SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY

Similar documents
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

Technical Specification MEF 6.1. Ethernet Services Definitions - Phase 2. April, 2008

Enterprise Business Products 2014

Metro Ethernet Forum Layer 2 Control Protocol handling

Applying Cryptography as a Service to Mobile Applications

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

High Speed Ethernet WAN: Is encryption compromising your network?

SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL

Carrier Ethernet 2.0: A Chipmaker s Perspective

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

How To Secure My Data

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

ethernet services for multi-site connectivity security, performance, ip transparency

High speed Ethernet WAN: Is encryption compromising your network?

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

Overview. SSL Cryptography Overview CHAPTER 1

THE DATA PROTECTION COMPANY HIGH EFFICIENCY SWITCHABLE CERTIFIED ENCRYPTION UP TO 10 GBPS CN6000 SERIES

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Wireless security. Any station within range of the RF receives data Two security mechanism

DPoE Support of Carrier Ethernet Services

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Carrier Ethernet for Delivery of Private Cloud Services

The Role of Carrier Ethernet in Business Applications

Savitribai Phule Pune University

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

An Introduction to Cryptography as Applied to the Smart Grid

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

High Speed Encryption Made in Germany

Security Policy Revision Date: 23 April 2009

Introduction to Security and PIX Firewall

MEF Carrier Ethernet Certified Professional Training Program

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

Group Encryption. The key to protecting data in motion BLACK BOX blackbox.com

Driving Ethernet Deeper Ethernet Business Services over DOCSIS COX New Orleans (NOLA) Case Study

Cornerstones of Security

As enterprises conduct more and more

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

Cryptography and Key Management Basics

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

VPN Technologies: Definitions and Requirements

SecureAge SecureDs Data Breach Prevention Solution

Switching in an Enterprise Network

Metro Ethernet Services

TrustNet Group Encryption

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

Cryptography and Network Security Chapter 14

ViPNet EDI. drive your collaboration secure

SSL A discussion of the Secure Socket Layer

Key Management and Distribution

White Paper. Enhancing Website Security with Algorithm Agility

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Case Study for Layer 3 Authentication and Encryption

Key & Data Storage on Mobile Devices

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Chapter 6 CDMA/802.11i

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

2014 IBM Corporation

What is VLAN Routing?

Exhibit n.2: The layers of a hierarchical network

WIRELESS LAN SECURITY FUNDAMENTALS

Guidebook to MEF Certification

Recommended Wireless Local Area Network Architecture

Network Authentication X Secure the Edge of the Network - Technical White Paper

Technical papers Virtual private networks

SureDrop Secure collaboration. Without compromise.

INFRASTRUCTURE CONTROL SYSTEMS ENCRYPTION

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Guidelines on use of encryption to protect person identifiable and sensitive information

Client Server Registration Protocol

How To Encrypt Data With Encryption

Mobile Office Security Requirements for the Mobile Office

Using etoken for SSL Web Authentication. SSL V3.0 Overview

SecureCom Mobile s mission is to help people keep their private communication private.

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

CRYPTOGRAPHY AS A SERVICE

Cisco Trust Anchor Technologies

ETSI TS V1.2.1 ( )

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Secure Network Communications FIPS Non Proprietary Security Policy

An Overview of ZigBee Networks

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

High Performance VPN Solutions Over Satellite Networks

How to Drop your Anchor

Group Encrypted Transport VPN

EXAM questions for the course TTM Information Security May Part 1

AT&T Switched Ethernet Service SM

Transcription:

SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY WHO SHOULD READ THIS DOCUMENT System Integrators, Cloud and Data Centre Service Providers, Layer 2 Data Networks Managers, Network Architects, Network Engineers, Data Security Managers and Staff, Chief Information Officers, Chief Information Security Officers, Data Security and Network Procurement Staff. KEYWORDS, High Assurance Encryption, Layer 2 Data Networks, Robust Encryption, Networks, High-Speed Data Networks, Network Data Security, Encryption Security, Network Encryption, Certified Encryption, Encryption Authentication, Encryption Hardware, Data Plane Information, MAC Header, SecTag, Secure Keys, Entropy, Certificate Authority, Public Key Algorithms, Pairwise Key System, Group Key System, Multicast Encryption.

is a crucial component of any robust encryption security solution for today s high-speed networks. WHEN IT COMES TO NETWORK ENCRYPTION SECURITY, THERE ARE TWO BASIC GRADES - HIGH ASSURANCE AND LOW ASSURANCE. High Assurance solutions are those typically demanded by government agencies and corporations transmitting sensitive or confidential data. The level of data sensitivity usually mandates that any solution is required to have certified encryption components. High Assurance solutions are commonly known as robust encryption. To be truly robust or high assurance, an encryption security product requires four key components: > Certification as being suitable for government and defence use by a recognised authority (EG. Common Criteria, FIPS, NATO or CESG) > Standards-based encryption algorithm (EG. AES 256). > Client-side encryption key management, where encrypted keys and encryption authentication is only accessible by the client. > End-to-end encryption, where there is no point in the network where un-encrypted data is accessible. WHAT IS ROBUST ENCRYPTION? There are numerous encryption solutions available today; both hardware and software-based. Some are designed specifically to protect static data at rest. Others are designed to protect data in motion as it travels across local and wide area networks. Robust encryption solutions have been available for a number of decades and governments around the world have been their largest single beneficiary. In fact, it was governments demand for robust encryption that triggered many vendors to invest in developing encryption technology in the first place. An essential component of socalled unbreakable encryption is that the encryption keys themselves should not be accessible to anyone but the owners of the encrypted data. If the encrypted encryption keys are securely stored client-side, no matter what type of breach occurs, unauthorised parties can only access the data in its encrypted form. True to the saying: Never leave the keys under the mat, the same advice applies to data encryption. When encryption keys are exposed to access by unauthorised parties, the solution is greatly weakened. It is no longer a robust security solution. Because the robust encryption solution is also providing true endto-end encryption security, there is no weak point. Even if a router or switch (as is frequently the case) is found to have weak-points or vulnerabilities to attacks, the data passing through those vulnerable devices is always encrypted. This paper deals with one of the core components of high assurance encryption:.

1. INTRODUCTION An encrypted high-speed data network s robustness is in a large part determined by the type of encryption key management. Ensuring that the transmitted data s encryption keys are not accessible to an unauthorised party is essential to ensuring that a network breach will only result in meaningless data in the hands of an unauthorised party. This paper details the state-of-the-art key management system used by high assurance dedicated encryptors. 2. ENCRYPTION The encryption and decryption of a frame uses different elements. Some of them are local on the encryptor and the other ones are carried along in the frame header of the encrypted frame. The combination of the two is needed to encrypt and decrypt a frame. The information carried in the header is also used for key assignment. Data Plane Information (Frame Header) Control Plane Information (local) Destination address Sender address VLAN-ID Ethertype Subtype Counter 2 bytes 1 byte 5 bytes An encrypted frame during transit has a SecTag and the ICV added while the payload is encrypted. Encryption depends on key management to the local information needed to encrypt and decrypt frames. uses a hybrid approach and combines the advantages of asymmetrical and symmetrical cryptography.

3. KEYS 3.1. SECURE KEYS Secure encryption depends on key security in all phases: > A safe key requires entropy (randomness). Whilst both hardware and software can be used to create random numbers, true randomness comes from a hardware source. > The encryption keys are in plain text while encrypting and decrypting and are dependent on a safe encryption environment. encryptors feature a tamper-proof enclosure. Any tampering inevitably leads to the zeroization of all data in memory, including the keys in use. > Keys need to be secure while being transported between encryptors. Keys are always encrypted while in transit. 3.2. KEY BUILD-UP Each encryptor has its own certificate, issued by the Certificate Authority (CA). The certificate is, initially, secret. Its public key is used as a digital signature, so the recipient can verify the sender. The key exchange uses the certificate to sign the keys (or partial keys) that are exchanged, ensuring that they are coming from the correct remote device. The partial keys are generated completely inside the encryptor, without any user having access to it. After exchanging the partial keys, both sides calculate the same shared secret. Subsequently, the encryptor internally generates the master key and encrypts it with the shared secret. The encryptor also generates the session key and uses the master key to encrypt it. The transmission of the master and session keys from one encryptor to the other is always encrypted. supports the two leading public key algorithms, RSA and ECC (elliptic curve cryptography), for the exchange of the master keys (key encryption keys). In case of ECC, ECDSA (elliptic curve digital signature algorithm) and ECKAS-DH (elliptic curve key agreement scheme) are used. The key build-up if RSA is used: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement RSA Signature Key Protocol Device Authentication RSA Certificate

The build-up of group keys adds an additional authentication per group: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement RSA Signature Key Protocol Group Membership Authentication RSA Certificate Signature Key Protocol Device Authentication RSA Certificate The key build-up if ECC (elliptic curve cryptography) is used: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement ECKAS-DH Signature Key Protocol Device Authentication ECDSA Certificate For each group keys there is also an additional level of authentication: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement ECKAS-DH Signature Key Protocol Group Membership Authentication ECDSA Certificate Signature Key Protocol Device Authentication ECDSA Certificate

3.3. KEY SYSTEMS offers users a choice of two key systems; pairwise key system or group key system (or a combination of both) in order to accommodate different topologies and usage scenarios. Metro and Carrier comes in three different topologies: point-to-point, point-to-multipoint and multipoint-to-multipoint. Each of these topologies comes in two variants: a port-based one and a VLAN-based one. Carrier E- Line (Point-to-Point) E- Tree (Point-to-Multipoint) E-LAN (Multipoint -to-multipoint) Private Line (EPL) Virtual Private Line (EVPL) Private Tree (EP-Tree) Virtual Tree Line (EVP-Tree) Private LAN (EP-LAN) Virtual LAN Line (EVP-LAN) ENNI ( Network-to-Network Interface) E- Access (Point-to-Point) Access Private Line (EPL) Access Virtual Private Line (EPL) Private: Port-based, one EVC per UNI Virtual: VLAN-based, multiple EVCs per UNI PAIRWISE KEY SYSTEM Pairwise Key Systems are designed for point-to-point connections and treat point-to-multipoint and multipoint networks as an accumulation of point-to-point connections.

POINT-TO-POINT (E-LINE) For a pairwise key system, point-to-point connections consist of a link whose end-points are defined by the two encryptors A and B. For the encryption of the data flowing from A to B the encryptor uses key AB. In the opposite direction, from B to A, the encryptor uses key BA. AB BA POINT-TO-MULTIPOINT (E-TREE) A pairwise key system is also well-suited for a point-to-multipoint topology if the network is set up as an accumulation of separate point-to-point links in a hub and spoke configuration. Spoke/Leaf B Spoke/Leaf C Spoke/Leaf D Hub/Root A AB/BA AC/CA AD/DA Spoke/Leaf E AE/EA AG/GA AF/FA Spoke/Leaf G Spoke/Leaf F key management supports the combination of a pairwise key system with a group key system, so multicast frames can be encrypted with a group key when using a point-to-multipoint topology. For unicast frame encryption, pairwise keys are used; while multicast frames are encrypted using the group key system. A multicast group can comprise all spokes: Key MG1

Or a multicast group can comprise only a subset of spokes: Multicast Group 2 Multicast Group 2 Multicast Group 2 Key MG2 Each multicast group has its own key and up to 256 individual multicast groups are supported. Broadcast frames are treated as a special case of multicast and are all encrypted using the same broadcast key. MULTIPOINT-TO-MULTIPOINT (E-LAN) Pairwise key systems also treat multipoint-to-multipoint topologies the same way they treat point-to-point connections. In this scenario, key management supports the combination of pairwise key system with a distributed group key system. This allows multicast frames to be encrypted with a group key when using a point-to-multipoint topology. For unicast frame encryption, pairwise keys are used; while multicast frames are encrypted using the group key system. As multicast groups can originate at different sites, the encryptor at such sites must be able to act as group key server for the multicast groups originating there. For unicast frame encryption each encryptor has a table with the local and remote MAC addresses. Security associations are created automatically. The MAC addresses are automatically learned and assigned to the security associations using a proprietary auto-discovery protocol. Multicast groups can either be discovered in discovery mode and be added automatically, or they can be added manually. The key servers work independently of each other and thus offer redundancy. Each multicast group has a senior member that is responsible for the key generation, the key exchange and the key updates. If this senior member drops out, the next member of the multicast group is promoted to senior member and takes over. The group key system ensures that the right keys are available at the right time to the group members. The group key server for that group generates the keys for that group, using a hardware-based true random number generator for the seed.

A multicast group can comprise all sites: key Server Multicast Group 1 Key MG1 Or it can comprise only a subset of the sites. key Server Key MG 2 Multicast Group 2 Multicast 2 Each multicast group has its own key and up to 256 individual multicast groups are supported. Broadcast frames are treated as a special case of multicast and are all encrypted using the same broadcast key. GROUP KEY SYSTEM Group keys are based on the principle that for the communication within a defined group the same key is used to encrypt the communication. The membership in one group does not exclude a member from concurrent membership in other groups. For the communication within different groups different keys are used. Keys are unique to a group and separate the groups cryptographically. A group consists of two or more members. For VLAN-based Carrier networks, group assignment is based on the VLAN tag. A group can consist of one or multiple VLANs. Each group uses an additional authentication step with each group member having an additional certificate per group. The maximum number of certificates per encryptor is 64. The cryptographic separation of groups combined with support for distributed key servers creates the foundation for a multi-tenancy in which all tenants belong to the same PKI. Group keys work for all three basic topologies.

POINT-TO-POINT (E-LINE) One encryptor is the group key server and generates and distributes the group key to the other group member. VLAN 110/Group 1 POINT-TO-MULTIPOINT (E-TREE) In point-to-multipoint scenarios there are two different approaches: The network members can be treated as single group. Group 1 Group 1 Group 1 Group Key 1 Group 1 Group 1 Group 1 Multiple groups with different memberships can be layered on top of each other: Group 2 Group Key 2 Group 2 Group 2

Each hub-spoke relationship can be treated as an individual group, with the spoke being the group key server: VLAN 101 VLAN 102 VLAN 103 VLAN 106 VLAN 105 VLAN 104 Or, a mix of VLANs with single or multiple members: Backup VLAN 101 VLAN 101 VLAN 103 VLAN 106 VLAN 103 VLAN 103 MULTIPOINT-TO-MULTIPOINT In multipoint-to-multipoint topologies, a group key system allows the layering of different groups. (eg. the individual mambers of a VLAN). If that VLAN covers all sties, then all sites are members of this group (unless specifically excluded).

Backup 2 Backup 1 Group 2 Backup 2 Backup 1

COUNTER IN GROUP KEY SYSTEMS Using authenticated encryption, a group shares both the key and the counter. Each group member uses a different counter offset that is transported together with the counter reading in the SecTag of each encrypted frame. VLAN 1D 110 The assignment in terms of counter reading looks as follows: Offset 1 Offset 2 Offset 3 Offset 7 Offset 4 VLAN 1D 110 Offset 6 Offset 5

GLOBAL SUPPORT AND DISTRIBUTION CN series encryptors are supported and distributed globally by Gemalto N.V. under its SafeNet encryption brand. Gemalto also provides pre-sales technical support to hundreds of accredited partners globally: systems integrators, networks providers, Cloud and data centre service providers, telecommunications companies and network security specialists. www.safenet-inc.com/dataencryption/network-encryption/ SENETAS PARTNERS works exclusively with leading systems integrators and network service providers across more than 35 countries worldwide. Our master distributor, Gemalto, and its global network of partners have proven expertise in highspeed data networks and data protection. What s more, partners are committed to investing in the latest technical training for network data protection, high-speed data encryption and customer needs analysis. TALK TO SENETAS OR OUR PARTNERS also works with customers existing data network service providers, systems integrators and information security specialists to specify the optimal high-speed encryption solution for your needs. The optimal specification of CN Series encryptors for your network data protection is dependent upon many factors, including IT and network environments, technical and business needs. SENETAS CORPORATION LIMITED E info@senetas.com www.senetas.com Wherever you are, simply contact to discuss your needs. Or, if you prefer, your service provider may contact on your behalf.