How To Encrypt Data With Encryption



Similar documents
Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

An Introduction to Cryptography as Applied to the Smart Grid

Overview. SSL Cryptography Overview CHAPTER 1

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

DRAFT Standard Statement Encryption

Lukasz Pater CMMS Administrator and Developer

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

CRYPTOGRAPHY IN NETWORK SECURITY

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Lecture 9: Application of Cryptography

Secure Network Communications FIPS Non Proprietary Security Policy

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Introduction to Cryptography

Savitribai Phule Pune University

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

IT Networks & Security CERT Luncheon Series: Cryptography

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

SBClient SSL. Ehab AbuShmais

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptography & Digital Signatures

Using etoken for SSL Web Authentication. SSL V3.0 Overview

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Web Security: Encryption & Authentication

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

7! Cryptographic Techniques! A Brief Introduction

SSL Protect your users, start with yourself

CSE/EE 461 Lecture 23

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Release: 1. ICANWK502A Implement secure encryption technologies

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1

, ) I Transport Layer Security

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Installation and usage of SSL certificates: Your guide to getting it right

As enterprises conduct more and more

GT 6.0 GSI C Security: Key Concepts

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y

White Paper. Enhancing Website Security with Algorithm Agility

Is Your SSL Website and Mobile App Really Secure?

Is your data safe out there? -A white Paper on Online Security

Understanding digital certificates

Lecture 6 - Cryptography

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

Security Digital Certificate Manager

Security Digital Certificate Manager

Computer System Management: Hosting Servers, Miscellaneous

Sync Security and Privacy Brief

Computer Networks. Secure Systems

HTTPS is Fast and Hassle-free with CloudFlare

Standards and Products. Computer Security. Kerberos. Kerberos

Digital Certificates Demystified

COMP 3704 Computer Security

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Cornerstones of Security

mod_ssl Cryptographic Techniques

A Guide to Secure

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Chapter 10. Cloud Security Mechanisms

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

The Seven Habits of State-of-the-Art Mobile App Security

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Chapter 10. Network Security

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

WS_FTP Professional 12. Security Guide

Getting the most from Apple Mail

A Standards-based Approach to IP Protection for HDLs

[SMO-SFO-ICO-PE-046-GU-

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Internet Programming. Security

IBM i Version 7.3. Security Digital Certificate Manager IBM

Guide to Data Field Encryption

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Transcription:

USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars

Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security Month presentation for the past six years is going to talk about encryption! Entrust, Inc. All rights reserved. 2

Is Encryption Unbreakable? A cryptographic system is said to be computationally secure if The cost of breaking the encryption is greater than the value of the protected information Or The time required to crack the encryption is longer than the life time of the protected data Entrust, Inc. All rights reserved. 3

Entrust, Inc. All rights reserved. 4

TALKING ABOUT ENCRYPTION

Common Terms Encryption The process of encoding or converting information so that it can only be read after it is decoded (decrypted) Plaintext Ciphertext Plaintext Algorithm Key A step-by-step method for calculating a function. A unique piece of information that is used as one of the inputs of the encryption algorithm Key Length The size (length) of the key expressed in bits Ciphertext = Algorithm(Key)(Plaintext) Entrust, Inc. All rights reserved. 6

Entrust, Inc. All rights reserved. 7

Key Management The process for managing the lifecycle of cryptographic keys Key Generation Key Exchange (distribution) Key Storage Key Usage Key Replacement Public Key Infrastructure (PKI) Commercial Enterprise Key Management Systems Entrust, Inc. All rights reserved. 8

More Encryption Terms Symmetric Key Algorithms DES Data Encryption Standard (also Triple DES ) AES Advanced Encryption Standard Asymmetric Key Algorithms RSA Rivest, Shamir, & Adleman (1977) DSA Digital Signature Algorithm (FIPS) Elliptic Curve Cryptography Hash Algorithms MD5 Message Digest Algorithm SHA-1 Secure Hash Algorithm SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512) SHA-3 Entrust, Inc. All rights reserved. 9

Encryption Quality (Strength) Key length is not the only issue Quality of the key Source? Random number generators aren t perfect Is the key password protected? Password entropy Dictionary attacks Quality of algorithms New is Bad? Anyone who develops a new encryption algorithm is either a genius or a fool Entrust, Inc. All rights reserved. 10

So How Should I Evaluate Encryption Tools? Option A Do your own evaluation? An attacker using a general field number sieve would need to conduct an attack with complexity O(exp(((649+o(1)) n)13(logn)23)) to factor the modulus (and thus break the private key), given a modulus of bit-length n. Option B Trusted Standards & Recommendations NIST Computer Security Division NIST Special Publications (800 Series) IDManagement.gov NASCIO State Identity, Credential, and Access Management Guidance Qualified Security Consultants Entrust, Inc. All rights reserved. 11

Entrust, Inc. All rights reserved. 12

Symmetric vs. Asymmetric Encryption Symmetric Encryption Encryption and decryption operations use the same secret key Computationally faster operation Key distribution can cause scalability issues Asymmetric Encryption Also called Public Key Encryption Each entity is issued a key pair A public key which can be freely shared A private key which is kept secret Information encrypted with one key can only be decrypted with the other key from that pair Mathematically impossible to calculate the value of one key using the value of the other key Entrust, Inc. All rights reserved. 13

Digital Certificate DN: cn=bob Smith, o=illinois, c=us Serial #: 8391037 Start: 01/05/2012 End: 01/05/2014 CRL: cn=crl2, o=illinois, c=us Unique Name of Owner Unique Serial Number Validity Period Revocation Information Public key Name of Issuing CA Issuing CA digitally signs the certificate CA DN: o=illinois, c=us 14Entrust, Inc. All rights reserved.

Public Key Encryption Process Message originator encrypts the data using the recipient s public key Recipient uses own private key to decrypt the data Recipient s Public key Blah Xxxxxxxxx blah blah blah! Blah xxxxxxxxxxxxxxxx blah blah blah! Yada xxxxxxxxxxxx yada yada yada! Yada xxxxxxxxxxxx yada yada yada! Blah xxxxxxxxxxx blah blah blah! Blah xxxxxxxxxxxx blah blah blah! Yada xxxxxxxxxxxx yada yada yada! Yada xxxxxxxxxxxxxxx yada yada yada! Blah xxxxxxxxxxxxxx blah blah blah! Blah xxxxxxxxxxx blah blah blah! Originator Recipient s Private key Xxxxxxxxx Blah blah blah blah! xxxxxxxxxxxxxxxx Blah blah blah blah! xxxxxxxxxxxx Yada yada yada yada! xxxxxxxxxxxx Yada yada yada yada! xxxxxxxxxxx Blah blah blah blah! xxxxxxxxxxxx Blah blah blah blah! xxxxxxxxxxxx Yada yada yada yada! xxxxxxxxxxxxxxx Yada yada yada yada! xxxxxxxxxxxxxx Blah blah blah blah! xxxxxxxxxxx Blah blah blah blah! Recipient 15 Entrust, Inc. All rights reserved.

Encryption vs. Hashing A hashing function maps variable length data to a fixed-length value One-way (cannot determine the plaintext from the hash value) Salt & Pepper and Slow! Entrust, Inc. All rights reserved. 16

Entrust, Inc. All rights reserved. 17

How Digital Signatures Work Signing Verification Calculate hash Calculate a new hash Signed Signed Encrypt hash with private key Decrypt original hash with public key Signed Attach signature = Compare original hash with new hash 18Entrust, Inc. All rights reserved.

Self-Signed Certificates vs. Certification Authority Numerous utilities to create self-signed digital certificates Microsoft Office, Adobe, OpenSSL, others Can be useful for point solutions Scaling problems similar to symmetric encryption No verifiable authentication or issuance policies A Certification Authority should provide: Centralized certificate management Verifiable certificate status Reviewable policies Entrust, Inc. All rights reserved. 19

Public vs. Private Trust Entrust, Inc. All rights reserved. 20

Entrust, Inc. All rights reserved. 21

USING ENCRYPTION TO PROTECT DATA

SSL & TLS Protocols to provide bidirectional authentication, privacy & message integrity over reliable communications protocols (TCP) HTTPS is actually HTTP data exchanged over a previously established SSL or TLS connection (HTTP over SSL over TCP) The application establishes an SSL connection Client (browser) requests a secure page Server (web site) sends digital certificate Client verifies that certificate is trusted Client uses public key to encrypt session (symmetric) key Both Client & Server use session key to exchange data Both Client & Server discard the session key when connection is terminated Entrust, Inc. All rights reserved. 23

Entrust, Inc. All rights reserved. 24

VPN Virtual Private Network A secure network segment that is logically isolated from the network as a whole isolated through encryption rather than through physical or logical switching Generally requires configuration of the device more intrusive than TLS but also more comprehensive security VPN operates at the operating system level. Securely connects the device so individual applications do not need to be security aware. Enable mutual authentication by issuing a certificate to both the VPN device and the client device Entrust, Inc. All rights reserved. 25

Wi-Fi Encryption (and Authentication!) WEP In this case Old is Bad! At home WPA2-PSK (sometimes labeled WPA2 Personal) PSK = Pre-Shared Key For personal use a passphrase of maximum allowed length For more secure uses generate a random character string In the Enterprise WPA-Enterprise enables authentication using a Radius server Other 802.1x authentication methods Entrust, Inc. All rights reserved. 26

Entrust, Inc. All rights reserved. 27

Full Disk Encryption Hard Drives Typically used to encrypt the contents of a laptop hard drive Solution should also encrypt swap files and temp files Security depends on strong user credentials to the device Protects against coincidental breaches of information Smart Phones Also probably not hacker proof But makes it really hard for the guy who finds your phone in a taxi to dial your daughter s phone number or find your mother s home address! Entrust, Inc. All rights reserved. 28

File & Folder Encryption May require a separate application or be installed as a function of the operating system Encryption may use public key (digital certificate) or a passphrase as the encryption key Encrypt sensitive files that will be: Sent to another person by email Transported on portable media (CD s, USB Drives, etc.) Including backup files! Stored in cloud services (Dropbox, Box, Google Drive) Uploaded over an unsecured connection Entrust, Inc. All rights reserved. 29

Protecting Information in Email S/MIME Secure Multipurpose Internet Mail Extensions Encrypts the message body and attachments Designed for end-to-end protection Requires email clients that are S/MIME capable Encrypted File Attachments Message body is sent as plaintext No email client requirements TLS over SMTP Encryption only takes place between SMTP relays Does not prevent the use of S/MIME or encrypted attachments Entrust, Inc. All rights reserved. 30

Not Just For Work! Personal uses for encryption Secure storage on a shared computer Email attachments Cloud storage No-Cost Personal Encryption Solutions TrueCrypt Create an encrypted virtual disk on a drive AxCrypt Encrypt individual files OpenPGP or GnuPG File & folder encryption Email message encryption* Entrust, Inc. All rights reserved. 31

Entrust, Inc. All rights reserved. 32

Entrust, Inc. All rights reserved. 33

Thank You! Brent Crossland Entrust, Inc. State Government Initiatives brent.crossland@entrust.com o: (217) 953-0773 m: (217) 341-7467 Entrust, Inc. All rights reserved. 34