End-to-End Enterprise Encryption:



Similar documents
Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user.

A guide for creating a more secure, efficient managed file transfer methodology

Contingency Access to Enterprise Encrypted Data

Spotlight on Mainframe Security: Privacy in the Data Center

Spotlight on Mainframe Security: Data Authenticity and Endpoint Security

Protecting Data-at-Rest with SecureZIP for DLP

SecureZIP User Guide

Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance

Alliance Key Manager Solution Brief

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Alliance AES Encryption for IBM i Solution Brief

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows

Tools for Managing Big Data Analytics on z/os

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

PKWARE Inc. 648 N. Plankinton Ave. Suite # 220 Milwaukee, WI USA. Main Phone: Fax:

Sharing Secrets Using Encryption Facility

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

MySQL Security: Best Practices

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Smartcrypt Encryption Key Management

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Using etoken for SSL Web Authentication. SSL V3.0 Overview

IT Networks & Security CERT Luncheon Series: Cryptography

Guide to Data Field Encryption

tips A quick and easy guide to securing your private information

Secure Network Communications FIPS Non Proprietary Security Policy

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

PKZIP 6.0. Command Line for Windows Getting Started Manual

Data-centric Security: Encryption Essentials for Modern, Efficient Protection

An Introduction to Cryptography as Applied to the Smart Grid

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

DRAFT Standard Statement Encryption

E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA

Password-based encryption in ZIP files

Chapter 6 Electronic Mail Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Blaze Vault Online Backup. Whitepaper Data Security

How To Encrypt Data With Encryption

A Standards-based Approach to IP Protection for HDLs

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

WebSphere DataPower Release FIPS and NIST SP a support.

SecureDoc Disk Encryption Cryptographic Engine

Savitribai Phule Pune University

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Cryptography and Network Security Chapter 15

White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards

Using BroadSAFE TM Technology 07/18/05

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Overview. SSL Cryptography Overview CHAPTER 1

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Odyssey Access Client FIPS Edition

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Cryptography & Digital Signatures

RSA BSAFE. Security tools for C/C++ developers. Solution Brief

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Configuring and Tuning SSH/SFTP on z/os

Pulse Secure, LLC. January 9, 2015

McAfee Firewall Enterprise 8.2.1

Elements of Security

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Chapter 10. Network Security

Cryptography and Network Security

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

WiMAX Public Key Infrastructure (PKI) Users Overview

IBM Crypto Server Management General Information Manual

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

PROCEDURE FOR UPDATING LISTS THROUGH WEB INTERFACE

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

BBM Protected Secure mobile

SafeNet DataSecure vs. Native Oracle Encryption

PGP - Pretty Good Privacy

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

1.2 Using the GPG Gen key Command

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

CRYPTOGRAPHY IN NETWORK SECURITY

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Data Protection: From PKI to Virtualization & Cloud

Secure web transactions system

Securing Data at Rest ViSolve IT Security Team

Exam Papers Encryption Project PGP Universal Server Trial Progress Report

Security Policy for Oracle Advanced Security Option Cryptographic Module

Network Security Essentials Chapter 7

Computer System Management: Hosting Servers, Miscellaneous

PGP from: Cryptography and Network Security

Cryptography and Security

Transcription:

End-to-End Enterprise Encryption: A Look at SecureZIP Technology T E C H N I C A L W H I T E P A P E R WP 700.xxxx

Table of Contents SecureZIP Executive Summary SecureZIP: The Next Generation of ZIP PKZIP: The Foundation SecureZIP Implementation of ZIP Encryption Hybrid Cryptosystem Crytopgraphic Calculation Sources Digital Signing In Step with the Data Protection Market s Needs Conclusion 3 4 4 5 6 7 7 7 8 2

End-to-End Enterprise Encryption: A Look at SecureZIP Technology Every day sensitive data is exchanged within your organization, both internally and with external partners. Personal health & insurance data of your employees is shared between your HR department and outside insurance carriers. Customer PII (Personally Identifiable Inmation) is transferred from your corporate headquarters to various offices around the world. Payment transaction data flows between your store locations and your payments processor. All of these instances involve sensitive data and regulated inmation that must be exchanged between systems, locations, and partners; a breach of any of them could lead to irreparable damage to your reputation and revenue. Organizations today must adopt a means mitigating the internal and external risks of data breach and compromise. The required solution must support the exchange of data across operating systems to account both the diversity of your own infrastructure and the unknown infrastructures of your customers, partners, and vendors. Moreover, that solution must integrate naturally into your existing workflows to keep operational cost and impact to minimum while still protecting data end-to-end. SecureZIP, from PKWARE, is that solution. 3

SecureZIP: The Next Generation of ZIP PKWARE, Inc., is the creator and continuing innovator of the ZIP standard. For over 20 years, PKWARE has continued to build on the ubiquitous.zip mat. Today, PKWARE addresses the critical need to provide strong data security its customers by adding encryption and signing using NIST 1 -approved algorithms. The result is SecureZIP The Next Generation of ZIP. SecureZIP provides all of the features and capabilities of its predecessor, PKZIP, including efficient data compression, sophisticated file management, and cross-platm capability. SecureZIP allows organizations to address both the continuing need efficient data file management, while adding strong data security. Building on the foundation of ZIP, SecureZIP adds enterprise-class security in a single interoperable solution, across all the major enterprise operating systems: IBM z/os and IBM i ; open systems servers including AIX, HP-UX, Solaris, and Linux ; plus Windows server and client. SecureZIP ensures that inmation is protected throughout your organization, in motion as it is exchanged, or at rest in electronic or physical storage it applies protection directly to the data, not to the network transport or application. Whether you choose to encrypt with passphrases, use a certificate signing and authentication, or both, this data-centric solution provides the flexibility to secure your data using the world-renowned.zip mat. SecureZIP also provides an efficient, easy-touse method to implement data security and file management, whether you are using it on a single desktop or in the world s largest data centers. And since it works on every major enterprise computing platm, it minimizes the cost of managing multiple security products and vendors. Traditional ZIP: The Foundation SecureZIP Phil Katz, the PK of PKZIP, created the.zip mat in the late 1980s as a means to archive files; he included compression to make the process more efficient. Katz s.zip mat became the foundation of all traditional.zip applications. He specifically developed the mat to be extensible in order to maintain inclusion of new compression algorithms, carry metadata necessary to efficiently and effectively extract data, and generally improve upon other technologies. Katz specification states that files are compressed individually, ordered into the archive mat with local header inmation including elements such as a file comment, file name, size, date, etc. Each file is also marked with a four byte signature. Complementarily, the metadata each file is listed in a central directory record holding the file sequence and other metadata, along with a corresponding four byte signature. PKWARE also included encryption support early in the evolution of the product, though the traditional PKZIP 96-bit encryption would not be considered sufficient by contemporary standards. Local File 1 Decryption File 1 Compressed/ Encrypted Data File 1 Local File 2 Decryption File 2 Compressed/ Encrypted Data File 2... Local File n Decryption File n Compressed/ Encrypted Data File n Central Directory File 1 Central Directory File 2... Central Directory File n Central End Figure 1: Conceptual View of the ZIP Format Seeing the value of a standardized mat file exchange, Katz made the ZIP technology available to others, publishing the mat via the APPNOTE 2. Consequently, the use of ZIP is ubiquitous and has become one of the most familiar technologies in use today. PKWARE continues to support and publish 1 National Institute of Science & Technology 4

the APPNOTE ZIP mat specification, collaborating with other vendors to promote and evolve the standard to meet evolving market needs. When Katz developed ZIP, he also established PKWARE to develop applications DOS and UNIX that used the specification. Shortly thereafter, PKWARE enhanced the ZIP mat in a number of ways, including expanding its metadata management capabilities better support of the data definition and space management controls required on those platms. In 2001, PKWARE began working with the ZIP community to expand the specification to include strong encryption data privacy, as well as digital signing and authentication data integrity validation. PKWARE developed products supporting these new structures under the brand SecureZIP, available the IBM mainframe operating system z/os, mid-range operating system i5/os, UNIX in the AIX, Solaris, and HP-UX varieties, Linux (kernel 2.4 and ward, certified the RedHat and SuSE distributions), and Microsoft Windows server and desktop. The updated operating system range is significant, representing all major enterprise computing platms. Both PKZIP and SecureZIP rigorously capture and store the significant metadata required to restore the data and its internal relationships. This facility is particularly useful the large platm use cases, as PKWARE products automatically allocate appropriate disk space, provide the relevant data control block (DCB) inmation (e.g., record mat [RECFM], logical record length [LRECL], block size [BLKSIZE]) needed to extract the data to large platm storage. Moreover, PKWARE ensures interoperability between all combinations of the supported operating systems, all relevant archiving, compression, encryption, and signing/authentication functions. For example, organizations can use SecureZIP on the mainframe data that will be distributed to and used on Windows clients. It automatically transms from EBCDIC to ASCII character encoding when going from large to small platm (and vice versa), and places or removes line feed & carriage return characters when the data moves between UNIX and Windows. Implementation of ZIP Encryption Recognizing the value that a multi-file archive has data protection, PKWARE developed SecureZIP, adding strong encryption support to the existing data compression and file management capabilities. SecureZIP complements the rigorous data-in-use physical and logical perimeter defenses that already exist in the enterprise. It also addresses data-at-rest and data-in-transit use cases with highly durable, yet still flexible data protection. SecureZIP applies data-centric encryption, protecting the data itself rather than protecting the transmission of the data (transport security) or access to the data through an application (access control), or the facilities that host the data (resource control). An organization s data loss risks are greatly reduced when SecureZIP is used to augment existing perimeter security and access control systems. Encryption has emerged as a central way to secure data and protect privacy, but not all encryption is the same. Organizations must make decisions about where and how to apply encryption in order to maximize the benefits their specific organization. The first choice is between using symmetric key encryption (i.e., passwords) or asymmetric encryption. Symmetric encryption relies solely on a single shared secret or key, typically a password. The symmetric approach tends to provide fast encryption, but sharing a single key is risky and secure key exchange is difficult. Unless such passwords are carefully managed, they can be compromised (e.g., an act as simple as finding the password hidden under a mouse pad). Likewise, unless passwords are very long and complex (theree difficult to remember and use), they can be subject to compromise from simple brute ce 2 For the technical specification document, please see http://www.pkware.com/documents/casestudies/appnote.txt; links to subscribe to the service publishing notifications when changes to the mat are released, please see http://www.pkware.com/support/zip-application-note 5

attacks (automated repetitive attempts of all possible combinations) or dictionary attacks (similar to brute ce attacks, using word combinations). Asymmetric encryption uses a digital certificate with an associated key pair a public and a private key that have a unique relationship based on factoring the product of two large prime numbers. Data that is encrypted with one can only be decrypted using the other, and the complexity of the mathematical relationship is such that the eft required to reverse-engineer one from the other makes it effectively impossible. The asymmetric approach is considered more secure but is more computationally-intensive, which presents permance issues when processing large amounts of data. Both symmetric and asymmetric encryption approaches have drawbacks. Hybrid Cryptosystem The hybrid crypto solution offers a blend of the two different encryption approaches, gaining the best attributes of each without the disadvantages. A hybrid cryptosystem automatically generates a random and complex symmetric session key to encrypt the target data, creating an encrypted payload. Hybrid systems then use the asymmetric public key of the X.509 key pair to encrypt the symmetric key (see Figure 1). It applies the computationally-intensive asymmetric encryption to only the small symmetric key which is used to encrypt the larger source data payload. As a consequence, it consumes fewer resources while providing fast, effective encryption. SecureZIP is implemented as a hybrid cryptosystem. Cryptographic Calculation Sources The value of an encryption application like SecureZIP is directly related to the quality of the 6

cryptographic algorithms it uses. Since SecureZIP is used in a variety of circumstances, it supports a variety of cryptographic algorithm sources to complement those needs. While the application continues to support a number of weak encryption algorithms (i.e., the original PKWARE traditional 96-bit encryption, DES, and RC4), most contemporary uses of the product focus on either the strong encryption available with 3DES and, particularly, the AES algorithm at various bit strengths. Regardless of the supported operating system, SecureZIP offers a FIPS 3 197-compliant Advanced Encryption Standard (AES) algorithm implementation. Consistent implementation of the AES algorithm across the several supported operating systems was initially implemented by integrating the RSA BSAFE cryptographic libraries, Crypto-C and Cert-C. PKWARE continues to reinvest in the SecureZIP product as market needs additional levels of data protection to meet internal and external obligations increase. For example, on most supported operating systems, SecureZIP goes further to support FIPS 140-validated encryption sources. FIPS- 140 is the best practice describing the security requirements cryptographic modules, detailing the standard of care with which the implementation of the AES algorithm and the handling of keys must be permed. While the FIPS 140-validated cryptographic libraries used vary by operating system 4, PKWARE invests the resources to ensure that interoperability across the many supported operating systems is maintained. Equally important, the product offers the ability to lock-down or default configuration so that the FIPS 140-mode must be used a distinct advantage compared to other offerings in this market. SecureZIP also leverages IBM s Integrated Cryptographic Services Facility (ICSF), on the z/os operating system, in part so customers can use the FIPS 140-validated hardware available on that platm. When encrypting on a mainframe equipped with a suitable add-on card cryptography (PCIXCC or CEX2C), SecureZIP can be configured to automatically use that FIPS 140-validated encryption source and only that encryption source. Alternatively, the product can be configured to use IBM s Central Processor Assist Cryptographic Function (CPACF) cryptographic calculation, and significantly reduce the amount of resources required to AES encrypt data. Digital Signing PKWARE s authentication implementation follows the traditional models digital signing, wherein the full body of data is first passed through a hash function to derive a fixed length output. The output is then encrypted using the signer s private key and this encrypted hash then becomes the digital signature. The digital signature and a copy of the signer certificate are attached to the data. Authentication is permed by using the signer s public key to decrypt the signed hash and then comparing that hash to an independently derived hash using the same input data and hash function. SecureZIP can attach one or many signatures to each file in a ZIP archive and one signature to the archive as a whole. It supports contemporary hash functions including MD5, SHA-1, and SHA-2 in a variety of bit strengths. While no longer considered sufficiently strong, MD5 remains available within SecureZIP to ensure compatibility with older archives and other ZIP-compatible applications. In Step with the Market s Data Protection Needs End-to-end encryption requires stringent attention to implementation and workflow issues. Many regulations, such as Payment Card Industry Data Security Standard (PCI DSS) call encryption as a means to protect sensitive data. However, as the Heartland Payment Systems data breach in 2009 5 illustrated, encryption needs to be applied to the data wherever it goes, however it get there, to ensure 3 Federal Inmation Processing Standards are models of best practice published by NIST. Federal guidelines require agencies to follow many of the FIPS practices, and many non-governmental organizations also subscribe to them as recognized best practices. 4 Please contact your PKWARE representative to obtain a copy PKWARE s letter of attestation describing the FIPS 140 implementations. 7

unanticipated exposure is not left unaddressed. Consequently, SecureZIP z/os and SecureZIP Server UNIX/Linux/Windows have been engineered to support genuinely seamless end-to-end encryption. Data can be protected immediately as it is extracted from a data source. Application Integration (see Figure 2) ensures that data is encrypted bee it is staged to disk, recordby-record (mainframe) or as a stream (server), anticipating the emerging best practices anticipated to be part of the Payment Card Industry (PCI) Data Security Standard (DSS) v1.3, expected to be announced in the latter part of 2009. End-to-end encryption data privacy is seen as a natural extension the need to protect data-in-motion and data-at-rest. By ensuring protection is applied the moment the target data shifts from being data-in-use to data-in-motion, an organization significantly reduces their attack surface and their associated risk. Gartner analyst, Avivah Litan, recently said, I think the payments industry needs to take some long-needed security steps including end-to-end encryption so that even if data is stolen, it s useless 6 Figure 2: SecureZIP Application Integration Conclusion PKWARE continues today to build upon the ZIP technology first introduced over 20 years ago. PKZIP technology was applied first to efficient data management by combining the multi-file, cross-operating system archive mat with data compression. Market needs have evolved and PKWARE continues to help its customers meet critical business requirements with SecureZIP, providing the same data compression and file management capabilities coupled with strong data protection and authentication. 5 Credit-Card security standard issued after much debate Computerworld IDG news online. The Payment Card Industry Security Standards Council issued revised security rules, while also indicating next year it will focus on new guidelines end-to-end encryption, payment machines and virtualization. 6 Downloaded March 9, 2009, from http://news.idg.no/cw/art.cfm?id=ba7b7f65-17a4-0f78-31e98fbd41716840. United States 648 N. Plankinton Ave. Suite220 Milwaukee, WI 53203 1.888.4.PKWARE www.pkware.com UK/EMEA Crown House 72 Hammersmith Road London W14 8TH United Kingdom ph: +44 (0) 207 470 2420 2009 PKWARE, Inc. All rights reserved. PKWARE, PKZIP, SecureZIP, and SecureZIP Mail Gateway are trademarks or registered trademarks in the U.S.A. and other countries. Any other trademarks are used identification purposes only and remain the property of their respective owners. 8