SMF Digital Signatures in z/os 2.2. Anthony Sofia Software Engineer at IBM August 14 th 2015
|
|
|
- Edward Wade
- 10 years ago
- Views:
Transcription
1 SMF Digital Signatures in z/os 2.2 Anthony Sofia Software Engineer at IBM August 14 th 2015
2 Agenda What is a digital signature? How digital signatures enhance SMF data Configuration and Usage 3
3 What is a Asymmetric Cryptography Also known as Public-Key Cryptography Used for message encryption (i.e. to transmit a key for symmetric encryption) or for message signatures Utilizes very large random numbers Strength lies in the inability to factor these very large numbers The term "asymmetric" comes from the use of different keys, a public key and private key, to perform these opposite functions 4
4 What is a Digital Signature? A way to ensure the source and validity of data The signer will first hash the data and then encrypt the hash with their private key The encrypted hash is the signature The consumer of the data can hash the same data and decrypt the signature, using the public key, to obtain the signer's hash The hashes will then be compared When these values match then the data contents and source are verified 5
5 Storing SMF Digital Signatures Digital Signatures are stored in SMF2 records Subtype 1 provides a grouped signatures Subtype 2 provides interval based signatures Data must be validated on interval boundaries New data included in these records includes counts of records included, start and end times of the data included and the hashing and signature methods SMF2 records today are generated by IFASMFDL and IFASMFDP and is ignored by these utilities by default 6
6 Storing SMF Digital Signatures (cont) Looking at a data set dumped from a logstream the SMF Type 2 records will be integrated into the data Record #1 SMF Dump Data Set Record #2 SMF Type 2 Record Record #3 7
7 When SMF Signs Records The SMF data is signed on the way to System Logger This function is only available when using SMF Logstream Recording! As each block of records is written to the logstream Each record is individually hashed Running hash maintained per unique SMF type/subtype Periodically, the hash will be encrypted and the digital signature data will be recorded to the logstream as a group signature record On the global interval a signature is created for all data hashed since the previous interval and recorded to the logstream as an interval signature record These operations are performed with the private key 8
8 When SMF Moves Signature Records IFASMFDL and IFASMFDP understand signature records Both utilities can optionally carry them to an OUTDD data set with the records of an associated SMF type/subtype OUTDD data sets can be independently verified IFASMFDP or IFASMFDL SYSIN OUTDD(OUTDD1,TYPE(23)) OUTDD(OUTDD2,TYPE(30)) OUTDD1 OUTDD2 9
9 When SMF Verifies Records IFASMFDP can verify a set of SMF records has not been tampered with when signature records are available. The Signature Records must have been carried through successive IFASMFDL and IFASMFDP passes over the data INDD1 IFASMFDP Verification Report 10
10 Setup Steps The first step is create a public/private key pair via ICSF SMF does not care about the type of key (clear or secure) as long as the available hardware can support it Scope of the key usage can be per enterprise, sysplex, system or logstream SMF needs the token name to perform the PKCS#11 functions via ICSF as well as the type of encryption For example RSA or Elliptical Curve The SMF address space and any invokers of IFASMFDP will need access to ICSF, PKCS#11 and the appropriate key See SAF resources CRYPTOZ, CSFSERV and CSFKEYS 11
11 Setup Steps cont. Update the SMF configuration to sign record New option RECSIGN can be specified globally or per LSNAME The logstream must be defined with a MAXBUFSIZE of Default is NORECSIGN Sub-options include HASH, TOKENNAME, SIGNATURE RECSIGN(HASH(SHA512),SIGNATURE(RSA), TOKENNAME(TAMPER#RESISTANT#SMF#TOKEN#NAME1)) These options are dynamic however changing these options requires some operational coordination Data can only be verified with a single set of parameters, new and old data must be segregated 12
12 Setup Steps IFASMFDL IFASMFDL can carry signature data with the SMF records By default IFASMFDL will drop signature records The NOSIGSTRIP option can be used to have signature records written to OUTDD data sets IFASMFDL will carry signature records transparently If there are multiple OUTDD statements for different types and subtypes IFASMFDL will carry the correct signature records to each OUTDD When signature records are carried the IFASMFDL output reports a TYPE2 record as written for each signature record 13
13 Setup Steps IFASMFDP IFASMFDP can carry signature records and perform validation New IFASMFDP parameters NOSIGSTRIP and SIGVALIDATE NOSIGSTRIP behaves the same as with IFASMFDL SIGVALIDATE indicates that signature validation is to be performed, Suboptions include TOKENNAME and HASH SIGVALIDATE(HASH(SHA512), TOKENNAME(TAMPER#RESISTANT#SMF#TOKEN#NAME1)) Default: NOSIGVALIDATE (don't perform validation) 14
14 Setup Steps IFASMFDP The relationship between PARMLIB member SMFPRMxx and the IFASMFDP options The TOKENNAME and HASH values must match between SMFPRMxx and IFASMFDP The TOKENNAME is associated with the public/private pair of keys IFASMFDP only needs to access the public key SYS1.PARMLIB(SMFPRMxx) LSNAME(IFASMF.xxx,TYPE(xx:yy), RECSIGN(TOKENNAME(< 32 Char Token Name>), SIGNATURE(yyyy), HASH(xxx)) IFASMFDP SYSIN SIGVALIDATE(TOKENNAME(<32 Char Token Name>),HASH(xxx)) 15
15 IFASMFDP SIGVALIDATE Considerations The behavior for DATE, START and END are slightly different. Align each with an interval to ensure complete intervals of records can be validated. Records must retain the same order and contents as they where originally written for signature verification to succeed IFASMFDP ends processing after the first failure is detected 16
16 Configuration Changes Encryption options can be changed dynamically This is not advised as it creates operational problems IFASMFDP needs to be told the encryption parameters and can not validate a data set with a mix of parameters for a single SMF type/subtype from a given SID If options must be changed create a new logstream with the new options Temporarily run with both logstreams then turn off the old logstream Now there is a clean break between data signed with the old and new parameters 17
17 Configuration Changes (cont) New SMFPRMxx setting RECSIGN with options HASH, TOKENNAME, SIGNATURE apply at specific times Records written before the first global interval of IPL are signed immediately Records written before the first global interval of a logstream which has not been previously been signing are signed immediately Records will not be signed until the global interval after a SET SMF or SETSMF command is processed for logstreams which had previously been signing 18
18 IFASMFDP Record Validation Report Report line generated for each SMF type and subtype processed for each SID seen Includes time span and counts for records that were verified Counts include records processed, groups processed and intervals processed A group is a subset of records that were signed together An interval is the signature generated on the SMF configured interval time Provides information about failures A signature failure is the highest level failure Additional checking is performed to see if the error could be due to a missing or added record or an entire missing interval of records Manual examination will be required to determine the root-cause of the error 19
19 Dissecting an IFASMFDP SIGVALIDATE Report RECORD VALIDATION REPORT FOR SY1 RECORD RECORD VALIDATION VALIDATION START VALIDATION END RECORDS GROUPS INTERVALS TYPE SUBTYPE FAILURE DATE-TIME DATE-TIME VALIDATED VALIDATED VALIDATED 128 * N 10/23/ :00:00 10/23/ :00: N 10/23/ :00:00 10/23/ :00: * N 10/23/ :00:00 10/23/ :00: VALIDATION SUCCEEDED Time range that was validated, 11AM to 1PM, broken into two 60 minutes intervals Count of records and intervals validated Indicates successful validation of this record type and subtype When all data validates the report ends with this message. On a failure this would provide additional information 20
20 Validation Reports When it fails The report will end with VALIDATION FAILED status Only a single error is reported per IFASMFDP run IFA742I reports details about the failure 21
21 Validation Reports IFA742I Reasons CRYPTOGRAPHY FAILURE - ICSF RC/RSN=<rc>/<rsn> ICSF is inactive or other ICSF high level error Check Cryptographic Services ICSF Application Programmer's Guide INCONSISTENT RECORDS - RECORDS DO NOT MATCH EXPECTED COUNTS Potential inserted or deleted record INCONSISTENT RECORDS - RECORDS DO NOT MATCH EXPECTED TIMES Interval record does not have the correct time relative to previous Interval record A record does not have a consistent time relative to other records in the group INCONSISTENT RECORDS - FIRST FLAG DOES NOT MATCH Group records set a first flag for the first group in each interval Interval record set a first flag for the first interval written Altered, inserted or deleted signature data 22
22 Validation Reports IFA742I Reasons (cont) RECORD AND SUPPLIED CRYPTO OPTIONS DO NOT MATCH When signature record contains different SIGVALIDATE options than IFASMFDP parameter MISSING RECORDS - STARTING INTERVAL Started validation without initializing interval signature record and failed Change your START time or possible deletion of records prior to validating the first interval record MISSING RECORDS - ENDING INTERVAL When last interval record time does not match IFASMFDP ENDTIME parameter Change END time or possible deletion of trailing records INCOMPLETE VALIDATION - ENDED WITH PARTIAL INTERVAL Outstanding records were not validated, missing an interval record 23
23 IFASMFDL and IFASMFDP Exits The IFASMFDL and IFASMFDP provide an exit interface to intercept records that are processed This is the USER2 exit that can be specified on the SYSIN statement This exit will get control for signature records that will be written to the output data set The SIGSTRIP option will cause these records to not be written but also will not provide them to the USER2 exit 24
24 Toleration Support Without enabling the new options nothing changes Signatures can be turned on however validation processing is not required It is performed as needed At any point signatures can be stripped by IFASMFDL and IFASMFDP to provide an output data set with NO signature records Coexistence APAR OA47012 will provide toleration support to accept and ignore the new SMFPRMxx keywords on z/os V1R13 and V2R1 systems 25
25 Appendix z/os MVS System Management Facilities (SMF) SA Z/OS MVS Initialization and Tuning Reference SA z/os Cryptographic Services ICSF Administrator's Guide - SA
26 Thank You! 7/29/
z/os Cryptographic Services - ICSF Best Practices
z/os Cryptographic Services - ICSF Best Practices Steven R. Hart, CISSP IBM Thursday, August 7, 2014: 8:30 AM-9:30 AM Session Number 15775 Insert Custom Session QR if Desired. Topics Cryptography Basics
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
Sharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
Getting Started with Digital Certificates Part II (RACDCERT)
Getting Started with Digital Certificates Part II (RACDCERT) 1 This presentation will guide you through the RACF s world of Digital Certificates. We will attempt to explain how they can be used and how
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
CICS Transactions Measurement with no Pain
CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage
The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage The IBM zenterprise EC12 (zec12) server introduces the Flash Express feature (FC 0402) that provides a new PCIe
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support.
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support. 601DataPower_Security_NIST.ppt Page 1 of 17 This presentation discusses three new security features in the WebSphere DataPower
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005
IBM eserver The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005 Wai Choi IBM Corporation RACF Development Poughkeepsie, NY Phone: (845) 435-7623 e-mail: [email protected]
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011
Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Digital Certificates Demystified
Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: [email protected] February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
How Secure are your Channels? By Morag Hughson
How Secure are your Channels? By Morag Hughson Building Blocks So, you ve gone to great lengths to control who has access to your queues, but would you care if someone could see the contents of your messages
Encryption Facility for z/os Version 1.10
Front cover Encryption Facility for z/os Version 1.10 Principles of operations and options explained Examples of setup and use of all the features Expert considerations and recommendations Patrick Kappeler
SafeNet MSSQL EKM Provider User Guide
SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
National Certification Authority Framework in Sri Lanka
National Certification Authority Framework in Sri Lanka By Rohana Palliyaguru Manager Operations & Principal Information Security Engineer What is digital Signature? According to UNCITRAL Text 25. Digital
DomainKeys Identified Mail DKIM authenticates senders, message content
DomainKeys Identified Mail DKIM authenticates senders, message content Alt-N Technologies, Ltd. 2201 East Lamar Blvd, Suite 270 Arlington, Texas 76006 Phone: (817) 525-2005 Fax: (817) 525-2019 http://www.altn.com/
z/os 2.1 Security Updates
z/os 2.1 Security Updates September 2013 Julie Bergh [email protected] 1 2012 IBM Corporation Agenda Overview of Security Changes z/os Communication Server RACF ICSF PKI Services z/os ITDS zsecure 2 2
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
Crypto and Disaster Recovery. Greg Boyd [email protected] www.mainframecrypto.com
Crypto and Disaster Recovery Greg Boyd [email protected] www.mainframecrypto.com October 2014 Agenda Crypto and Disaster Recovery How Do You Do DR? Technology Hardware Domains Master Keys Restoring
End User Encryption Key Protection Policy
End User Encryption Key Protection Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization.
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
DVS DCI Signing Certificate Tool
DVS DCI Signing Tool User Guide (Version 1.0) DVS DCI Signing Tool User Guide User Guide Version 1.0 for the DVS DCI Signing Tool Version 1.0 Copyright 2008 by DVS Digital Video Systems AG, Hanover. All
AD Image Encryption. Format Version 1.2
AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
CA SMF Director. Release Notes. Release 12.6.00
CA SMF Director Release Notes Release 12.6.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
CALIFORNIA SOFTWARE LABS
; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
Archived NIST Technical Series Publication
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature
Outline Digital signature Cryptography basics Digital signature Dr. László Daragó, Ph.D. Associate professor Cryptography Cryptography encryption decryption Symmetric-key Cryptography Encryption with a
Digital Certificate Goody Bags on z/os
Digital Certificate Goody Bags on z/os Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: [email protected] August 6 th, 2012 Session 11623 Agenda What is a Digital Certificate?
SecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Everything is Terrible
Everything is Terrible A deep dive into provisioning and code signing Hello and welcome to Everything is Terrible. This is a deep dive talk into the processes behind provisioning and code signing on Apple
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT
1 PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-in.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Kerberos on z/os. Active Directory On Windows Server 2008. William Mosley z/os NAS Development. December 2011. Interaction with. [email protected].
Kerberos on z/os Interaction with Active Directory On Windows Server 2008 + William Mosley z/os NAS Development [email protected] December 2011 Agenda Updates to Windows Server 2008 Setting up Cross-Realm
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Microsoft SQL Server Integration Guide
Microsoft SQL Server Integration Guide Document Information Document Part Number 007-011108-001 (Rev J) Release Date August 2013 Trademarks All intellectual property is protected by copyright. All trademarks
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
A Question of Key Length
A Question of Key Length Does Size Really Matter When It Comes To Cryptography? White Paper December 7, 2015 By Alessio Di Mauro A Question of Key Length 2015 Yubico. All rights reserved. Page 1 of 10
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure
A Low Power Security Architecture for Mobile Commerce Peter Langendoerfer +, Zoya Dyka +, Oliver Maye + and Rolf Kraemer + Abstract: Mobile devices have limited resources in terms of computational power
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
z/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
How-to Access RACF From Distributed Platforms
How-to Access RACF From Distributed Platforms Saheem Granados IBM Wednesday, February 6, 2013 12538 [email protected] Trademarks The following are trademarks of the International Business Machines Corporation
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority. Adobe Acrobat Pro DC (Released July 2015)
DIGITAL SIGNATURES eplans REVIEW Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority Adobe Acrobat Pro DC (Released July 2015) 8 12 15 DIGITAL SEAL AND SIGNATURE
Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.
Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com [email protected] Version.05 9/2012 1 Certificate Use Overview
