RNP's ICP EDU Projects



Similar documents
Using BroadSAFE TM Technology 07/18/05

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Ciphire Mail. Abstract

McAfee Firewall Enterprise 8.2.1

WebSphere DataPower Release FIPS and NIST SP a support.

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Secure Network Communications FIPS Non Proprietary Security Policy

McAfee Firewall Enterprise 8.3.1

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Using AES 256 bit Encryption

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

2014 IBM Corporation

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Encryption Key Management for Microsoft SQL Server 2008/2014

Key Management Best Practices

Certification Report

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Security Architecture (ASA)

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

Pulse Secure, LLC. January 9, 2015

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Data Protection: From PKI to Virtualization & Cloud

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Lightweight Security using Identity-Based Encryption Guido Appenzeller

RSA Digital Certificate Solution

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Red Hat Identity Management. Certificate System Technical Overview

Certification Report

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Certification Report

Hardware Security Modules for Protecting Embedded Systems

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

PC Business Banking. Technical Requirements

Savitribai Phule Pune University

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

PrivateServer HSM Integration with Microsoft IIS

Snow Agent System Pilot Deployment version

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

BroadSAFE Enhanced IP Phone Networks

Strengths and Weaknesses of Cybersecurity Standards

CRIPT - Cryptography and Network Security

IT Networks & Security CERT Luncheon Series: Cryptography

Security implementation of E- Settlement prototype. Veli-Matti Lumiala Bank Finland

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

Key & Data Storage on Mobile Devices

Lecture VII : Public Key Infrastructure (PKI)

Secure Hardware PV018 Masaryk University Faculty of Informatics

Alliance Key Manager Solution Brief

Cryptography and Key Management Basics

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

FIPS Security Policy 3Com Embedded Firewall PCI Cards

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Managed Portable Security Devices

By: Magiel van der Meer. Supervisors: Marc Smeets Jeroen van der Ham

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002

SSL Protect your users, start with yourself

Best prac*ces in Cer*fying and Signing PDFs

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Secure web transactions system

AEP Systems. Federal PKI Technical Working Group June 2003

VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module

MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR MODULE OVERVIEW SCOPE OF DOCUMENT. Security Policy REV 1.2, 10/2002

Configuring Security Features of Session Recording

Applying Cryptography as a Service to Mobile Applications

Cryptography and Network Security Chapter 15

FIPS Level 1 Security Policy for Cisco Secure ACS FIPS Module

Wireless Mobile Internet Security. 2nd Edition

PkBox Technical Overview. Ver

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

FIPS Security Policy LogRhythm Log Manager

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Complying with PCI Data Security

Public-Key Infrastructure

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators

FIPS Security Policy. for Motorola, Inc. Motorola Wireless Fusion on Windows CE Cryptographic Module

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

Microsoft SQL Server Integration Guide

An Introduction to Cryptography as Applied to the Smart Grid

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Secure Sockets Layer

Module 1: e- Learning

How to Drop your Anchor

Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012

Introducing etoken. What is etoken?

How To Encrypt Data With Encryption

Lab 7. Answer. Figure 1

SecureDoc Disk Encryption Cryptographic Engine

Transcription:

RNP's ICP EDU Projects PKI software and hardware for the Brazilian research community Ricardo Felipe Custódio UFSC Ricardo Dahab UNICAMP Jeroen van de Graaf UFMG

RNP's ICP EDU Projects Joint effort UFSC Federal U. of Santa Catarina UFMG Federal U. of Minas Gerais LCC The Lab for Scientific Computing at UFMG UNICAMP State U. of Campinas (SP) LabSec The Computer Security Lab at UFSC LCA The Lab for Applied Crypto at UNICAMP RNP through its Working Group initiative. 2

RNP's ICP EDU Projects Three working groups 2003 2004 SW for certificate life cycle management 2004 2005 Hardware Security Module (HSM) 2005 2006 Private key management Total budget Aprox. R$ 300K ~ US$ 100K 5 faculty, 3 PhD, 10+ MSc and ugrad students See http://www.icpedu.labsec.ufsc.br 3

ICP EDU I Software suite for issuing, publication and revocation of digital certificates as well as management of certificate revocation lists. Three packages Certificate management system Public module Public directory Fully operational and tested. 4

ICP EDU II An HSM and accompanying software. Initially meant as CA HSMs (private key protection and usage). Evolved into a general purpose security module equipped with crypto hardware acceleration. The complete prototype package includes server and client software as well as OS for three experimental platforms. 5

HSM architecture PKI Mode A P L I C A T I O N S Management Interface Key Management OpenHSMd OpenSSL Engine Eng A Engine Eng C Crypto in Software Engine Eng B Crypto in Hardware Engine Software HSM Accelerator Mode Host Machine 6

A few shots 7

A few shots 8

Prototype 1 9

Prototype 2 10

ICP EDU II Hardware prototypes built and key management subsystems proposed in Jean E. Martina's MSc thesis at UFSC. Market hardware being concluded by Kryptus Technologies in Campinas. Security sensing systems (temperature, light, tampering). FIPS 140 2 level. 3 if a simpler version. Low to medium throughput. Final price in the PC range. 11

HSM specs Throughput: 10 100 RSA sigs/sec Key generation: 1/sec Symmetric encryption/hash: 1Mb/sec Algorithms Hash: SHA X, 3DESMAC, MD5, HMAC Symmetric: 3 DES, AES, Twofish, Serpent, RC4 Public key: RSA, ECC, DSA, DH Random number generation: 100+ kbps Real time clock OS: FreeBSD 12

ICP EDU III Personal management and use of private keys. Motivations Cost Flexibility Responsibility sharing Initially called a Virtual Smartcard, it is evolving into a general signing tool, integrated in everyday applications. Encryption and authentication are in the roadmap. 13

ICP EDU III Private key generation and sharing with authenticated server. Only RSA signing at first. May or may not use HSM in server side. In very early stages. Forecast delivery for late this year. 14

ICP EDU deployment Pilot projects in early stages of planning at UFSC, UNICAMP and UFMG. After that demand will rise sharply, also boosted by other national initiatives, income tax return the most visible. Should benefit from collaboration with groups working in authentication and authorization frameworks. 15

Related activities ICP EDU group is Working closely with RNP in its PKI related initiatives, as TAGPMA. Present in Brazil's national PKI (ICP BR) steering committee, representing the Brazilian Computing Society (SBC). 16

Related activities ICP EDU group is Present in ICP BR's effort to produce its own FIPS compliant PKI software and hardware. Part of an ongoing effort by ICP BR to disseminate the use of digital certification. 17

Thank you! 18