HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE



Similar documents
High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

Technology Overview - BackupEDGE

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Alliance Key Manager Solution Brief

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

MySQL Security: Best Practices

SSL A discussion of the Secure Socket Layer

Healthcare Compliance Solutions

VERITAS NetBackup 6.0 Encryption

Sync Security and Privacy Brief

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Service Overview CloudCare Online Backup

Solutions for Encrypting Data on Tape: Considerations and Best Practices

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Data Protection: From PKI to Virtualization & Cloud

RFG Secure FTP. Web Interface

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CPSC 467b: Cryptography and Computer Security

SQL Server Encryption Overview. September 2, 2015

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

SecureDoc Disk Encryption Cryptographic Engine

DRAFT Standard Statement Encryption

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Chapter 17. Transport-Level Security

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Guide to Data Field Encryption

BANKING SECURITY and COMPLIANCE

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Gladinet Cloud Backup V3.0 User Guide

Dashlane Security Whitepaper

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

Enterprise Backup Overview Protecting Your Most Important Asset

Supporting FISMA and NIST SP with Secure Managed File Transfer

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Blaze Vault Online Backup. Whitepaper Data Security

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS)

Secure Storage. Lost Laptops

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Web-Based Data Backup Solutions

USER MANUAL. v January

How To Encrypt Data With Encryption

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

Overview. Timeline Cloud Features and Technology

Message Authentication Codes

Local Government Cyber Security:

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Content Teaching Academy at James Madison University

The Security Behind Sticky Password

Using BroadSAFE TM Technology 07/18/05

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

Self-Encrypting Hard Disk Drives in the Data Center

FileCloud Security FAQ

Security in Android apps

Elements of Security

Dell PowerVault DL Backup to Disk Appliance Powered by CommVault. Centralized data management for remote and branch office (Robo) environments

SecureCom Mobile s mission is to help people keep their private communication private.

An Overview of the Secure Shell (SSH)

efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider

Answered Questions regarding techsafe Online Storage Rev Technology Partners

White Paper: Librestream Security Overview

How Drive Encryption Works

Overview. SSL Cryptography Overview CHAPTER 1

Password Manager with 3-Step Authentication System

USER MANUAL. v December

Secure Network Communications FIPS Non Proprietary Security Policy

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Library Recovery Center

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Cryptography as Applied to the Smart Grid

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

A Standards-based Approach to IP Protection for HDLs

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

BCTextEncoder Help File

Technical White Paper BlackBerry Security

Client Server Registration Protocol

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Sharing Secrets Using Encryption Facility

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

Network Security. Modes of Operation. Steven M. Bellovin February 3,

Enova X-Wall LX Frequently Asked Questions

CRYPTOGRAPHY AS A SERVICE

Big Data, Big Security:

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Transcription:

HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client data by providing highly secure, standards based data encryption while maintaining all of the functionality users have come to expect of our products. The importance of standards-based data encryption. Safe and Secure encryption is as much a strategy as it is a technology Commitment to Design Excellence and Client Protection Safe and secure encryption is as much a strategy as it is a technology. Mistakes can compromise both security and data integrity. Before beginning engineering on this product, we considered the following: What kind of encryption key creation and management strategy makes the most sense? How do we make sure that safe, reliable encrypted backups (with verification) can be performed, even if the user chooses not to place the decryption keys on the system itself? How can we be sure that access to one old, discarded archive doesn t provide an easy attack method on newer archives? How do we minimize the effect of encryption on devices which perform hardware compression? How do we minimize the potential performance hit that encryption places on a system? How do we make sure that none of our current features and benefits are compromised, reduced or disabled when encryption is active? Can we be sure that users can change their encryption keys at will without compromising the ability to restore archives created with older keys? Will the resulting product be based on reviewable, open standards or simply security through obscurity, which is not security at all? Will the resulting product be both FIPS (Federal Information Processing Standard) compliant and adhere to government export regulations? Encryption is fully integrated into BackupEDGE, not just bolted on as an afterthought. As a result: No features are disabled when encryption is used. Users have multiple choices of key strategies. Key backup capabilities are designed into the product. Technology Overview BackupEDGE uses a powerful combination of symmetric and asymmetric algorithms to encrypt and decrypt data. It is completely standards-based, and the methodology is published here to assure 1 BackupEDGE Encryption Whitepaper

BackupEDGE encryption is completely standardsbased. Encryption is fully integrated into the product and performed at the file level. No features are compromised or disabled when using encryption. users that standards are being followed and that no back doors or other security holes are in place. Users of encryption should be aware of the potential consequences of lost or stolen keys or pass phrases before utilizing this new technology. Encryption is fully integrated into the product and performed at the file level, providing the following benefits: only data that needs to be protected is encrypted. overall performance stays high as only critical files are subject to CPU intensive encryption. full compatibility with our bit-level verify, file checksum verify, indexing, quick file access and disaster recovery features is maintained. each encrypted file is pre-compressed using the powerful zlib libraries to ensure that no space is lost due to the inability of tape hardware compression implementations to compress encrypted data. Optionally, a user may choose to encrypt an entire archive (except the file headers), although this is not recommended. Archive Protection Methodology For maximum security, each archive is encrypted with its own private, 256 bit AES encryption key using the well documented Rijndael (pronounced Rhine-doll) formula. Separate, randomly generated keys for each backup (called the session keys ) assure that access to multiple archives does not provide a useful method for attacking the encryption. Further, each file is compressed before encryption and a random byte is inserted into each 15 byte block of compressed data, further thwarting attempts to attack the encryption based on the attackers potential knowledge of the pre-encrypted contents of one or more files on the archive. The 256 bit encryption key for each session is created using a cryptographically strong, non-deterministic random number generator. The Secret of the Keys With data so powerfully encrypted using large, randomly generated keys, the natural question is How do we decrypt the data when we need it?! The answer is, we store the session key, which is both the encryption and decryption key, right on the archive. Before you ponder how silly it sounds to put the decryption key on the archive, we should point out that the session key is itself encrypted using powerful RSA 2048 bit public/private key encryption. During product setup, a public and private encryption key pair are generated using the same random number generator previously mentioned. The public key is used to encrypt the session keys, and may be made public knowledge without compromising security. In fact a single public key may be placed on more than one system, which is especially useful in replicated site environments. The private key is used to decrypt files on restore. More properly phrased, the private key is used to decrypt the randomly generated session key from the archive, which in turn is used to decrypt the actual archive files. 2 of 5 BackupEDGE Encryption Whitepaper

BackupEDGE encryption protects archives, not systems. It is a given that any UNIX or Linux user with root access can compromise a system in a variety of ways that don t involve archives, so this product should be viewed as a supplement to good system security. The RSA keys are never placed on a data archive unencrypted. They must be guarded and archived separately by creating a Key Archive. New keys may be generated at any time, and any number of decryption keys may exist at one time. Guarding the Keys BackupEDGE encryption protects archives, not systems. It is a given that any UNIX or Linux user with root access can compromise a system in a variety of ways that don t involve archives, so this product should be viewed as a supplement to good system security. During RSA key generation, one public and two types of private keys are created. Standard Private Keys are protected by UNIX/Linux system privileges. Protected Private Keys are additionally encrypted with a passphrase. After creating and archiving the private keys, the administrator may choose to remove those keys from the system with the following effects during restore: If a Standard Private Key exists for the archive in question, files are decrypted and restored automatically and transparently. If only the Protected Private Key exists, the administrator will be prompted for the pass phrase before the files may be decrypted. If neither private key exists, the user will be prompted to insert the appropriate Key Archive before the files may be decrypted. During disaster recovery, the Key Archive must always be inserted. Things To Consider Developing encryption products requires a deep understanding of how encryption technology works and the many ways in which encryption can fail to protect data when improperly used. Because of the latter, it is important to remember what to look for when considering encryption technologies. Here are a few common mistakes to watch out for: Using only symmetric encryption technology usually means that each backup uses the same encryption key, providing an easier method of attack. - BackupEDGE uses a combination of symmetric and asymmetric encryption. It generates a new (symmetric) session key for each backup randomly, and transparently to the user. The user needs to be concerned only with managing the asymmetric key pair. Using only symmetric encryption also means that the encryption and decryption keys are identical, so the decryption key must be on the system at all times to permit unattended encrypted backups. - BackupEDGE uses asymmetric encryption for key exchange, which means that it separates the encryption key from the decryption key. Only the encryption key must stored on a system to perform an encrypted backup. Further, it is easy to store a copy of a single encryption key on many systems, while keeping the decryption key only on some, or none, of them. This greatly reduces the risk of a compromised decryption key. (Recall that the encryption key can be made public without any loss of security.) 3 of 5 BackupEDGE Encryption Whitepaper

BackupEDGE generates a new (symmetric) session key for each backup randomly, and transparently to the user. Secure key creation is important. Simple manipulation of passphrases to generate a key, such as computing its MD5 hash, provides very little actual security. Users will tend not to use a hard to guess passphrase, making cracking simple regardless of the encryption algorithm used. - BackupEDGE creates all keys with a non-deterministic, cryptographically strong random number generator. (Optionally, the decryption key may be further encrypted by a human-supplied passphrase to protect it from casual observation. However, even if an attacker guesses this passphrase, it isn t useful unless they somehow also get access to the hidden private key itself.) Leaving keys in human-readable form or in insecure locations compromises security. - BackupEDGE decryption keys don t have to be on a system at all to allow encrypted backups. If you do choose to store the decryption keys on a system, then they are always protected by UNIX permissions, optionally hidden by a passphrase. Encryption keys, in contrast, can always be made public. Not having the ability for the archive itself to understand the proper required decryption key, or having restored keys for old keys overwrite newer keys, compromises restore capabilities. - Each archive label includes information about the key needed to restore it, so that BackupEDGE can automatically select the right key. If it needs to prompt for a passphrase, then it can provide a short, user-supplied description of the key and when it was created. Products that simply encapsulate an entire archive with an encryption filter can be dangerous. Potential problems are... 1 Read-error recovery. Single byte errors could render an entire archive unrecoverable. There would be no easy way to sync back up with the encryption stream. 2 Lost Quick File Access / Instant File Access. 3 Long restore times increase dramatically. The entire archive has to be decrypted just to restore a single file. 4 Poor system performance. Backup and verification time windows are greatly expanded. - BackupEDGE integrated encryption encrypts only the data you specify, and avoids all of these problems! 5 Standard, hardware compressing tape drives would suffer from greatly reduced performance and capacity. 6 The archive would actually be less secure! Because much of the data in backup archives is repetitive, dictionary-based attacks are possible even with access only to a single archive. Access to two or more encrypted archives could further enhance the feasibility of this attack. - BackupEDGE first compresses data, then inserts random bytes, before encrypting it. Every backup has a new symmetric key that is created by a cryptographically strong random number generator. These features enhance archive security while shrinking the space needed to perform a backup. 4 of 5 BackupEDGE Encryption Whitepaper

Simply encapsulating an entire archive with an encryption filter can be disastrous. BackupEDGE encryption is fully integrated at the file level. As you examine other technologies, remember that if any one of these bullet items has been ignored, then your data is potentially at risk. If more than one of the deficiencies outlined above exists, the entire encryption strategy should be considered ill-conceived and discarded. Network Backups Network backups using FTP are enabled in BackupEDGE 02.01.00 and later. With network backups, the user can choose to: encrypt entire archives or parts of archives. encrypt the transmission using FTPS. encrypt both the transmission and the archive contents. FTPS transport encryption does not require the encryption license. Cloud Backups Internet backups to the Amazon Simple Storage Service (S3) are enabled in BackupEDGE 02.03.00 and later. With S3 backups, the user can choose to encrypt archives or parts of archives. The S3 transport protocol is HTTPS. Transmission is encrypted regardless of whether the archive data is encrypted. Summary BackupEDGE fully integrates a robust combination of multiple encryption methods, data compression, and improved verification to assure maximum archive security while preserving storage space and performance. Peer review of the encryption methods used ensures that they are robust, complete and secure. Scheduled nightly backups may now have their critical data completely secured (encrypted, backed up, bit-level verified) with no operator intervention. The operator assigned the task of rotating media does not even need login access. Encryption has been an available option in BackupEDGE since 2003. It is enabled during the 60 day evaluation period of all demo/evaluation copies of BackupEDGE. There is no sense spending thousands to protect your systems and your networks from intrusion, only to have someone walk off with an easily concealed tape, CD, DVD, REV, etc. containing all of your confidential data. Secure them safely with confidence and no compromises using BackupEDGE with the Encryption Supplement. 5 of 5 BackupEDGE Encryption Whitepaper