Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security



Similar documents
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

The True Story of Data-At-Rest Encryption & the Cloud

Data Protection: From PKI to Virtualization & Cloud

Alliance Key Manager Cloud HSM Frequently Asked Questions

CRYPTOGRAPHY AS A SERVICE

Advanced Authentication

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Modern two-factor authentication: Easy. Affordable. Secure.

That Point of Sale is a PoS

Complying with PCI Data Security

Client Server Registration Protocol

Effective End-to-End Cloud Security

WHITE PAPER Usher Mobile Identity Platform

A Security Survey of Strong Authentication Technologies

Applying Cryptography as a Service to Mobile Applications

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

ICTN Enterprise Database Security Issues and Solutions

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Chapter 1: Introduction

External Supplier Control Requirements

Securing Data in the Cloud

Web Application Security Considerations

SENSE Security overview 2014

Internet threats: steps to security for your small business

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

SafeNet DataSecure vs. Native Oracle Encryption

The Security Behind Sticky Password

Information Security Services

W ith an estimated 14 billion devices connected to

Storage Cloud Infrastructures

Security Considerations for DirectAccess Deployments. Whitepaper

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Bellevue University Cybersecurity Programs & Courses

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

MPOS: RISK AND SECURITY

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Project 25 Security Services Overview

Full Drive Encryption Security Problem Definition - Encryption Engine

Reducing Application Vulnerabilities by Security Engineering

AB 1149 Compliance: Data Security Best Practices

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Dashlane Security Whitepaper

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Hardware Security Modules for Protecting Embedded Systems

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Multi-factor authentication

Securing Corporate on Personal Mobile Devices

The New Key Management:

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

A Case for Managed Security

Longmai Mobile PKI Solution

An introduction to Cryptosoft

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

The Key to Secure Online Financial Transactions

Host/Platform Security. Module 11

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Network/Cyber Security

More effective protection for your access control system with end-to-end security

90% of data breaches are caused by software vulnerabilities.

A brief on Two-Factor Authentication

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Remote Access Securing Your Employees Out of the Office

Alliance Key Manager Solution Brief

InfoSec Academy Application & Secure Code Track

Scientific Journal Impact Factor (SJIF): 1.711

Cloud security architecture

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

Security Landscape of Cloud Computing

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

MS-55096: Securing Data on Microsoft SQL Server 2012

SecurityMetrics Vision whitepaper

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster

Hard vs. Soft Tokens Making the Right Choice for Security

Two-Factor Authentication and Swivel

SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE

IoT Security Concerns and Renesas Synergy Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

A Secure Authenticate Framework for Cloud Computing Environment

Transcription:

Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security

The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored cyber attacks pose an ongoing threat to commercial, government and defense organizations The cost of server breaches is in the billions every year *The average total cost of a single data breach in Q4 2011 was $6,027,405 and in Q1 2012 was $8,378,970 (a 39% increase) **The number of breaches rose 48% from 2011 to 2012 *Navigant Consulting, June 2012 report (considered major publicly disclosed data breaches only) **Javelin Strategy and Research Report, 2013 2

The Cost of Server Breach 3

4

5

Single Points of Failure Modern computer systems ensure that there are no single points of failure RAID storage, server replication, database clustering, network redundancy Cryptographic keys are a security single point of failure in most organizations In the case of server breach, keys are stolen Protecting the perimeter is not enough Intrusion detection is too late 6

Removing SPOFs in Security The conventional wisdom: you need to hold the secret key in order to compute a cryptographic function The cryptographic reality: it is possible to compute without any single server knowing the secret key The cryptographic key (encryption/decryption, signing, authentication credential) is shared between two or more servers Both servers need to be breached, or nothing is learned Consider an ideal model with a function that computes encryption/decryption/signing/authentication on two random shares of the secret key/credential 7

Encryption is Vulnerable when the Key can be Stolen Encrypted database If the database server is compromised, the attacker can steal the encrypted database with the key, and then decrypt 8

Using Secure Computation Encrypted database Decryption takes place without ever bringing the key together! The key is never in any single place to be stolen. 9

Long-Term Protection What happens when the second server is hacked? We use a key refreshing technique at frequent intervals The attacker must reside on both servers in a single time interval in order to learn any secret This uses a secure coin tossing protocol The secret key is k Party 1 has a random string k 1 Party 2 has a random string k 2 k 1 k 2 = k The parties run a coin tossing protocol to obtain a random r Party 1 sets k 1 = k 1 r Party 2 sets k 2 = k 2 r 10

Server Configuration Different admins for each server Lower insider threat and targeted credential theft Different operating systems Reduce risk from malware and zero-days Different locations Make physical theft harder 11

Applications Database encryption Authentication Kerberos credentials (used in every Windows system) One-time password keys Regular passwords (web authentication) System-to-system authentication 12

A Virtual HSM HSM: Hardware Secure Module Strong protection of cryptographic keys Keys are never exposed HSMs are used where mandated but rarely otherwise They are very expensive to purchase and hard to deploy The cost of integration is high, as is yearly maintenance With secure computation, can achieve the effect of an HSM in software 13

Comparison to HSMs HSMs provide strong security for keys But: HSMs are not perfect (padding oracle attacks, timing attacks, API attacks, and more) HSMs are not flexible: hard to fix, slow to update, hard to tailor for specific needs HSMs are very expensive to buy and maintain Multiple HSMs are needed for reliability Repairs require a physical visit HSMs are hard to scale in the enterprise and even harder to use in the cloud

Speed Security for Malicious In an offline/online mode, we can do AES in under 20ms By recent improvements, we believe that we can get to approximately 5ms We can achieve comparable times for HMAC-SHA1, and so on By the generality of secure computation, we can support any cryptographic function Asymmetric key, including DSA/ECDSA Symmetric key Authentication protocols 15

Password Theft 16

Massive Password-Theft Damage More than 90 percent of user-generated passwords, even those considered strong by IT departments, will be vulnerable to hacking. Inadequate password protection may result in billions of dollars of losses, declining confidence in Internet transactions and significant damage to the reputations of the companies compromised by attacks. Deloitte Technology, Media and Telecommunications Predictions 2013 Web servers are particularly vulnerable They are exposed to the outside world They have access to internal confidential data 17

Existing Architecture usr Compute h =HASH(pwd,salt) If h ==h, accept login usr,pwd User Web server (usr,salt,h) If the web server is compromised, the attacker can retrieve the entire password file and break it offline 18 (usr,salt,h) Database

New Architecture If c is an encryption of HASH(pwd,salt), then output 1 usr usr,pwd User Web server (usr,salt,c) Even if the web server is compromised, the attacker can do nothing but an online password guessing attack! 19 (usr,salt,c) Database

Value of Solution Complete password protection in presence of web server compromise The key is never reconstructed and in one place (not even in RAM) Easy deployment Almost no change to existing architecture Additional server can be on any machine, in the enterprise and in the cloud Can run side-by-side plain password solution initially for testing purposes We have an implementation running on Amazon Security for malicious adversaries Takes approximately 20 milliseconds (not optimized) 20

Web Server Protection 2: User Data Web servers access sensitive user data Social security numbers (source of significant financial loss) Credit card numbers Client lists User data is encrypted (using a strong cryptographic key) and stored in the database The decryption key is split amongst two or more servers Secure computation is used to decrypt The decryption can be coupled to the authentication A secure computation protocol takes place between the servers that decrypts only when the password is correct 21

A New Angle One Part of the Decryption Key Outside of the US 22

Summary Server breaches cause massive damage every year, and the number of breaches is growing rapidly Secure computation can be used to mitigate the threat of server breach We are currently carrying out customer validation on directions and would be very happy to speak to anyone who is interested Please approach me or Nigel Smart 23