Crypto WDM Surprise! Ari Salomaa, ADVA Finland @Trex, June 9, 2014



Similar documents
LAYER 1 & LAYER 2 ENCRYPTION WHY: ONE SIZE DOES NOT FIT ALL

In-Flight Encryption. Jim Theodoras. Feb 2014

Panel: The Future of Datacenter Networking Software-Defined Networking (SDN) for Datacenter Interconnect and Cloud Computing

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications

Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)

Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM)

High Speed Encryption Made in Germany

Data Center. Security A comprehensive approach to preventing, detecting and mitigating data security risks

VPNC Interoperability Profile

Software Defined Optical Networks with Optical OpenFlow. Jörg-Peter Elbers, Achim Autenrieth ADVAnced Technology August 2012 Rev 1.

MJTS Conference. David Billington, March 2011

MPLS/SDN Intersections Next Generation Access Networks. Anthony Magee Advanced Technology ADVA Optical Networking MPLS & Ethernet World Congress 2013

Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)

Consolidating Multiple Network Appliances

Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA. Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE

Layer 2 Encryption Fortifying data transport

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Agenda. clock tower in old city of Neuchatel ADVA Optical Networking. All rights reserved.

MovieLabs Specification for Enhanced Content Protection Version 1.0

10 easy steps to secure your retail network

RuggedCom Solutions for

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Site to Site Virtual Private Networks (VPNs):

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Communication Networks. We are securing the past in a fast moving future. FOX605 multiservice platform.

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ICAB5238B Build a highly secure firewall

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center

Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall

Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access

EnergyAxis System: Security for the Smart Grid

HP FlexNetwork and IPv6

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data

Using Web Security Services to Protect Portable Devices

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Interfaces and Payload Testing

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES

Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E

Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )

Security Policy Revision Date: 23 April 2009

DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

VPN. Date: 4/15/2004 By: Heena Patel

between and U.S. CUSTOMS AND BORDER PROTECTION (CBP)

CSCI 362 Computer and Network Security

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Hyper-V over SMB Remote File Storage support in Windows Server 8 Hyper-V. Jose Barreto Principal Program Manager Microsoft Corporation

Virtual LAN Configuration Guide Version 9

Recommended Wireless Local Area Network Architecture

The Metro Ethernet Network

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Avaya G700 Media Gateway Security - Issue 1.0

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

High speed Ethernet WAN: Is encryption compromising your network?

CCNA Security 2.0 Scope and Sequence

Cisco SFS 7000D Series InfiniBand Server Switches

Operational Core Network

How To Get The Most Out Of A Pon From Commscope

SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper

Network Monitoring - Fibre TAP Modules

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Fiber-Optic Networks: Is Safety Just an Optical Illusion?

NetTESTER Embedded 'Always-On' Network Testing & In-Service Performance Assurance

Best Practices for Outdoor Wireless Security

Oracle Communications Network Discovery Overview. Updated June 2007

Achieve Deeper Network Security

Intelligent, Functional and Effective Gateways for Small Business Applications

User Manual. Page 2 of 38

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Shell (SSH) Protocol

SSL Performance Problems

Business and enterprise cloud sync, backup and sharing solutions

THE FUTURE OF SMART GRID COMMUNICATIONS

Transcription:

Crypto WDM Surprise! Ari Salomaa, ADVA Finland @Trex, June 9, 2014

Security & Encryption in Optical Transmission Ari Salomaa, ADVA Finland @Trex, June 9, 2014

Why? When you transport information optically from A to B and you want it to be safe and secure How valuable is your information to you? What is the damage and cost to you IF the information ends up in the wrong hands? in Industry, Finance, Government, Healthcare, 3

Top 3 IT Security Issues in 2014 Cyber Attacks Continue [3] Within the next couple of years, we will experience an increasing number of cyber attacks resulting in militaristic and economic damage. As governments worry about the scale of the cyber security threat, we can expect to see more national standards emerge, and greater pressure for voluntary compliance. On the back of emerging standards we will see the cyber insurance market develop and begin to provide market incentives for compliance, whether that is a willingness to insure or reduce premiums. Non-compliance will also lead to a legal debate over liability for incidents. [3] Jarno Limnell, director of cyber security at Stonesoft. 4

Data Center Environment & Security Physical Access, Hardware, Software,... APPS APPS 5

Data Center Environment & Security and what about the Fiber Connection? APPS APPS 6

Fiber Optic Networks Tapping Possibilities Where to get access? Street cabinet Splice boxes / cassettes (Outdoor / Inhouse) How to get access? Y-Bridge for service activities Fiber Coupling device There are multiple ways to access fiber 7

Optial Transmission Security 8

Optical Security Topics Physical Layer Monitoring Power Tracking Intrusion Detection Optical Time-Domain Reflectometer (OTDR) Access Line Monitoring (ALM) Encryption AES-256 Authentication Diffie-Hellman 122842636 Security-Hardened Software RADIUS Secure Shell SNMPv3 A complete and integrated solution helps to manage it all 9

Physical Layer Monitoring Fiber Cut: Detection through software-adjustable switching thresholds Fiber Degredation: Alarm generation through adjustable fiber attenuation thresholds Long Term Effects: Long term fiber performance information monitoring Intrusion detection through correlation of typical power signatures Fault Location Detection: In-service OTDR measurement or Access Link Monitoring (ALM) to locate fiber problems and possible fiber taps 10

Encryption What is the Key for high performance encryption? Compliance with encryption standards Speed - Low Latency Highest level of security Encryption on the lowest possible layer 100% Throughput No Jitter Role Based Management (Multi Tenant Management for Carriers) Total Cost of Implementation Security solution has to meet application requirements 11

Encryption Basics 12

Encryption Basics Key Lengths Magnitude Number of grains in 1 m 3 sand from the beach 2 40 Number of atoms in a human body 2 92 Number of atoms in the earth 2 165 Number of atoms in the sun 2 189 Number of atoms in the Milky Way 2 226 Number of atoms in the universe 2 259 AES 256 13

Basic Cryptographic Goals Alice Bob Eve A priv A pub B pub B priv Alice Bob Eve A priv B priv & Authentication A pub B pub & Authentication Confidentiality (privacy) - "Encryption" Bob cannot understand message from Alice. Diffie Hellman Key Agreement/Exchange is arbitrated in the background. Bob could try to manipulate key exchange to Eve. Solution: Authenticity - "Authentication" Alice and Eve can be sure that they are really connected. 14

Throughput Encryption Performance Comparison of Maximum Throughput Framesize / Bytes 15

Optical transmission security Speed of Encryption Speed, throughput and simplicity xwdm based Encryption Router Site A WAN Site B Router FC Switch WDM-transport WDM-transport FC Switch Appliance based Encryption Router Site A Site B TDM WAN TDM Router FC Switch FC Switch Ipsec / MacSec Encryption Router Site A WAN Site B Router FC Switch WDM-transport WDM-transport FC Switch 16

Encryption Solution Integrated in Optical Transmission platform 17

ADVA FSP 3000 Encryption Highlights Protection Building Blocks Authentication via initial authentication key to protect from man in the middle attacks AES256 encryption to offer maximum data security Diffie Hellman (DH) key exchange for secure encryption key generation New encryption key every 1min/10mins for additional security Key lifetime configurable Lowest latency (100ns) while providing 100% throughput 18

Layer 1 Encryption Solution Suite 100GbE 40GbE FC 16G FC 10G 10GbE STM-64/OC-192 FC 8G IB 5G FC 4G STM-16/OC-48 FC 2G FC 1G GbE AES 100G Encryption AES 10G Encryption 1G 5G 5G 15G 40G 100G 19

Encryption over OTN Networks 1GbE & 10GbE Services FSP Network & Crypto Manager Site A Site B LAN OTN Network Carrier Managed Service LAN 1-8G FC n*1gbe, 10GbE STM-64c OTU-2e STM-64c OTU-2e 1-8G FC n*1gbe, 10GbE 5TCE-PCN+AES10G 5TCE-PCN+AES10G 20

Encryption Management & Operations 21

Data Center Networks Encryption Management for Private Networks Scenario 1 - User of encryption is the operator of equipment LAN FSP EM or LCT/CLI DCN FSP NM Server FSP NM Clients 3 rd Party NE 3 rd Party NE 3 rd Party NE Crypto Manager running on FSP NM 22

Data Center Networks Encryption Management for Private Networks Scenario 2 - Encryption user does not own the network LAN WWW. FSP NM Server FSP NM Clients GUI Server running NM client apps DCN Customer A 3 rd Party NE 3 rd Party NE 3 rd Party NE Crypto Manager running on GUI Server 23

Summary 24

Optical Transmission Security with Encryption Summary Encryption Solution Enables compliance with laws and regulations Effective security and protection for all information High bandwidth & 100% encrypted throughput Low-latency performance Superior scalability and agility on Layer 1 Encryption for both own enterprise networks and through operator managed service A complete and integrated solution leveraging advanced technology 25

Why? How valuable is your information to you? What is the cost to you IF the information end up in the wrong hands? Industry, Finance, Government, Healthcare, Easy insurance: Encrypt your Optical transmission! 26

Thank You asalomaa@advaoptical.com IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright for the entire content of this presentation: ADVA Optical Networking.