CASQUE SNR Presentation 16 th April 2015



Similar documents
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

Multifactor authentication systems Jiří Sobotka, Radek Doležel

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Secure Mobile Solutions

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Mobile Admin Security

Multi-factor authentication

Using BroadSAFE TM Technology 07/18/05

Advanced Authentication

Why it s Time to Make the Change Analysis of Current Technologies for Multi-Factor Authentication in Active Directory

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

More effective protection for your access control system with end-to-end security

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Enova X-Wall LX Frequently Asked Questions

Secure Data Exchange Solution

Deriving a Trusted Mobile Identity from an Existing Credential

Alliance Key Manager A Solution Brief for Technical Implementers

Security Policy JUNE 1, SalesNOW. Security Policy v v

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Contributions to Web Authentication for Untrusted Computers

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

LogMeIn Hamachi. Getting Started Guide

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Key & Data Storage on Mobile Devices

Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks

1. a. Define the properties of a one-way hash function. (6 marks)

PUF Physical Unclonable Functions

Samsung SDS. Fast IDentity Online

White Paper. The risks of authenticating with digital certificates exposed

Endpoint Security VPN for Windows 32-bit/64-bit

Innovative Secure Boot System (SBS) with a smartcard.

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

RSA Two Factor Authentication

Secure Web Access Solution

Security + Certification (ITSY 1076) Syllabus

Introducing etoken. What is etoken?

ADDING STRONGER AUTHENTICATION for VPN Access Control

Two Factor Authentication. Using mobile for additional IT security

Embedded Java & Secure Element for high security in IoT systems

PrivyLink Cryptographic Key Server *

ManageEngine Password Manager Pro Vs Thycotic Secret Server

Software Token Security & Provisioning: Innovation Galore!

Multi Factor Authentication API

Entrust IdentityGuard

Secure your Privacy. jrsys, Inc. All rights reserved.

Guide to Evaluating Multi-Factor Authentication Solutions

White Paper: Multi-Factor Authentication Platform

Multi-Factor Authentication for first time users

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Voltage's Encrypted

DRAFT Standard Statement Encryption

IBM Crypto Server Management General Information Manual

Securing end-user mobile devices in the enterprise

API-Security Gateway Dirk Krafzig

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com

Xerox DocuShare Security Features. Security White Paper

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Product Overview. For a more detailed overview of the SafeTime system please view our video via our website:

Hard vs. Soft Tokens Making the Right Choice for Security

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Strong Authentication for Secure VPN Access

Longmai Mobile PKI Solution

Evaluation and Implementation of SQRL and U2F as 2 nd Factor Authenticators for CERN Single Sign-On

A Security Survey of Strong Authentication Technologies

Client Server Registration Protocol

Endpoint Security VPN for Mac

Managed Portable Security Devices

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Release Notes. Cloud Attached Storage

ADVANCE AUTHENTICATION TECHNIQUES

VMware Horizon Workspace Security Features WHITE PAPER

Attestation and Authentication Protocols Using the TPM

Secure Your Enterprise with Usher Mobile Identity

SecureDoc Disk Encryption Cryptographic Engine

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Live Guide System Architecture and Security TECHNICAL ARTICLE

Cryptography and Network Security

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

The Convergence of IT Security and Physical Access Control

Enhancing Web Application Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

CryptoNET: Security Management Protocols

Applying Cryptography as a Service to Mobile Applications

Mobile Access Software Blade

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Transcription:

Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change without the need for PKI Complete system does not rely any third party technology One of the 4 inventions has US and EU Patents Published with no prior art quoted by Examiner

What can it do Identity Assurance: enables Mutual, Multi-factor Authentication with handheld Tokens or Contactless Smartcards that can be integrated with Gateways and Web Applications for secure remote access Mutually Authenticated, Secure Communication in Internet of Things (IoT). Secure Messaging: can send short, secret messages over public data network to a specific person Instant Disaster Recovery: integral dynamic backup to remote Server

Why is it better CASQUE SNR provides Mutual, Multifactor Authentication using Contactless, Active Tokens that work on any client- Workstations, Laptops, Tablets, Smartphones Insider Attacks and Token Clones are denied success Secure Communication in IoT preventing Man-in-the-Middle attacks Complete System (Hardware and Software) can be placed in Escrow allowing Customer the full capability to recreate the system if any interruption of support

Who says it is good CASQUE SNR (www.casque.co.uk) product has been certified at source code level by UK s CESG (part of GCHQ) (www.cesg.gov.uk) under the CAPS scheme and can be part of a secret solution The product is NATO approved and DIPCOG preferred CASQUE SNR is in daily use in UK's Ministry of Defence

Mechanics The protocol is Challenge/Response Each challenge is unique (never repeated) with synchronising numbers so no replay attack is possible Examples of Challenge Messages include secret message for display, generate OPT, instruct Token to change its Key Token does not contain complete keys so not a protected item- can be sent by post Standalone Program allows customer to populate Tokens using Customer s own seed material so impossible to have a SecurID or Gemalto penetration attack compromise as Manufacturer and System Integrator not part of the risk

Immunity Key update can be set to occur automatically after each login or after one or more days or at the administrator s whim so clones cannot succeed The keys are generated with Customer imported seed and system dependent nonces so a copy of the Authentication Server cannot reproduce the same generated keys

Provable Security Passive Tokens Biometrics CASQUE SNR Active Tokens Resistant to Insider Attack Recovery from Compromise Passwords

Classic Token Multiple Token Manifestations Self Contained Token with internal, re-chargeable battery (no time expiry) containing EAL5+ secure chip Challenge delivered with 3 flashing blocks either processed by a Browser Helper or animated with WebGL Works where mobiles are banned!

Smartcard Token Javacard 3.0.1: EAL 5+, FIPS 140-2 Level 3 Giesecke & Devrient (G&D) Smart Café Card with NXP Semiconductor chip (DMS Ltd is an accredited developer of G&D) Challenge is processed in the Secure Element in Javacard

Smartcard as Token The Client (Smartphone or Tablet) needs to fully support NFC working and PC/SC commands Note: despite claims not all hardware have such full functionality Most Android Smartphones (e.g. Samsung Galaxy) work, Blackberry 10 should work Most Android Tablets (e.g. Nexus) work Some Windows Tablets (e.g. Lumia) should work

Tablets with no NFC In this case, a NFC dongle is inserted Windows Tablet Browser invokes the CASQUE SNR Player to deal with the received challenge Response from Secure Element in CASQUE SNR Smartcard is stored in Clipboard for the User to paste into Login form

Mobile as a surrogate Token Phone with NFC CASQUE SNR Challenge presented as a QR image, Mobile Phone s camera CASQUE SNR Mobile App converts image to data and sends NFC to CASQUE SNR Smartcard App suppresses all external network communications whilst in progress

Mobile as a surrogate Token kjj8vs7kh513 Response from Secure Element in Javacard sent NFC to CASQUE SNR App in Phone and is displayed on Phone s screen for User to enter into Workstation

Application Examples In 24 x 7 use by UK MOD Client Workstation is made robust with access only to the Gateway address

Lockheed Martin Managed Service Application Examples in operation 2014 Custom Application provided as Managed Service

Application Examples Use of Secret Message Server sends encrypted file containing log of proposed transactions User decrypts with CASQUE SNR Secret message key received via CASQUE SNR Token User examines log and uses revealed confirmed message key to confirm and end session If the Server does not receive confirmed message, key transactions are reversed/flushed and session ends User can requested completed transactions log file again sent encrypted

ACC Application Examples Secure, Mutually Authenticated Comms for the Internet of Things (IoT) In the IoT, the typical topology is not just Server and web client but Server, local Hub and local Satellites. Examples of this tri-party communication include Server, Ground Station and local UAVs and Server, Home Hub and local, intelligent sensor based controllers. There is little degradation expected between the Hub and the local Satellites so efficient, encrypted UDP messages can be used

ACC Application Examples Available for 32 & 64 bit Windows and Linux Handlers for Pitch Simulator The Hand Shake assumes that the Server via its accompanying Authentication Server knows one of the symmetric keys stored in the Satellite. In this method each side encrypts its own generated Random using the nominated symmetric key. Note this guarantees that mutual authentication must have occurred. The combined Random, likewise encrypted, is used as the session key. This means a Man-in-the-Middle attack is not feasible. Once the Server to Hub secure connection is running, the Satellite and Hub can do their own Handshake

Superior Passive Tokens Biometrics CASQUE SNR Active Tokens Resistant to Insider Attack Recovery from Compromise Passwords The CASQUE SNR Smartcard manifestation can displace the current Market Leader (RSA SecurID) : Cheaper, more secure (no Clones, no Insider Attacks, no MitM, no MitB), has wider applications (IoT), easier to install and upgrade (no time expiry on Tokens) and has just began its patent cover (main patents for RSA have long expired).