CERTIFICATE-BASED SINGLE SIGN-ON MECHANISM FOR MULTI-PLATFORM DISTRIBUTED SYSTEMS Magyari Attila*, Genge Bela**, Haller Piroska**
|
|
|
- Thomasine White
- 10 years ago
- Views:
Transcription
1 CERTIFICATE-BASED SINGLE SIGN-ON MECHANISM FOR MULTI-PLATFORM DISTRIBUTED SYSTEMS Magyari Attila*, Genge Bela**, Haller Piroska** Petru Maior University of Tirgu Mures Nicolae Iorga Str., No. 1, Mures (540088), ROMANIA * (Phone: ; [email protected]). ** (Phone: ; {bgenge,phaller}@engineering.upm.ro). Abstract: We propose a certificate-based single sign-on mechanism in distributed systems. The proposed security protocols and authentication mechanisms are integrated in a middleware. The novelty of our middleware lies on the use of XPCOM components, this way we provide a different services that can be used on every platform where Mozilla is available. The component based architecture of the implemented services allows using the authentication components separately. Keywords: single sign-on, authentication, security protocols, cryptography, multi-platform 1. Introduction In this paper we propose a single sign-on mechanism based on certificates generated on request for client applications. Single sign-on mechanisms ensure the use of user credentials for accessing multiple resources where the user is requested to enter its credentials only once. This ensures a reduction of the number of passwords used which can significantly improve security of systems by minimizing the likelihood of a password being compromised [1]. Communication between client applications and servers is done using secure channels based on security protocols. In order to minimize the overhead needed for accessing multiple servers, instead of using protocols such as SSL [2] or its more recent version TLS [3], we designed a set of new protocols based on Guttman s authentication tests [4, 5]. The protocols have been implemented using the existing security library OpenSSL [6], which, together with the protocol descriptions, ensures the correct implementation of the designed protocols. In order to provide a minimal effort for developing single sign-on mechanisms in distributed systems, we developed a middleware that implements the proposed security protocols and single sign-on mechanism. Existing single sign-on mechanisms are either implemented to function on a single platform, such as Active Directory [7] for Microsoft Windows or edirectory [8] for Unix systems, or they rely on a centralized directory structure
2 such as LDAP [9], to which servers must be connected in order to authenticate users. The novelty of our middleware lies on the use of XPCOM [10] components provided by the Mozilla platform to encapsulate the communication layer. This way, we do not only provide a single sign-on mechanism for a single platform, but a mechanism that can be used on every platform where Mozilla is available. The rest of the paper is structured as follows: In the next section we describe the architecture of the middleware: the requirements, the software stack and the security protocols. 2. Middleware architecture 2.1 Requirements Network users typically maintain a set of authentication credentials (usually a username/password pair) with every Service Provider (SP) they are registered with. In the context of this paper a service provider is any entity that provides some kind of service or content to a user. Examples of SPs include web services, messenger services, FTP/web sites, and streaming media providers. The number of such SPs with which users usually interact has grown beyond the point at which most users can memorize the required credentials. The most common solution is for users to use the same password with every SP with which they register a tradeoff between security and usability in favor of the latter. A solution for this security issue is Single Sign-On (SSO), a technique whereby the user authenticates him/herself only once and is automatically logged into SPs as necessary, without requiring further manual interaction [11]. There are several approaches to create a SSO network: The Kerberos based [12] systems initially prompt the user for credentials, emitting a Kerberos ticketgranting ticket (TGT). Drawbacks to the Kerberos based system include the centralized architecture: when the Kerberos server is down, no one can log in. Kerberos requires the clocks of the involved hosts to be synchronized, the tickets have a time availability period, by default configuration 10 minutes, and if the host clock is not synchronized with the Kerberos server clock, the authentication will fail. Also, the secret keys for all users are stored on the central server, so a compromise of that server will compromise all users' secret keys. Another approach would be the smart card based authentication: an integrated circuit, which can process data, is embedded in a plastic card, which will be used to identify its owner. The necessity of this hardware, which can easily be physically damaged, stolen or compromised, excluded this method from our list. Some other possibilities include the use of one-time passwords (OTP) or the integrated windows authentication but for our model we have
3 chosen a client certificate based configuration. First of all, the X.509 certificates we re using are ITU-T standardized, which widens the possibilities of the implementations or further developing. These certificates are based on the RSA encryption algorithm, providing the necessary security needed. The certificates are relatively easily generated and due to their small size, their storage and transport over the network is also easy. The X.509 certificates store several predefined information about their owner, but can also contain custom data. We use these fields to store each client s permissions in the network. An immediate disadvantage of such an approach is the support for a single encryption algorithm at a time. It was shown that the algorithm can be broken if there are enough resources used, but using larger keys (1024 or 2048 bit) makes this very hard, if not impossible, with existing technologies. Another drawback to RSA encryption is its processing power and execution time, compared to other algorithms, like: AES, 3DES, Blowfish or RC6. This is why we try to minimize its usage, and when possible, replace it with a more resource-friendly encryption algorithm. Single sign-on mechanisms already exist, and they are widely used, like the mentioned Active Directory for Microsoft Windows or edirectory for UNIX systems. However they are platform-specific. Our goal was to create a mechanism that runs on a wide variety of platforms, hence we have chosen XPCOM. It stands for Cross Platform Component Object Model, and it s a framework for writing multi-platform, modular software. The core of the components is written using the NSPR (Netscape Portable Runtime [13]) libraries, as shown in Figure 1 [14]. As an application, it uses a set of core XPCOM libraries to selectively load and manipulate XPCOM components. It s open source, and it supports just about any platform that hosts a C++ compiler, including: Microsoft Windows, Linux, HP-UX, AIX, Solaris, OpenVMS, MacOS, and BSD.
4 Figure 1. Top Level Conceptual Architecture of Mozilla Application Suite 2.2 Software Stack The middleware structure has four layers, as shown in Figure NSPR Figure 2. Middleware structure The NSPR layer of the middleware is implemented using of various classes and objects, such as threads, sockets, coders, parsers, timers, several data structures, and other implementations, which form the foundation of the whole platform. These components were written using the NSPR libraries. Netscape Portable Runtime (NSPR) provides platform independence for non- GUI operating system facilities. These facilities include threads, thread
5 synchronization, normal file and network I/O, interval timing and calendar time, basic memory management and shared library linking. The current implementation supports Macintosh (PPC), WIN-32 (WinNT, Win9x) and 20 versions of UNIX and is still expanding Communication Channels The communication channels are built on top of the NSPR layer to create more advanced data transportation mechanisms. The channels are created dynamically and managed by channel handlers. They support custom, predefined structured messages, but also raw data Single Sign-on Single sign-on (SSO) is a mechanism whereby a single action of user authentication and authorization allows accessing to all computers and systems where authorization rights have been verified, without the need to enter multiple passwords. Single sign-on reduces human error, a major component of systems failure and is therefore highly desirable. Our proposed system is composed of two types of participants: clients and servers. In Figure 3 we illustrated a simple network with 3 servers and two clients: one already connected and another who s in the authentication process. The communication lines between the nodes may be unstable and in most of the cases unsafe, which exposes our messages to different threats like spoofing, replicating or simple message loss. We designed the system to prevent any of these attacks, and to be easy to implement and use. Each server can hosts many and different services, but for our model we only need an authentication service and a resource service. The services are of type request-response, and all the data sent is confidential. The authentication service provides two types of authentication mechanisms: the first one requires the use of a username and password, while the second one requires the use of the generated certificates. In order to gain access to a Service Provider (SP), a client first has to register at one server called the home server. Each server can be a home server and resource server at the same time; it s only relative to the client. The registration can take any form, in our model we assume that there is a secure database, where every client is already registered. The requester contacts its home server, and sends him his credentials (Step 1 in Figure 3); this is the only time he has to manually log in. The home server will generate a certificate, containing user data (e.g. username, location, organization name, address), expiration date, but also information about the issuer, to verify its genuineness. The certificate also contains information about the user s permissions, following a role-based access control (RBAC) model. Since users are not assigned
6 permissions directly, but only acquire them through their role (or roles), management of individual user rights becomes a matter of simply assigning appropriate roles to the user. This simplifies common operations, such as adding a user, or changing a user's department. In Step 2 (Figure 3), the client receives the certificate. The next two steps, 3 and 4 in Figure 3 are to contact the desired SP, sending the certificate, and exchanging a session key, which will be used to encrypt data from now on. RSA encryption algorithms, which we used so far, require more processing power, so we will use the triple DES algorithm, with a new key each session to maximize security and performance. If the client wants to access a different SP, it just has to send the certificate, and a new session key will be generated. As long as the certificate isn t expired, it can connect to every SP in the network, otherwise it will have to repeat the first step and obtain a new certificate. Figure 3. System setup 2.3 Security Protocols In the proposed middleware, there was a need for authentication protocols that satisfied security requirements, such as: confidentiality in an insecure environment, supporting message loss, certificate and key generation. We developed several security protocols, based on Guttman s authentication tests. The implementation of these protocols was done using the OpenSSL security
7 libraries. A combination of symmetric and asymmetric cryptographic algorithms was used to achieve a balance between security and performance. The authentication consists of two phases: acquiring the certificate from the home server, and the second to authenticate at the resource server with the newly generated credentials. In order to achieve a valid certificate and key, the client (A) needs to contact its home server (B). This is where the first phase of the authentication protocol takes place (Figure 4), initiated by the client who sends its username, requesting a connection. If the server finds the username in its database, and the system is capable of accepting a new connection, it generates a 1024 bit length nonce (N, random). A hash function (h) is applied on this nonce, and is sent to the client, together with a message informing the other participant that it can continue with the next step. Then, the client sends its username and password, and a single secret key is generated (K AB ) used to encrypt the next message from the server. The received hash of the nonce is hashed again, and together with the username, password and the generated symmetric key, are encrypted using the server s public key (pk B ). Upon receiving the data from the client, the server hashes the nonce once again and compares it to the previously saved data. If they match, meaning the message is fresh, it verifies the username and password and a new certificate will be generated, along with the RSA inverse keys. The secret key (sk A ) will be encrypted with the key received from the client. The keys, the certificate and the nonce are digitally signed, and sent back to the client. This will verify the nonce and the signature, and if everything is valid, the certificate and the secret key are decoded and decrypted, finalizing the first phase of the authentication. The second phase of the authentication, which you can see in Figure 4, starts after acquiring a certificate. The client contacts the desired resource server, communicating his intentions on getting access to the resources. If the server is willing to accept new connections, it will generate and send a 1024 bit nonce (N), informing the client about the connection being accepted. Receiving this message, the client hashes and signs the received nonce with his own private key (sk A ), and attaches the certificate to the message. The server can verify the signed nonce with the received certificate, but this certificate will also be verified to ensure it was emitted by a trusted authority, in this case, the client s home server. If no problems occur, the server proceeds to generate a session key (K AB ), which will be used for further data encryption. This key and the nonce will be encrypted with the client s public key (pk A ), and also signed by the server, to protect its contents. The whole message is encrypted again with the server s public key, to prevent any modifications on the data.
8 Figure 4. Authentication protocol 3. Experimental Results The tests were performed on a Microsoft Windows machine, 2800 Mhz dual core CPU. As you can see in Figure 6, the RSA key generations use the most resources. When the number of clients is lower then 10, the delay could vary between 50 to 500 milliseconds, but if more than 10 clients try to request certificates simultaneously, the waiting time can go over 1-2 seconds, as you can see in Figure 7. This wouldn t be a problem, but in a populated network, we can t limit the number of clients to 10, there could be hundreds of even thousands of requests at the same time, and could create a bottleneck in the servers. The key generating time is directly proportional with the processing power of the CPU, so upgrading our hardware can speed up the acquiring process. There are several other ways to improve the overall performance of the system: Using a dedicated processor for RSA key generation, optimized only for this algorithm; Developing a new, or improving the current library algorithm; Introducing a new type of server in our system, this could analyze each server s load and balance the system by sending clients to less busy servers.
9 Figure 5. Certificate and RSA key generation in time Figure 6. Certificate acquiring time by client
10 4. Conclusions We implement a middleware platform based on XPCOM components to assure different services for platform independent distributed application. The proposed authentication protocol as part of the middleware was design to work in an insecure environment, supporting message loss, certificate and key generation. The implemented protocols have high computational requirements, but the proposed distributed architecture of the services can guarantee this. References [1] Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber, Authentication in Distributed Systems: Theory and Practice, ACM Trans. Computer Systems 10, Nov [2] Freier, A., O., Karlton, P., Kocher, P., C., The SSL Protocol, Version 3.0, draft-ietf-tlssslversion3-00.txt, Internet-Draft, Transport Layer Security Working Group, November [3] Dierks T., Allen C., The TLS Protocol, Version 1.0, Request for Comments: 2246, Network Working Group, January [4] Joshua D. Guttman, F. Javier Thayer Fabrega, Authentication tests and the structure of bundles, Theoretical Computer Science, Vol. 283, No. 2, pages , June [5] Joshua D. Guttman, Security protocol design via authentication tests, In Proceedings of the 15th IEEE Computer Security Foundations Workshop, IEEE CS Press, June, [6] OpenSSL Project, version 0.9.8h, available at [7] Hunter Laura, Active Directory User Guide, Springer-Verlag, [8] Killpack Rick, edirectory Field Guide, Springer-Verlag, [9] OpenLDAP, version , [10] Mozilla Corporation, XPCOM, Cross Platform Component Model, [11] Andreas Pashalidis, Chris J. Mitchell, A Taxonomy of Single Sign-On Systems, Volume 2727/2003, Springer Berlin / Heidelberg, 2003 [12] The Kerberos Network Authentication Service, [13] Mozilla Corporation, NSPR, Netscape Portable Runtime, [14] Antonio D souza, Kristina Hildebrand, Gilad Israeli, Conceptual Architecture of Mozilla, September 30, 2004
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
A Taxonomy of Single Sign-On Systems
A Taxonomy of Single Sign-On Systems Andreas Pashalidis and Chris J. Mitchell Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {A.Pashalidis, C.Mitchell}@rhul.ac.uk http://www.isg.rhul.ac.uk
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Kerberos authentication made easy on OpenVMS
Kerberos authentication made easy on OpenVMS Author: Srinivasa Rao Yarlagadda [email protected] Co-Author: Rupesh Shantamurty [email protected] OpenVMS Technical Journal V18 Table of contents
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos
KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
LBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o Presented by: Smitha Sundareswaran Chi Tsong Su Introduction Kerberos: An authentication protocol based on
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Summary of Results. NGINX SSL Performance
NGINX SSL NGINX is commonly used to terminate encrypted SSL and TLS connections on behalf of upstream web and application servers. SSL termination at the edge of an application reduces the load on internal
Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005
Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Security Guide. BES12 Cloud. for BlackBerry
Security Guide BES12 Cloud for BlackBerry Published: 2015-03-31 SWD-20150317085646346 Contents Introduction... 7 About this guide...8 What is BES12 Cloud?... 9 Key features of BES12 Cloud...10 Security
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Solutions for Web Services Security
Solutions for Web Services Security Lessons Learned in a Department of Defense Program Kevin T. Smith McDonald Bradley, Inc. Chief Security Architect, The Virtual Knowledge Base Background Virtual Knowledge
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Two SSO Architectures with a Single Set of Credentials
Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1
BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 Version: 5.0 Service Pack: 3 Security Technical Overview Published: 2012-01-17 SWD-1936256-0117012253-001 Contents 1 Document revision history...
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
Cryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics [email protected] DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Hardware and Software Requirements for Installing California.pro
Hardware and Requirements for Installing California.pro This document lists the hardware and software requirements to install and run California.pro. Workstation with SQL Server Recommended: 64-Bit Windows
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
ACE Management Server Administrator s Manual VMware ACE 2.6
ACE Management Server Administrator s Manual VMware ACE 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE
HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client
File System Encryption in C#
INTEGRATED FILE-LEVEL CRYPTOGRAPHICAL ACCESS CONTROL Abstract Ryan Seifert [email protected] T. Andrew Yang [email protected] Division of Computing and Mathematics University of Houston - Clear Lake,
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Cyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland Two trends are currently changing
Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Security Technical Overview Published: 2014-01-17 SWD-20140117135425071 Contents 1 New in this release...10 2 Overview...
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Kerberos. Guilin Wang. School of Computer Science, University of Birmingham [email protected]
Kerberos Guilin Wang School of Computer Science, University of Birmingham [email protected] 1 Entity Authentication and Key Exchange In the last talk, we discussed key exchange and reviewed some concrete
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Why it s Time to Make the Change Analysis of Current Technologies for Multi-Factor Authentication in Active Directory
GoldKey vs RSA Why it s Time to Make the Change Analysis of Current Technologies for Multi-Factor Authentication in Active Directory WideBand Corporation www.goldkey.com Analysis of Current Technologies
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Sophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
CGHub Client Security Guide Documentation
CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
