elliptic-curve problem are much less efficient than those for solving the problems used in the earlier algorithms. As a result, elliptic-curve systems can use a much shorter key and still be safe, as Table 2 shows. This situation greatly reduces the number of bits that must be transmitted. Bits of Security Bulk Algorithms DSA & DH Modulus RSA Modulus ECC Prime Field 80 3DES using 2 keys 1,024 bits 1,024 bits 160 bits 112 3DES using 3 keys 2,048 bits 2,048 bits 224 bits 128 AES with 128-bit key 3,072 bits 3,072 bits 256 bits 192 AES with 192-bit key 7,680 bits 7,680 bits 384 bits 256 AES with 256-bit key 15,360 bits 15,360 bits 521 bits Table 2. Comparable strengths of cryptographic algorithms. (Source: NIST Special Publication Part 1) Elliptic Curve DSA (ECDSA) is defined by NIST in FIPS 186-3, the Digital Signature Standard (DSS). The first version of the DSS (FIPS 186-1) was published in 1994 and included the RSA algorithm and the Digital Signature Algorithm (DSA). Approved in 2000, FIPS added ECDSA as a third approved algorithm. ECDSA produces digital signatures that are twice the length of the key size. FIPS also recommends the specific elliptic curves used in ECDSA as well as ECDH. ECDH is defined in NIST Special Publication A, which recommends key establishment schemes. In this document, ECDH is referred to by the lengthy name Elliptic Curve Cryptography Cofactor Diffie-Hellman (ECC CDH), as distinct from traditional finite-field-cryptography Diffie-Hellman. This publication also includes an alternative to DH called MQV (for Menezes, Qu, and Vanstone). Acquired by Research In Motion in March 2009, Certicom owns a large portfolio of patents around ECC algorithms and implementations. NSA acquired a license to 26 Certicom patents covering the ECMQV algorithm for use in U.S. government systems. This license, however, does not cover non-government uses of Suite B. Due to ongoing intellectual-property concerns, NSA later dropped ECMQV from Suite B. But Certicom s 2009 The Linley Group - 4 -
6 implementation patents may apply to other ECC algorithms including ECDH and ECDSA. Whereas industry standards offer many options for algorithms and strengths, Suite B defines only two variations. Both variations use the same algorithms and differ only in key sizes. The set with smaller keys is acceptable for information at Secret-and-below classifications, whereas Top Secret information must be protected using the set with larger keys. From a security perspective, this approach guarantees that each function uses a similar strength. A cryptographic system is only as strong as its weakest function. For example, a common commercial implementation would use AES with 128-bit keys for bulk crypto while using 1,024-bit keys for signatures and key exchange. As Table 2 shows, the relatively weak public-key algorithms yield a system that is no more secure than 3DES using only two keys. The other benefit of Suite B s narrow implementation options is the ability to scale across classification levels. Traditionally, each classification level required a dedicated network. With Suite B, networks carrying information at all classification levels of Secret and below will be interoperable. In addition, Suite B products designed for Top Secret networks will also support the weaker keys that are acceptable for Secret-and-below data. As a result, Top Secret systems could, with the appropriate protections, interoperate with networks carrying less sensitive information. With Suite B, NSA specified only algorithms, not protocols. NIST has been working closely with the IETF to ensure that industry standards encompass the algorithms used by Suite B. For IPSec, RFC 4869 specifies the use of Suite B algorithms, while RFC 4754 standardizes the use of ECDSA for authentication (using the IKE and IKEv2 protocols). For TLS (the standardized version of SSL), RFC 5430 defines a Suite B compliant profile using ECDH, ECDSA, AES-GCM, and SHA-256/384. For classified systems, HAIPE IS Version 3 already includes the Suite B algorithms as noted above. Containment & FIPS 140 Because Suite B is an algorithm suite, it specifies key strength but is silent on the issue of key protection. System implementations have vulnerabilities, which could enable an attacker to access key material. Sophisticated attacks can even use indirect information to reduce the difficulty of guessing keys. For example, an attacker could observe patterns in electromagnetic emissions (EMI) or in power consumption. Thus, an important aspect of system design is containment of security materials including keys. To address system-level design issues for sensitive-but-unclassified (SBU) applications, NIST developed FIPS 140. The U.S. government requires FIPS 140 compliance for SBU systems; some commercial sectors, such as banking, require their vendors to comply with FIPS 140 as well. Released in 2001, the current revision is FIPS This and prior revisions defined four levels of security, with Level 4 being the most secure. FIPS 140-3, which remained in draft form as of July 2009, will redefine the four levels The Linley Group - 5 -
7 Rather than specifying requirements for complete systems, FIPS 140 defines a cryptographic module, which is the set of hardware and software that implements security functions including crypto algorithms and key generation. NIST validates modules through its Cryptographic Module Validation Program (CMVP). By creating a cryptographic boundary around a module, vendors can change other parts of their system designs without affecting their NIST certification. Security Level 1 is fairly cursory, requiring that certified algorithms are used but not requiring any type of physical security. Level 2 adds requirements for physical tamper evidence, which can use seals or locks on a module s cover. This approach provides physical protection for what the standard calls critical security parameters (CSPs), which include secret and private keys as well as authentication data such as passwords and PINs. Level 2 also requires single-factor user authentication, such as a password. Rather than just tamper evidence, Level 3 requires tamper resistance, to prevent an attacker from accessing CSPs, and adds requirements around how CSPs are transferred into and out of the module. Level 3 also requires identity-based user authentication. Level 4 requires physical security mechanisms that respond to attempts at unauthorized physical access. If the module detects a tampering attempt, any plaintext (unencrypted) CSPs should be overwritten with zeros ( zeroized ). Modules must also resist environmental attacks such as temperature and voltage fluctuations. This level of physical protection allows Level 4 modules to be used in environments that are themselves unprotected (e.g., outside of classified facilities). Level 4 adds the requirement for twofactor authentication, which typically means adding biometrics or a physical token to a password. The new Level 5 in draft FIPS adds requirements for EMI-attack protection, nonvisual radiation (e.g., x-ray) examination protection, and encryption/authentication of all stored security parameters. Exar s Hifn Suite B Solution Now a part of Exar, Hifn has developed a Suite B enabled security processor that represents the company s third-generation flow-through design. The SentryFlow 9150 chip can form the heart of a dual-port Gigabit Ethernet (GbE) network-interface card (NIC) that handles full IPSec processing including the IKE/IKEv2 protocol. In addition to implementing all Suite B algorithms, the 9150 includes containment features that enable FIPS 140 compliant board designs. Figure 1 shows a block diagram of the SentryFlow The chip integrates four GbE interfaces that are separated into a pair of network ports for encrypted (black) data and a pair of host ports for unencrypted (red) data. Thus, the host sees only cleartext and is completely isolated from IPSec processing. The 9150 can sustain AES-GCM throughputs of up to 4Gbps and adds only a few microseconds of latency (delay). The chip integrates three RISC processors, two of which are customized for data-path processing The Linley Group - 6 -
8 For incoming packets, the DPU performs packet parsing and security-association (SA) lookup. The dual crypto engines handle bulk encryption for AES and SHA-2 as well as legacy algorithms including 3DES and SHA-1. As required by Suite B, the crypto engines support AES-GCM with 128/256-bit keys. The post-crypto processor performs IP-header checks and packet filtering (stateless firewall) for incoming traffic. For outbound packets, the DPU generates and inserts IPSec headers/trailers and performs a policy lookup using an on-chip database. The data path is capable of processing 1.2 million packets per second. Figure 1. Exar SentryFlow 9150 block diagram. The third RISC processor, the esc, handles control-path and management functions. The esc handles exception packets passed to it by the DPU. The esc also connects with a public-key engine and a random-number generator (RNG), which enable highperformance on-chip IKE processing. For Suite B, the PK engine supports ECDH and ECDSA with 256- and 384-bit keys; 521-bit keys are also supported in anticipation of future requirements. For backward compatibility, the PK engine supports DH and RSA algorithms with key sizes up to 4,096 bits. The 9150 includes a number of features and design techniques that help create a secure boundary around the chip and its associated components. First, the firmware for the embedded RISC processors is stored in serial Flash memory, where it is encrypted and authenticated. Exar signs the firmware image to prevent downloading of unauthorized code. During operation, the 9150 s external DRAM channel is used for both external SA storage and as the esc s external code store. Using a proprietary randomly-keyed cipher, the chip obfuscates all data stored in external DRAM, so physical probing will not yield 2009 The Linley Group - 7 -
9 plaintext information. The 9150 includes tamper-response circuitry to zeroize all memories and keys when tampering is detected. Finally, the chip provides a Fast Ethernet (RMII) management port as an alternative to in-band management; in this case, management frames from the host ports are ignored. Figure 2 shows an example dual-port GbE NIC using the Exar is shipping a similar design, the Express DS 4100 card, based on Hifn s second-generation flow-through chip. On the host side, the 9150 connects with a dual-port GbE controller for PCI Express, such as Intel s 82576, using SGMII. On the network side, an external PHY is required for copper (RJ45) ports. For fiber (SFP) ports, the 9150 connects directly to the optical modules. As the box labeled Secure Boundary shows, all security parameters are contained within the 9150 and its associated memories. Furthermore, the memories do not contain useful cleartext data. Thus, a FIPS 140 Level 3 implementation would require only a cover over the 9150 designed to trigger the zeroize pin. Figure 2. Example dual-port GbE Suite B NIC using Exar SentryFlow Deployment Hurdles Although Suite B was announced several years ago and FIPS has been available even longer, deployment of these standards has been quite limited. In large part, this is due to the high cost of available solutions. Of course, higher sales volumes could help reduce pricing, but classified users have been forced to procure Type 1 equipment instead of commercial products. By migrating most systems from Type 1 to Suite B COTS, NSA will help create a higher-volume commercial market. In addition to direct Type 1 replacement, Suite B should expand the available market for classified security by eliminating the costly and cumbersome requirements associated with Type 1 equipment. Another factor is available chip technology, which can have a large impact on the manufacturing cost of FIPS 140 certified products. Using the SentryFlow 9150, Exar or 2009 The Linley Group - 8 -
10 an OEM could develop a very cost-effective NIC that can be easily integrated into offthe-shelf PCs and servers. This design would combine the 9150 with commodity devices, enabling a low latency, low power, secure NIC that uses only standard off-the-shelf components. In addition, the 9150's advanced containment features greatly reduce the added cost associated with physical-protection mechanisms. Despite NSA s license agreement with Certicom (now Research in Motion), an intellectual-property cloud remains over Suite B implementations. Removing ECMQV from the algorithm suite helped this situation, but vendors must still avoid infringing Certicom s numerous implementation patents. To eliminate this concern, Hifn (now Exar) acquired a license to Certicom s patents that covers non-goverment as well as government applications. As a result, Exar s customers need not be concerned about the intellectual-property issues surrounding Suite B. Medium-assurance products, for lack of a better term, have also suffered from poor specifications and testing requirements. NSA operates an initiative, the National Information Assurance Partnership (NIAP), which is tasked with meeting the security testing needs of both users and vendors. NIAP has developed protection profiles for systems, such as VPN gateways, that include requirements for crypto modules. The existing medium-robustness profiles require crypto modules to comply with FIPS Level 3. But FIPS CMVP certification is intended for unclassified government networks outside of national security systems. Medium-robustness products must be validated through NIAP s Common Criteria Evaluation and Validation Scheme (CCEVS). These evaluations take from one to several years to complete, which is excessive for commercial products. In March 2009, NIAP announced it would revise the model for protection profiles. NIAP will replace all existing protection profiles with new ones designed to better address the needs of both government and commercial sectors. Another goal is to create the test plans and documentation required for different labs to achieve consistent results. Conclusions By developing Suite B, NSA has shown that publicly available encryption algorithms are strong enough to protect national-security information. These algorithms also enable high-performance silicon implementations that can serve demanding DoD networks and commercial-enterprise networks alike. Also selected for Ethernet encryption, AES-GCM has been shown to easily scale to 10Gbps and beyond. Elliptic-curve cryptography will keep key sizes relatively small, which is important for both government and future commercial wireless applications. Suite B also promises to help the industry break away from legacy algorithms, such as 3DES and SHA-1, which either perform poorly or are too easily broken. While NSA s efforts are important for government users, greater industry involvement is now needed to broaden the commercial appeal of medium-assurance security products. There is growing awareness of the need for strong security across an increasing number 2009 The Linley Group - 9 -
11 of industries, including the financial and healthcare sectors. The commercial sector has done a good job of developing related standards through bodies such as the IETF. But government and industry now need to work together to formalize medium-assurance COTS products for broad deployment. The roll out will take time, with the classified community leading and other government and critical-infrastructure users following. Although chip vendors are far removed from these users, silicon technology is essential to both the robustness and cost of COTS designs. With its new SentryFlow 9150, Exar has demonstrated how medium-assurance products can be delivered at price points far below those of most existing FIPS 140 Level 3 products, let alone Type 1 equipment. This enabling technology from chip vendors combined with NSA s near-term deployment plans for Suite B should generate momentum for COTS products. Broader deployments will take some years to complete, but Suite B is pointing the way to a more secure future. About the Author Bob Wheeler is a senior analyst at The Linley Group and co-author of A Guide to Security Processors and Accelerators. The Linley Group offers the most comprehensive analysis of the networking-silicon industry. We analyze not only the business strategy but also the technology inside all the announced products. Our in-depth reports cover topics including network processors, high-speed embedded processors, handset processors, and Ethernet chips. For more information, see our web site at The Linley Group
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
National Security Agency Perspective on Key Management
National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National
WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B
COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B TABLE OF CONTENTS COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B NSA COMMERCIAL SOLUTION FOR CLASSIFIED
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer www.ipswitchft.com FIPS 140-2 is a standard first published in 2001 by the U.S. National
Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption
White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT
SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities Wireless Infrastructure, Article 3-15-2012 The federal government recognizes that standards based
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Security Policy. Trapeze Networks
MP-422F Mobility Point Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities Wireless Infrastructure, Article 12-29-2011 The federal government, and the Department of
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
BroadSAFE Enhanced IP Phone Networks
White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Freescale Security Backgrounder Page 1
Freescale Security Backgrounder Page 1 Freescale Security Backgrounder Page 2 Table of Contents 1. Secure Internet Traffic: A Market Imperative 2. Overview of Network Security Technologies 3. Differences
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Cisco VPN Internal Service Module for Cisco ISR G2
Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015
Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Security needs in embedded systems
Anoop MS Tata Elxsi Ltd. India [email protected] Abstract: The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support.
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support. 601DataPower_Security_NIST.ppt Page 1 of 17 This presentation discusses three new security features in the WebSphere DataPower
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
OMAP platform security features
SWPT008 - July 2003 White Paper OMAP platform security features By Harini Sundaresan Applications Engineer, OMAP Security Texas Instruments, Wireless Terminal Business Unit This white paper introduces
Strong Authentication for Future Web Applications
Strong Authentication for Future Web Applications Chris Williams Leidos, Inc. July 18, 2014 For W3C Identity in the Browser Workshop Abstract Leidos (formerly SAIC), has been using strong authentication
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS
LAB FORWARD WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS Medical diagnostics are a vital part of the modern healthcare system, and instrument uptime is critical
Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces
Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
Strengths and Weaknesses of Cybersecurity Standards
Strengths and Weaknesses of Cybersecurity Standards Bart Preneel COSIC KU Leuven and iminds, Belgium [email protected] April 7, 2014 Bart Preneel 1 What is cybersecurity? Liddell and
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery
WHITE PAPER Cost-Efficient SSL Application Delivery Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery Always On SSL Since 1994, enterprises looking to protect the security
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms
Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards 3Com Corporation 5403 Betsy Ross Drive Santa Clara, CA 95054 USA February 24, 2006 Revision Version 0.4 Page 1 of 15 1. Introduction The following
Cyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland Two trends are currently changing
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Cryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics [email protected] DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
An Overview of Communication Manager Transport and Storage Encryption Algorithms
An Overview of Communication Manager Transport and Storage Encryption Algorithms Abstract The following paper provides a description of the standard algorithms that are implemented within Avaya Communication
Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper
Bosch Security Systems Video Systems Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper 4 July 2016 Secure the edge of the network Security devices are mostly located
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager
Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Bandwidth Optimization and Protection for Wireless Backhaul
Bandwidth Optimization and Protection for Wireless Backhaul Tien Shiah March 2009 Introduction As multimedia applications become ubiquitous on mobile phones, service providers will need to dramatically
Sectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
Evaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: [email protected] Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
A Standards-based Approach to IP Protection for HDLs
A Standards-based Approach to IP Protection for HDLs John Shields Staff Engineer, Modelsim Overview Introduction A Brief Status First Look at The Flow Encryption Technology Concepts Key Management Second
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of
RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version 3.0.0.1, 3.0.0.2 October 22, 2012
RSA BSAFE Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy Version 3.0.0.1, 3.0.0.2 October 22, 2012 Strong encryption technology for C/C++ developers Contact Information See our Web sites
