DEP Documentation DEP Glossary
|
|
|
- Angela Elliott
- 9 years ago
- Views:
Transcription
1 Haachtsesteenweg Brussels Belgium DEP Documentation DEP Glossary Version: 04.00
2 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/29 Version Management Report Version Name(s) Date Comments TheSteamFactory 19/09/2000 Initial version TheSteamFactory 26/12/2000 Continue F. Demaertelaere 12/02/2001 Final version F. Demaertelaere 26/11/2002 Documentation platform independent F. Demaertelaere 06/12/2002 Small remarks F. Demaertelaere 20/02/2003 After crash of document P.Stienon 02/08/2005 Add of items P.Stienon, Bernard Durieux, I. de Aguirre 03/02/2006 Add of DEP/T6 product, new disclaimer and some others items P.Stienon 11/01/2008 New C-ZAM/DEP Xentissimo Anna Papayan Add of items
3 Atos Worldline - Technology & Products / Engineering / DEP Page: 3/29 CONFIDENTIALITY The information in this document is confidential and shall not be disclosed to any third party in whole or in part without the prior written consent of Atos Worldline S.A./N.V. COPYRIGHT The information in this document is subject to change without notice and shall not be construed as a commitment by Atos Worldline S.A./N.V. The content of this document, including but not limited to trademarks, designs, logos, text, images, is the property of Atos Worldline S.A/N.V. and is protected by the Belgian Act of related to author s right and by the other applicable Acts. The contents of this document must not be reproduced in any form whatsoever, by or on behalf of third parties, without the prior written consent of Atos Worldline S.A./N.V. Except with respect to the limited license to download and print certain material from this document for non-commercial and personal use only, nothing contained in this document shall grant any license or right to use any of Atos Worldline S.A./N.V. s proprietary material. LEGAL DISCLAIMER While Atos Worldline S.A./N.V. has made every attempt to ensure that the information contained in this document is correct, Atos Worldline S.A./N.V. does not provide any legal or commercial warranty on the document that is described in this specification. The technology is thus provided as is without warranties of any kind, expressed or implied, included those of merchantability and fitness for a particular purpose. Atos Worldline S.A./N.V. does not warrant or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product or process disclosed. To the fullest extent permitted under applicable law, neither Atos Worldline S.A./N.V. nor its affiliates, directors, employees and agents shall be liable to any party for any damages that might result from the use of the technology as described in this document (including without limitation direct, indirect, incidental, special, consequential and punitive damages, lost profits). JURISDICTION AND APPLICABLE LAW These terms shall be governed by and construed in accordance with the laws of Belgium. You irrevocably consent to the jurisdiction of the courts located in Brussels for any action arising from or related to the use of this document. sa Atos Worldline nv Chaussée de Haecht 1442 Haachtsesteenweg B-1130 Bruxelles-Brussel - Belgium RPM-RPR Bruxelles-Brussel - TVA-BTW BE
4 Atos Worldline - Technology & Products / Engineering / DEP Page: 4/29 1. TABLE OF CONTENTS 1. TABLE OF CONTENTS SCOPE OF THE DOCUMENT PRODUCT TERMINOLOGY GLOSSARY OF TERMS KEYS INITIAL AUTHORITY LEVEL BANKSYS AUTHORITY LEVEL CUSTOMER AUTHORITY LEVEL CAPABILITIES ABBREVIATIONS... 27
5 Atos Worldline - Technology & Products / Engineering / DEP Page: 5/29 2. SCOPE OF THE DOCUMENT The DEP Glossary document describes the terms used in the DEP documentation. This document centralises all the definitions and the abbreviations, normally every term is well explained in the appropriate documents. Here you can find the overview of the DEP product terminology. Together with the terminology and definitions, this document lists also some general keys and capabilities by their names and tags. 3. PRODUCT TERMINOLOGY DEP (Data Encryption Peripheral) The DEP is the name of the Banksys Host Security Module product line and is not considered as a product on itself. At this moment, the following DEP products are supported DEP/NT, DEP/Linux, DEP/XP, DEP/T6 and DEP/PCI. DEP/NT DEP/Linux DEP/XP DEP/T6 DEP/PCI DEP Crypto Module The DEP Crypto Module is a name for Atos Worldline own developed hardware responsible for cryptographic operations. Now, there is a DEP/ISA (end of life) and a DEP/PCI considered as DEP Crypto Module. DEP/ISA DEP/PCI
6 Atos Worldline - Technology & Products / Engineering / DEP Page: 6/29 DEP Platform A DEP Platform is either: Any Personal Computer (PC) or server in which one or more DEP Crypto Modules have been installed. Communication to the DEP Crypto Modules is done with software running on the PC or server itself (DEP/NT, DEP/Linux, or DEP/XP). The supervision on the DEP/NT and DEP/Linux can only be done with software running on the same DEP Platform, but for DEP/XP it can also be done with software (DEP/NMS) running on any other PC. A DEP/T6, where communication to the DEP Crypto Modules is done on the DEP/T6 and supervision of the DEP Platform and DEP Crypto Modules is done by the DEP/NMS and DEP/EM programs that are running on any other PC. DEP/ISA The DEP Crypto Module that is connected to the ISA slot of a DEP Platform (only supported in the DEP/NT). It is the first generation of the DEP Crypto Module. DEP/PCI The DEP Crypto Module that is connected to a PCI slot of a DEP Platform. It is the most recent generation of the DEP Crypto Module. The DEP/PCI v3.0 is
7 Atos Worldline - Technology & Products / Engineering / DEP Page: 7/29 Common Criteria EAL3+ certified and the DEP/PCI v4.0 is FIPS140-2 with Security Level3 certified. DEP/NT The DEP/NT is a DEP Platform based on a Windows NT 4.0 operating system with a Graphical User Interface. It supports both the DEP/ISA and the DEP/PCI. DEP/Linux The DEP/Linux is a DEP Platform based on a Linux operating system (minimal Linux kernel 2.4). The supervision is done through command line. It supports only DEP/PCI. DEP/T6 The DEP/T6 is a dedicated Banksys DEP Platform, it is designed with attention to reliability, performance and user-friendliness. It supports a high resolution graphic LCD, three soft menu keys and DEP/PCI.
8 Atos Worldline - Technology & Products / Engineering / DEP Page: 8/29 DEP/XP The DEP/XP is a DEP Platform based on a Windows XP operating system with Graphical User Interface. It supports only DEP/PCI. C-ZAM/DEP The C-ZAM/DEP is an independent chip card reader/encoder used to administer (loading keys and capabilities) a DEP Crypto Module. The new version of the C-ZAM/DEP is based on the Xentissimo terminal. DCC The C-ZAM/DEP is used as a keyboard for FIPS compliant DEP Crypto Modules. A DEP Control Card (DCC) is a chip card that is used to store all kinds of parameters and values used in a DEP Environment. They are used as a backup device to store secret (keys and capabilities) and non-secret (Definition Lists) values. It can be either a DCC List, DCC Storage or Dual Control Storage (DCS).
9 Atos Worldline - Technology & Products / Engineering / DEP Page: 9/29 4. GLOSSARY OF TERMS Alarm Software Executable software loaded during the production on the DEP Alarm of the DEP Crypto Module. It monitors continuously the tampering state of the DEP Crypto Module and takes the necessary actions in case of a tampering. Application Capabilities Capabilities required by the Application Software or BIOS to give the possibility to perform cryptographic operations or certain dedicated management functions (such as Application Software loading, Key backup/restore, etc.). Application Capabilities can only be loaded when an Application Software is present in the DEP Crypto Module. Application Keys Application Keys are secret keys required by the Application Software in order to perform cryptographic operations. Application Keys can only be loaded when an Application Software is present in the DEP Crypto Module. Application Secrets Application Secrets are secret values (Application Keys and Application Capabilities) that are used by the specific Application Software. Application Software Executable software loaded inside the DEP Crypto Module that performs cryptographic functions for the host. Application Software can easily be downloaded in a secure way (using the functionality of the BIOS). Authentication Key (AK) A key required for authentication of a DCC. The Authentication Key is known at C-ZAM/DEP and DCC level. Every Authority Level and Mode of Operation has its own Authentication Key. Authority Capability
10 Atos Worldline - Technology & Products / Engineering / DEP Page: 10/29 An Authority Capability is a dedicated capability that limits access to cryptographic operations/functions with Authority Keys. See paragraph 6 on page 26 for a list of the Authority Capabilities. Authority Keys The set of keys used to execute functions coupled to a certain Authority Level. E.g. the Authority Keys are used to protect the communication between the C- ZAM/DEP, DCC and DEP Crypto Module. See paragraph 5 on page 24 for a list of the Authority Keys. Authority Level The Authority Level provide a level of functionality/protection for the DEP Crypto Module. Every Authority Level has different Authority Secrets. Different Authority Levels have different functions available. The possible Authority Levels are No (NONE) Authority Level, Initial (INIT) Authority Level, Banksys (BKS) Authority Level and Customer (CUST) Authority Level. Application Software can only be loaded when the DEP is at CUST Authority Level. Authority Secrets Authority Secrets are secret values (Authority Keys and Authority Capabilities) that are used to build up the different Authority Levels. Atos Worldline Security Officer The ATOS Worldline Security Officer is the person responsible for the key management operations at Atos Worldline. The ATOS Worldline Security Officer manages the BKS Authority Keys. The personalisation of the DEP Control Cards is done under control of the ATOS Worldline Security Officer (AWL Security Officer). BIOS Executable software loaded during the production inside the DEP Crypto Module that starts-up the DEP Crypto Module and is responsible for loading Application Software. Capability Capabilities are required in the C-ZAM/DEP and DEP Crypto Modules to be allowed to perform certain secure operations. A Capability could be defined as the right to perform. It is implemented as a cryptographic result that is verified before a function is available.
11 Atos Worldline - Technology & Products / Engineering / DEP Page: 11/29 Capability Definition List The Definition List containing the descriptions and properties (name, tag and the reference to the Secret Sharing Scheme defined in the SSH Definition List) of capabilities used in the DEP Environment. Chip Card A programmable credit card-sized secure data storage device. The DEP Control Cards are personalised chip cards. Chip Card Reader (CCR) A device required to read/write the information from/to a chip card. The C- ZAM/DEP has a built-in Chip Card Reader. Check Value The Check Value is a 24-bits key value of type NORM, to guard against the keying errors. Critical Security Parameters Critical Security Parameters are security-related information (e.g., secret and private cryptographic keys, and authentication data such as passwords and PINs). The modification of CSPs can compromise the security of a cryptographic module. Cryptographic boundary A Cryptographic boundary is an explicitly defined continuous perimeter that establishes the physical bounds of a DEP Crypto Module and contains all the hardware, software, and/or firmware components. Customer Identification (CUST ID) The Customer Identification is a unique identification number of the customer. The Atos Worldline Security Officer guarantees that the Customer Identification is unique. Customer s Security Officer The Customer s Security Officer is the person responsible for the key management operations of the customer. This person is responsible for the key management, both at Authority Level (BKS Authority Keys, CUST Authority Keys and CUST Authority Capabilities) and at Application Software level (Application Keys and Application Capabilities). It is the Customer s Security Officer that operates the C-ZAM/DEP.
12 Atos Worldline - Technology & Products / Engineering / DEP Page: 12/29 C-ZAM/DEP Xentissimo The C-ZAM/DEP is the main key management device in a DEP Environment. This device can be connected directly to the DEP Crypto Module and guarantees a secure key input and treatment. The device possesses a display, chip card reader and keyboard for this purpose. Communication with the different peripherals (DEP Crypto Module and DCC) is protected with the Authority Keys. C-ZAM/DEP Application Transport Key A key defined in C-ZAM/DEP in Customer Authority Level via Definition List used to decrypt a manual entered application key. This application key is linked to the Application Transport Key. DCC Personalisation System The system that is responsible for the initialisation of virgin chip cards so that they become a DEP Control Card (DCC). This initialisation procedure is also called personalisation. The personalisation of the DCCs is done under supervision of the Atos Worldline Security Officer. Dedicated File (DF) The sub directory on a chip card is a Dedicated File that again can contain Elementary Files or sub directories in the form of Sub Dedicated Files. Definition List A Definition List contains the definitions and properties(name, tag, length, type, generation method and the reference to the Secret Sharing Scheme defined in the SSH Definition List) of keys (Key Definition List), capabilities (Capability Definition List) and Secret Sharing Schemes (SSH Definition List) to be used in the DEP Environment. It should be written on a DCC List. DEP/Linux Software Directory This is the directory where the DEP/Linux Software Environment will be installed on the Linux platform. DEP/Linux Software Environment The entire package of software (tools, DEPD Daemon, driver, ) that allows communication with and management of the DEP Crypto Module(s). DEP Alarm The DEP Alarm refers to the alarm processor of the DEP Crypto Module. This hardware is responsible for monitoring the DEP Crypto Module and taking the
13 Atos Worldline - Technology & Products / Engineering / DEP Page: 13/29 necessary actions when intrusion or tampering is detected (Tamper Responsiveness). DEP Control Card Identification (DCC ID) The DCC ID is a unique identification number of the DCC. The Atos Worldline Security Officer guarantees that the DCC identification number is unique per personalised DCC. DEP Control Card List (DCC List) A personalised Chip Card used for storing Definition Lists. DEP Control Card Storage (DCC Storage) A personalised Chip Card used for storing Application Secrets and/or Authority Secrets. Application Secrets and Authority Secrets can be stored using a defined Secret Sharing Scheme. DEPD Daemon (DEPD) The DEPD Daemon is a process running on the DEP/Linux. It is responsible for the communication with the DEP Crypto Module. DEPD Daemon Configuration File The DEPD Daemon Configuration File has a certain number of parameters that fine-tune the behaviour of the DEPD Daemon. DEP Environment The DEP Environment is the collection of different components that are necessary to manage, operate and use the DEP. It is a combination of a DEP Platform, a DEP Crypto Module, the C-ZAM/DEP and DCCs. DEP Handler Supervision The DEP Handler Supervision allows the user to manage the DEP Crypto Modules available in DEP/NT. Also it allows to obtain some supervision information about the DEP Crypto Modules. DEP Main The DEP Main refers to the main processor of the DEP Crypto Module. The main processor runs the Application Software and is responsible for the management of the Application Keys and Application Capabilities.
14 Atos Worldline - Technology & Products / Engineering / DEP Page: 14/29 DEP Master Key (DMK) The DEP Master Key of the DEP Crypto Module is used to encrypt/decrypt all Application Keys for backup and restore purpose. The DEP Master Keys should only be known at DEP Crypto Module level. DEP Parameter (DEP_PARAMETER) The DEP Parameter mechanism allows storing information in a DEP Crypto Module and provides means to protect and limit the use of this information to specific interfaces. The information can also be read again from the host. The purpose of the DEP Parameter mechanism is to provide means to the Security Officer to influence the behaviour of specific interfaces: a part of the information used by the interface is not sent to the DEP, but is already present in the DEP Crypto Module. DEP PC-AUX Application The DEP PC-AUX application is used to create and edit Definition Lists and exchange them with a C-ZAM/DEP. DEP Network Management System (DEP/NMS) Application This PC application is used to manage and configure DEP/T6 and DEP/XP Platforms and DEP Crypto Modules. The DEP/NMS application allows the management of a Pool of DEPs. DEP/NMS Application Plug Ins DEP/NMS Plug-Ins are additional tools developed by Atos Worldline to extend the functionality of DEP/NMS application. DEP/NMS License Dongle The DEP/NMS License Dongle is a Hardware USB dongle, which enables the usage of the Full Version of DEP/NMS. DEP Event Manager (DEP/EM) Application This PC application is used as a console that will receive the alarms/events coming from the managed DEP Platforms of type DEP/T6 and DEP/XP, their corresponding DEP Crypto Modules and from the connected DEP/NMS. DEP Software Cloning The DEP Software Cloning feature is used to transfer the application software, keys, capabilities and all parameters of master DEP Crypto Module to several selected DEP Crypto Modules. It speeds up the configuration of DEP Crypto
15 Atos Worldline - Technology & Products / Engineering / DEP Page: 15/29 Module with a same set parameters. It simplifies the process and reduces the time for secure installation or upgrade of a pool of DEP Crypto Modules.
16 Atos Worldline - Technology & Products / Engineering / DEP Page: 16/29 DEP Key Table (DKT) DEP Key Table is the table with permanent application key data. DEP Normal Transport Key (DNTK) With the DNTK an application key, exported by another device, can be imported. DEP RSA Key GEN&USE Application The DEP RSA Key GEN&USE application is used to generate RSA Key Pair, store them and then send them back to the host. DEP RSA Key Generation Plug-In The DEP RSA Key Generation Plug-In is used to generate RSA Key Pair and export them using RSA Transport Key (DES or AES). DEP RSA Key Loading Application The DEP RSA Key Loading application is used to generate RSA keys, to import them from files, to export them into files and to put them into the key table of the DEP Crypto Module. The program also allows generating EMV and PKCS#10 public key certificate requests based on the certificate s requester Self-Signed Certificate (SSC). This program can also read and check EMV certificate files. DEP RSA Key Import In Keytable Plug-In The DEP RSA Key Import In Keytable Plug-In is used to import RSA Keys into the DEP Crypto Module. DEP CTAP Certificate Generation Plug-In The DEP CTAP Certificate Generation Plug-In is used to generate CTAP Perso Provider and CTAP Security Scheme Provider Certificates. DEP NCR Self-Signed Certificate Plug-In The NCR Self-Signed Certificate Plug-In is used to generate a NCR Self- Signed Certificate and a Fingerprint on a RSA Public Key. DEP I_STD_IMPORT_EXPORT_KEY Application This application can be used to import and/or export keys into and/or from the DEP Crypto Module using the STD interfaces. DEP Special Transport Key (DSTK)
17 Atos Worldline - Technology & Products / Engineering / DEP Page: 17/29 With the DSTK an application key can be exported to another device for import with. DEP System 2 (DS2) DEP System 2 refers to the operating system of the previous generation of the Atos Worldline Host Security Modules. DEP System 3 (DS3) DEP System 3 refers to the operating system of the current generation of the Atos Worldline Host Security Modules. DEP System 4 (DS4) DEP System 4 is an extension made on the DS3. It allows a faster processing of the incoming messages possible. DS2 (Key) Backup A DS2 Backup is a secure backup of all the Application Keys of previous generation of the Banksys Host Security Modules (DEP/M3) based on the DEP System 2. DS3 (Key) Backup A DS3 Backup is a secure backup of all the Application Keys inside the DEP Crypto Module of the current generation of the Atos Worldline Host Security Modules based on the DEP System 3. Dual Control Storage (DCS) The DCS is used to store information of the customer administrators and software-loading operators. Such as customer administrators and softwareloading operators credentials, K_AWLs and Check Values and secret keys in Dual Control mode. Elementary File (EF) An Elementary File is a file on a chip card. Data is stored in Elementary Files, which can exist at any of the three directory levels. A distinction between several types of Elementary Files is made. The difference between those different file types lies in their access rights (Public File, Secret File or Working File). FIPS validation program
18 Atos Worldline - Technology & Products / Engineering / DEP Page: 18/29 Firmware FPGA The scope of this validation is the configuration of DEP/PC. This configuration is used to securely load an application and/or keys into it. Only authorized personnel, such as Customer Administrators and Operators belonging to the Software-loading group can load keys and load application software, respectively. Firmware is a program and data component of a DEP that are stored in hardware and cannot be dynamically written or modified during the execution. FPGA is a general purpose chip which can be programmed to carry out, in parallel, specific digital functions. The FPGA firmware contains implementations of AES, DES, RSA, ECC and SHS, which are used by the BIOS and by a DEP Application Software. Graphical User Interface (GUI) Hardware The Graphical User Interface includes all the applications on the DEP Platform that interact with the user in a graphical way. Hash Code The Hardware is physical equipment used to process programs and data. A Hash Code over a message is a message digest or fingerprint of the message. The Hash Code changes when even one bit in the message is modified. Besides it is practically impossible to find the message that results in the same message digest as another message (one-way function). Host Interface Supervision The Host Interface Supervision is part of the DEP/NT and allows parameterising the communication protocol between the DEP/NT and the host. In addition, it offers also some supervision information. Host Key Database (HKD) Host Key Database is a database on host with key tokens using HMK. Host Master Key (HMK) Key used to decrypt a key from Host Key Database and to generate cryptogram to store a key in Host Key Database.
19 Atos Worldline - Technology & Products / Engineering / DEP Page: 19/29 Host Security Module (HSM) The purpose of a Host Security Module (HSM) is to store secret keys in it and to use these keys in a strictly defined way. Moreover, a HSM supports the secure creation of the secret keys that need to be stored in it and offers the functionality to load in a secure way these keys in the protected environment of the device. To meet these requirements it is necessary that a HSM be protected against tampering, meaning that someone having physical access to the device should not be able to obtain the secrets that are stored in it. Because the keys may only be used in a strictly defined way, also the loading of software that has access to the keys should to be protected adequately.. Issuer Key (IK) A key required for accessing a files on a DCC. The Issuer Key is known at C- ZAM/DEP and DCC level. Every level of operation has its own Issuer Key. K_AWL key KeyMAC K_AWL key are AES 256-bits key, used for the protection of confidentiality and authenticity of DEP Application Software and Operator group configuration. AWL generates a K_AWL key per customer, divides it in 2 components and gives them in clear to the 2 Customer Administrators on paper, in separate envelopes. A cryptographic Hash Code that is calculated over all the keys available in the DEP Crypto Module. The KeyMAC is recalculated regularly to verify the integrity of the keys. Key Backup A Key Backup (DS2 Key Backup or DS3 Key Backup) is a secure backup of all the Application Keys available in the DEP Crypto Module. The backup is protected with the DEP Master Key. Key Backup Conversion Procedure The Key Backup Conversion Procedure is the procedure for converting a Key Backup from the DS2 generation (DS2 Key Backup) into a Key Backup for the DS3 generation Host Security Modules (DS3 Key Backup). Key Derivation Tool The Key Derivation Tool is an application used to create derived keys from a Master Key.
20 Atos Worldline - Technology & Products / Engineering / DEP Page: 20/29 Key Reconstruction The Key Reconstruction is one of the methods used to introduce the secret keys by the Security Officer. There are two methods of Key Reconstruction: Key Reconstruction in C-ZAM/DEP and Key Reconstruction in DEP. Key Restore A Key Restore is a secure restore of all the Application Keys to the DEP Crypto Module. The restore is protected with the DEP Master Key. Key Token The cryptogram used for a key stored in the Host Key Database (HKD). Key Tokens are downloaded into the DEP for being used as cryptographic keys. The download is temporary, i.e. the downloaded keys persist in the DEP secure memory only for the time necessary for the execution of the DEP call. Key Transport Key Transport is a secure transport of cryptographic keys from one DEP Crypto Module to another one. Manipulation Detection Code (MDC) A Manipulation Detection Code is a synonym of a Hash Code. Master File (MF) A Master File is the major overall file of the DCC. It can contain Elementary Files and Dedicated Files. Message Authentication Code (MAC) A Message Authentication Code is a Manipulation Detection Code that guarantees the integrity/authenticity of the message and that identifies the sender of the message. A Message Authentication Code is normally calculated with a cryptographic algorithm using cryptographic keys. Mode of Operation Indicates in which mode the DEP Environment has to operate: in live (LIV), for development purposes (DEV) or for testing purposes (TST). RTI (Real Time) is sometimes used as synonym of LIV (live) Mode of Operation.
21 Atos Worldline - Technology & Products / Engineering / DEP Page: 21/29 Personal Identification Number (PIN) Personal Identification Number is a numeric code used to authenticate an identity. Personal Identification Number Printing (PIN Printing) The PIN Printing operation is the sensitive operation of printing the clear secret PIN code of a chip card. Pool of DEPs The Pool of DEP is a group of DEP Crypto Modules. The message sent to the pool is accepted by the first free DEP Crypto Module in the pool. Platform software (VENUS) A Platform Software (VENUS) is a host application that lies on a DEP/T6. Pre-expired username and password AWL gives securely the corresponding clear default pre-expired passwords and usernames to the customer s administrators, on paper in separate envelopes, to be used as initial authentication credential. Printer Service The Printer Service is a DEP/T6 platform management service. It used to send information directly to the printer, which is connected to DEP/T6. Private Key (RSA or ECC) Private Key is a cryptographic key known only to the party or parties that exchange secret messages to encrypt and decrypt the messages. It is used together with the Public Key. Public Key (RSA or ECC) The Public Key is a cryptographic key provided by some designated authority as an encryption key that combined with a private key can be used to effectively encrypt messages and digital signatures. Public File (PF) A Public File is an Elementary File that can be read freely, but its changing is restricted.
22 Atos Worldline - Technology & Products / Engineering / DEP Page: 22/29 Real-Time Clock The Real-Time Clock is a secure date and time of the DEP Crypto Module (e.g. for signing operations). The Real-Time Clock has to be set by the Customer s Security Officer before it can be used. Secret File (SF) A Secret File is an Elementary File that can never be read via a chip card interface. It can only be used internally in and by the chip card. Changing a Secret File is restricted. Secret Sharing Definition List The Definition List containing Secret Sharing Schemes used in the DEP environment. Secret Sharing Scheme (SSH) The Secret Sharing Scheme defines the way in which a secret is divided in different parts to be distributed among different persons. Secret Sharing Index The Secret Sharing Index is the identification code of a specific Secret Sharing Scheme in the Secret Sharing Definition List. Secure Hash Algorithm (SHA) The Secure Hash Algorithm (SHA) is a secure algorithm delivering a Hash Code over a message. Security Officer Self-Tests A Security Officer is responsible for the management of secret keys and capabilities. The DEP Crypto Module performs a number of power-up and conditional Self-Tests to ensure the proper operation of the DEP Crypto Module. Self- Tests are run automatically when the DEP Crypto Module is initialized.
23 Atos Worldline - Technology & Products / Engineering / DEP Page: 23/29 Software Authentication Code (SW AC) A Software Authentication Code is a Message Authentication Code calculated over the Software Application to guarantee the integrity and origin of the software. The Atos Worldline Security Officer calculates the Software Authentication Code. Software MAC A cryptographic Hash Code that is calculated over the Application Software available in the DEP Crypto Module. The Software MAC is recalculated at every start-up. Software loading Operators The two customer Administrators together create the specialized group of Operators. The software-loading operators are responsible for loading the Application Software on FIPS compliant DEP Crypto Modules. At least two Software-loading Operators are needed. Software DFS document The software DFS document contains the Detailed Functional Specification (DFS) of DEP interfaces that are included in appropriate software. It also gives the list of all elements interfaces, data, keys, capabilities, parameters, errors) defined in the software it is given with. The document is used by the Host Developer to build calls. Status Information Status Information is indicating certain operational characteristics or states of the DEP Crypto Module. Sub Dedicated File (SDF) Tag A Sub Dedicated File is a directory in a Dedicated File. These SDFs cannot contain any more sub directories, but can only contain Elementary Files. A Tag is a four-byte identification number of information used in the DEP Environment. There are data tags, function tags, key tags, error tags, capability tags, parameter tags and counter tags Tamper Detection Tamper detection is an automatic determination by a DEP Crypto Module of an attempt to attack the physical security of the DEP Crypto Module.
24 Atos Worldline - Technology & Products / Engineering / DEP Page: 24/29 Tamper Evidence The intent of the tamper evidence is to provide evidence that an attack has been attempted and may or may not have resulted in the unauthorised disclosure or modification of the sensitive data. The disclosure of an attempted attack could be in the form of physical evidence such as damage to the packaging. (ISO CD 13491) The physical damage must be such so that the device cannot be placed back in service without a high probability of the tampering being detected. (ISO :1991(E)) Tamper Resistance The intents of tamper resistance is to block attacks against the information to be protected from unauthorised disclosure or modification by employing passive barriers. (ISO CD 13491) Tamper Response The intent of tamper response is to employ active barriers against attacks at unauthorised disclosure or modification of the protected information. (ISO CD 13491) Third Party s Security Officer The Third Party could develop its own Application Software and being responsible for the distribution of its Application Software, and thus the key management that is linked to it. In this case, the Third Party needs a Security Officer equivalent to the Atos Worldline Security Officer, called the Third Party s Security Officer. Transport Key (TK) A Transport Key is a key used to encrypt messages sent between the different devices in a DEP Environment. In other words, it is a key to transport (sensitive) information from one device to another in a secure way. Working File (WF) A Working File is an Elementary File whose protection rights are customisable. 5. KEYS 5.1. INITIAL AUTHORITY LEVEL The Initial Authority Keys consist of different parts.
25 Atos Worldline - Technology & Products / Engineering / DEP Page: 25/29 Name KM_AUTH_INIT_CAP_DEP_XXX KM_AUTH_INIT_TK_CZD_DEP_XXX KM_AUTH_INIT_TK_DEP_DCC_XXX KM_AUTH_INIT_CAP_CZD_XXX KM_AUTH_INIT_IK_DCC_XXX KM_AUTH_INIT_AK_DCC_XXX KM_AUTH_INIT_TK_CZD_DCC_XXX 04F F F F F00C00 04F00F00 04F01200 Tag XXX stands for LIV for live mode, TST for test mode and DEV for development mode BANKSYS AUTHORITY LEVEL The Banksys Authority Master Keys (KM_AUTH_BKS - 04F01500) consist of different parts: Name KM_AUTH_BKS_CAP_DEP_XXX KM_AUTH_BKS_TK_CZD_DEP_XXX KM_AUTH_BKS_TK_DEP_DCC_XXX KM_AUTH_BKS_CAP_CZD_XXX KM_AUTH_BKS_IK_DCC_XXX KM_AUTH_BKS_AK_DCC_XXX KM_AUTH_BKS_TK_CZD_DCC_XXX 04F F F F00A00 04F00D00 04F F01300 Tag XXX stands for LIV for live mode, TST for test mode and DEV for development mode CUSTOMER AUTHORITY LEVEL The Customer Authority Master Keys (KM_AUTH_CUST - 04F01600) consists of different parts: Name KM_AUTH_CUST_CAP_DEP_XXX KM_AUTH_CUST_TK_CZD_DEP_XXX KM_AUTH_CUST_TK_DEP_DCC_XXX KM_AUTH_CUST_CAP_CZD_XXX KM_AUTH_CUST_IK_DCC_XXX KM_AUTH_CUST_AK_DCC_XXX KM_AUTH_CUST_TK_CZD_DCC_XXX 04F F F F00B00 04F00E00 04F F01400 Tag XXX stands for LIV for live mode, TST for test mode and DEV for development mode.
26 Atos Worldline - Technology & Products / Engineering / DEP Page: 26/29 Note: All the keys have the same tag, whether they are meant for LIV, TST or DEV mode. The DEP security mechanisms ensure that a key value specified for a specific mode cannot be used by a device that is in another mode. This implies that keys of different modes cannot be mixed. 6. CAPABILITIES CAP_AUTH_BKS (Banksys Authority Master Capability - 05F00100) Capability to create/save Banksys Authority Master Keys, create/save Customer Authority Master Capability, read/save/change definition of the C- ZAM/DEP keys and capabilities. CAP_AUTH_CUST (Customer Authentication Master Capability - 05F00300) Capability to create/save Customer Authority Master Keys, create/save Customer Authority Capabilities for the DEP Crypto Module, create application keys on the C-ZAM/DEP, read/save/change the definition of Customer Application Keys/Capabilities. CAP_BKS_SW_AC (Software Authentication Capability - 05F00400) The CAP_BKS_SW_AC is the capability to generate a Software Authentication Code with the C-ZAM/DEP. CAP_STD_CHANGE_DMK (Change DMK Capability 05000F00) The CAP_STD_CHANGE_DMK is the capability to load the Alternative DMK in the DEP and to restore a DS3 keys backup under the control of this Alternative DMK. CAP_STD_MERGE_BACKUP (Merge Backup Capability 05000E00) The CAP_STD_MERGE_BACKUP is the capability that allows the merge of two DS3 keys backups in the same DEP. CAP_STD_SW_LOAD (Software Load Capability ) The CAP_STD_SW_LOAD is the capability to load the Application Software. CAP_STD_SAVE_KEYS (Save Application Key Capability ) The CAP_STD_SAVE_KEYS is the capability to create or restore a Key Backup.
27 Atos Worldline - Technology & Products / Engineering / DEP Page: 27/29 CAP_STD_SET_PARAMETER (Set Parameter Capability xx) The CAP_STD_SET_PARAMETER is a capability to modify a parameter in the DEP Crypto Module. CAP_STD_TRACE (Tracing Capability ) The CAP_STD_TRACE is a capability to activate the trace functionality of the DEP. CAP_STD_SET_RTC (Setting Real Time Clock Capability D00) The CAP_STD_SET_RTC is a capability to set the Real Time Clock in the DEP Crypto Module. CAP_STD_XOR_KEY_COMPONENT (Xoring keys in the DEP Crypto Module ) The CAP_STD_XOR_KEY_COMPONENT allows to load a key by XORing a number of key components. When this capability is active, the different key components sent to the DEP Crypto Module are XORed in the DEP Crypto Module to generate the final key. It can only be used for key loading via C- ZAM/DEP. 7. ABBREVIATIONS AC ADD AES AK AUTH BKS CAP CBC CC CMAC CMVP CSP CUST CZD DCC DCS DEP DEPD DEA DES Authentication Code (sometimes called a Certificate ) Algorithm Detailed Design Advanced Encryption Standard Authentication key (sometimes called a Acquire Key ) Authority Level Banksys (Authority Level) Capability Cipher Block Chaining Common Criteria Cipher-based MAC Cryptographic Module Validation Program Critical Security Parameter Customer (Authority Level) C-ZAM/DEP DEP Control Card Dual Control Storage Data Encryption Peripheral DEP Daemon (Linux only) Data Encryption Algorithm Data Encryption Standard
28 Atos Worldline - Technology & Products / Engineering / DEP Page: 28/29 DEV Development (Mode) DF Dedicated File DFS Detailed Functional Specifications DMK DEP Master Key DNS Dynamic Name Solving DNTK DEP Normal Transport Key DP DEP Protocol DS2 DEP System 2 DS3 DEP System 3 DS4 DEP System 4 DSTK DEP Special Transport Key DUKPT Derived Unique Key Per Transaction ECC Elliptic Curve Cryptography EDC Error Detection Code EDP Enhanced DEP Protocol EFT Electronic Fund Transfer EMC Electromagnetic compatibility EMI Electromagnetic Interference EMV Eurocard-Mastercard-Visa (standard) FIPS Federal Information Processing Standard FPGA Field-Programmable Gate Array GUI Graphical User Interface HKD Host Key Database HMK Host Master Key HSM Host Security Module ICC Integrated Chip Card ICV Initial Chaining Value INIT Initial (Authority Level) IK Issuer key ISA Industry Standard Architecture ISO International Organization for Standardization KD Derived Key KM Master Key LIV Live (Mode) MAC Message Authentication Code MDC Manipulation Detection Code MF Master File NORM First 3-bytes of the encryption of a zero string with the key to be checked NIST National Institute of Standards and Technology OS Operating System PC Personal Computer PCI Peripheral Component Interconnect bus PF Public File PIN Personal Identification Number PKI Public Key Infrastructure RAM Random Access Memory
29 Atos Worldline - Technology & Products / Engineering / DEP Page: 29/29 RSA RTC SDF SF SHA SO SSC SSH STD SW SW AC TK TST UKPT WF Rivest - Shamir - Adleman Real-Time Clock Sub Dedicated File Secret File Secure Hash Algorithm Security Officer Self-Signed Certificate Secret Sharing Scheme Standard Software Software Authentication Code Transport Key Test (Mode) Unique Key Per Transaction Working File
DEP Documentation DEP ATOS Worldline Security Officer Guide
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP ATOS Worldline Security Officer Guide ATOS Worldline - Technologies & Products Page: 2/31 Version Management Report Version Name(s) Date
DEP Documentation DEP Customer's Host Programmers Guidelines
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP Customer's Host Programmers Guidelines Version: 04.01 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/10 Version Management
DEP Documentation DEP/EM User Manual
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP/EM User Manual Version: 04.00 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/19 Version Management Report Version Name(s)
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
DEP RSA Key Loading Program User Manual
Technologies & Products Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP RSA Key Loading Program User Manual Version: 03.04 banksys - Technologies & Products Page: 2/45 Version Management
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 May 1, 2015 Document Version 2.0 Module Versions 6.0.4 or 6.3.4
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)
FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature
Security Confirmation and Report T-Systems.02192.TE.08.2007 SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature Siemens AG Confirmation concerning Products for Qualified
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Security Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
CA DLP. Release Notes for Advanced Encryption. r12.0
CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR MODULE OVERVIEW SCOPE OF DOCUMENT. Security Policy REV 1.2, 10/2002
Security Policy MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR ENCRYPTION SERVICES MODULE REV 1.2, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 1 Terms and Definitions... 2 Security Level...
IDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module
VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N : 1.0
Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Certification Report
Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise [email protected] Agenda Evaluation
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
Aloaha Sign! (English Version)
Aloaha Sign! (English Version) Aloaha Sign! (English Version) All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
HIGHSEC eid App Administration User Manual
HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Description of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
Device Certificates on Polycom Phones
Feature Profile 37148 Device Certificates are an important element in deploying a solution that ensures the integrity and privacy of communications involving Polycom UC Software devices. Device Certificates
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
JCB Terminal Requirements
Version 1.0 April, 2008 2008 JCB International Co., Ltd. All rights reserved. All rights regarding this documentation are reserved by JCB Co., Ltd. ( JCB ). This documentation contains confidential and
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
PROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Handling of card data in conformance with PCI DSS
Handling of card data in conformance with PCI DSS Version 2 June 2010 Objective MasterCard, Visa, American Express, Diners and JCB have together created the framework PCI DSS (Payment Card Industry Data
Security Policy. Trapeze Networks
MP-422F Mobility Point Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
DVS DCI Signing Certificate Tool
DVS DCI Signing Tool User Guide (Version 1.0) DVS DCI Signing Tool User Guide User Guide Version 1.0 for the DVS DCI Signing Tool Version 1.0 Copyright 2008 by DVS Digital Video Systems AG, Hanover. All
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards 3Com Corporation 5403 Betsy Ross Drive Santa Clara, CA 95054 USA February 24, 2006 Revision Version 0.4 Page 1 of 15 1. Introduction The following
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support.
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support. 601DataPower_Security_NIST.ppt Page 1 of 17 This presentation discusses three new security features in the WebSphere DataPower
FD40 User Guide. Version 16.0 June 2015
FD40 User Guide Version 16.0 June 2015 First Data Merchant Solutions is a trading name of First Data Europe Limited, a private limited company incorporated in England (company number 02012925) with a registered
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy Document Version: 1.0 Date: April 25, 2012 Athena Smartcard Inc. Public Material may be reproduced only
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
