Key Protection for Endpoint, Cloud and Data Center

Similar documents
Dyadic Security Enterprise Key Management

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

Key Management & Protection: Evaluation of Hardware, Tokens, TEEs and MPC

Unbound and Oasis KMIP Interoperability

Secure Multiparty Computation

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

Who s Protecting Your Keys? August 2018

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Trojan-tolerant Hardware & Supply Chain Security in Practice

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Chapter 10 : Private-Key Management and the Public-Key Revolution

How Next Generation Trusted Identities Can Help Transform Your Business

PKI Credentialing Handbook

PYTHIA SERVICE BY VIRGIL SECURITY WHITE PAPER

Cryptography. and Network Security. Lecture 0. Manoj Prabhakaran. IIT Bombay

Foundations of Cryptography CS Shweta Agrawal

Secure Multiparty Computation

Security in NFC Readers

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Authentication Technology for a Smart eid Infrastructure.

Trojan-tolerant Hardware

Diffie-Hellman. Part 1 Cryptography 136

Lecture 1: Perfect Security

Modern two-factor authentication: Easy. Affordable. Secure.

Outline Key Management CS 239 Computer Security February 9, 2004

CPSC 467b: Cryptography and Computer Security

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

M2MD Communications Gateway: fast, secure and efficient

Getting to Grips with Public Key Infrastructure (PKI)

QUANTUM SAFE PKI TRANSITIONS

The security challenge in a mobile world

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Integrated Access Management Solutions. Access Televentures

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Introduction...1. Authentication Methods...1. Classes of Attacks on Authentication Mechanisms...4. Security Analysis of Authentication Mechanisms...

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Standardisation efforst in lightweight cryptography

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

RSA DISTRIBUTED CREDENTIAL PROTECTION

1 A Tale of Two Lovers

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

ECEN 5022 Cryptography

APPLICATIONS AND PROTOCOLS. Mihir Bellare UCSD 1

M2MD Communications Gateway: fast, secure, efficient

Achieving End-to-End Security in the Internet of Things (IoT)

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Make security part of your client systems refresh

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Total Threat Protection. Whitepaper

Secure Multiparty Computation: Introduction. Ran Cohen (Tel Aviv University)

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

THALES DATA THREAT REPORT

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

SECURITY AND DATA REDUNDANCY. A White Paper

Bitcoin, Security for Cloud & Big Data

The Cryptographic Sensor

More crypto and security

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Google Cloud Platform: Customer Responsibility Matrix. April 2017

SecurityFirst DataKeep

Google Cloud Platform: Customer Responsibility Matrix. December 2018

midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken

CS 425 / ECE 428 Distributed Systems Fall 2017

GSE/Belux Enterprise Systems Security Meeting

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

Cryptography and Network Security. Sixth Edition by William Stallings

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Kurose & Ross, Chapters (5 th ed.)

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

Creating Trust in a Highly Mobile World

Securing Today s Mobile Workforce

Encryption 2. Tom Chothia Computer Security: Lecture 3

The Road to a Secure, Compliant Cloud

Certificateless Public Key Cryptography

IBM i Version 7.2. Security Digital Certificate Manager IBM

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

SMart esolutions Information Security

Uses of Cryptography

Cryptographic Concepts

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

EMBEDDED ENCRYPTION PLATFORM BENEFIT ANALYSIS

Cryptography ThreeB. Ed Crowley. Fall 08

CISCO SHIELDED OPTICAL NETWORKING

Remote Key Loading Spread security. Unlock efficiency

Verizon Software Defined Perimeter (SDP).

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER

Activity Guide - Public Key Cryptography

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Transcription:

Key Protection for Endpoint, Cloud and Data Center

ENCRYPTION IS ONLY AS SECURE AS ITS LEAST SECURE KEY Encryption is undoubtedly one of the pillars of information security. It is used everywhere today: from the devices we use to bank online and login to social networks, to servers and backend systems in the data centers of corporations and cloud service providers. Encryption protects sensitive data, guaranteeing that only authorized entities holding the decryption key will be able to read and use the data. The two parts of any encryption system are the algorithm used for encryption/decryption and the key. While the encryption algorithm is by definition publicly available, a well-designed encryption algorithm cannot be broken within a reasonable timeframe without possession of the key. The key used for decryption, thus, must be protected and managed properly so it doesn t fall to unauthorized hands or being lost. Protecting the keys properly is a challenge, where the inevitable tradeoff between security, cost and usability is profound: strong key protection requires the use of dedicated hardware such as a Hardware Security Module (HSM) or a smart card, but come with all the downsides of using hardware. On the other hand, pure software techniques exist for protecting the keys in a flexible and scalable manner, however they don t provide a sufficient level of protection for most use cases. THE FUTURE IS HERE: KEYS ARE NOW SECURE, ON EVERY DEVICE! Dyadic Virtual HSM (vhsm) is a disruptive, pure software solution that is the first to provide the strong key security guarantees that were previously only available through the use of dedicated hardware. Dyadic s core technology is based on decades of research by Dyadic s co-founders, Professors Nigel Smart and Yehuda Lindell (and others) in the field of secure Multi Party Computation. The tremendous knowledge and skills of Dyadic s team of applied crypto experts and software development veterans have combined to create a practical and easy-to-use key security solution. Dyadic s key protection is the first software-only solution that enables every device to have a virtual HSM, where sensitive encryption keys can be stored securely with a trust level comparable to dedicated encryption hardware. This includes all ranges of machines; from servers hosted in the cloud or data centers to endpoint devices such as desktops, laptops, smartphones, and IoT devices. The rapid shift to virtualization and software-defined technologies is already upon us, as cloud and mobilization have begun to re-shape the world. vhsm will play a critical role in this evolution, being the first solution that enables software-only encryption to be carried out while maintaining the very high security required for most applications.

HARDWARE VS. SOFTWARE KEY PROTECTION WITHOUT COMPROMISE Hardware solutions such as HSMs, smartcards, hard tokens, embedded secure elements and Trusted Execution Environments (TEEs) are considered the most secure method for safeguarding and using cryptographic keys. For example, HSMs typically safeguard keys that are used for encrypting sensitive data, secure communication (SSL), VPN servers and others. Smartcards, hard tokens and secure elements are typically used to store authentication and digital signing keys. Such solutions allow the application to use the key only for the required set of operations such as encryption, decryption and signing, however they prevent extraction of the key material (key exportability). The circumstances of a compromised encryption key could be disastrous, where vast amounts of highly sensitive information fall to the hands of unauthorized parties such as cyber criminals. For example, consider a situation where a code signing key is compromised, thus allowing a criminal to sign arbitrary malware code with a legitimate signature. The nature of the hardware solutions described above make it possible to prevent such disastrous situations with a very clear security guarantee by precluding key exportability. For example, extracting the key from a smartcard would require the attacker to be in physical proximity and to use unique and expensive tools. On the other hand, while traditional software-based solutions for key protection offer the benefits of usability, scalability and low operational overhead, they do not provide clear guarantees for the security of the key. Each solution offers different security levels: in the less secure solutions the keys are merely stored in disk and/or memory, while at the more secure end of the spectrum the keys are protected using obfuscation algorithms and whitebox cryptography techniques. While those methods make accessing the keys somewhat harder for an attacker, their heuristic nature makes it almost impossible to know what level of security such a solution provides or how to compare two different solutions using such techniques. In addition, all such methods operate on a cat and mouse model. For example, attackers are continually breaking the constructions, after which developers must release a fix on that latest method, and then the attackers will break that construction, and so on. Determined attackers break these techniques relatively quickly, and it is very hard to know in advance when such attack will occur. This endless repetitive process is highly cumbersome, and often requires constant, frequent and unexpected investments in update, deployment and testing of new code to thwart the latest threats. This leads to the classic security vs. usability tradeoff, where high level of trust for the keys translates to the burden of using dedicated hardware that is expensive to maintain, deploy and provision. Using software-only solutions would greatly reduce costs, simplify maintenance and provisioning but a compromise will have to be made by significantly lowering the level of trust. Dyadic vhsm has freed organizations from making this tradeoff by offering a hardware-grade key security that is achieved in a lightweight and easy-to-use pure software solution. No more compromises. vhsm has the flexibility, usability and user experience advantages of software, but with a hardware comparable trust level.

HARDWARE COMPARABLE SECURITY WITHOUT HARDWARE: BUT HOW? Dyadic s key protection solutions are based on secure Multi Party Computation (MPC). MPC is a domain in cryptography that addresses the problem of jointly computing a function among a set of mutually distrusting parties. Its research dates back to the mid-1980s. In the earliest academic literature, it was shown that any function can be securely computed. However, the solutions proposed were not efficient enough to actually be used in practice. In recent years, cryptography experts including Dyadic s cofounders Professors Nigel Smart and Yehuda Lindell, have made significant algorithmic improvements to MPC protocols. Now, secure computation can be used to solve a wide range of problems with practical response times. In the following section a few practical examples of secure MPC will be outlined, followed by an explanation on how Dyadic applies secure MPC to protect cryptographic keys. REAL WORLD EXAMPLES FOR SECURE MPC A basic scenario is that a group of parties wish to compute a given function on their private inputs, while still keeping their inputs private from each other. For example, suppose that there are three bankers, Alice, Bob and Charlie, who wish to discover whose bonus was the largest that year but they still want to keep their bonus amounts secret from each other. One way for achieving this is to use a trusted third party, called Susan. Susan is a very trustworthy person, who promised the group that Alice, Bob and Charlie can each tell her their bonus amounts in secret and in return she will just tell the group the name of the banker who received the largest bonus.

? Alice?? Bob Alice Bob Susan??? Charlie Charlie Susan agrees to only share the name, and not the actual amounts to any of the parties. In a perfect world, this could be a valid solution, however, in reality, trusted parties like Susan usually do not exist or are very hard to come by. Secure MPC protocol would allow the group of bankers to carry out this task, without the need of a trusted third party. To do so they engage in an interactive protocol, exchanging messages, with the result being the output of the desired function. The privacy of their inputs and the correctness of the result are guaranteed. There are a wide range of practical applications for multi-party computation, varying from simple tasks such as coin tossing to more complex ones like electronic auctions (e.g. compute the market clearing price), electronic voting, private DNA matching, privacy-preserving data mining, and more. MATHEMATICAL GUARANTEES OF SECURITY The ability to compute a function on joint inputs while preserving input privacy and correctness seems paradoxical; how can one compute on values without ever having them? To some, this notion even seems impossible. As such, an important question to ask is, When is a multiparty computation protocol secure and how can we determine this? In modern cryptography, a protocol can only be deemed to be secure if it comes equipped with a rigorous security proof. This is a mathematical proof that the security of the protocol follows from a well-established hard cryptographic problem (like RSA, discrete log over Elliptic curves, and so on). The fact that protocols come with such proofs differentiate MPC protocols from numerous other techniques that are merely heuristic in nature, such as the aforementioned traditional methods for securing keys in software. In contrast, secure MPC protocols have a clear and exact guarantee, backed by a rigorous security proof. This is a very significant advantage to this approach over other merely heuristic ones, providing a clear security guarantee comparable to dedicated hardware key protection solutions.

USING SECURE MULTI PARTY COMPUTATION FOR CRYPTOGRAPHIC KEY PROTECTION Dyadic applies secure MPC to enable the storage and usage of cryptographic keys without ever having them in a single place, thereby eliminating the key as a single point of failure. This is being achieved practically by splitting a key into two random shares. These random shares can then be stored on distinct, separate machines with high degree of segregation. Each of these machines has a vhsm and each machine can use the cryptographic API that allows only encryption, decryption and signing. Key export is impossible, as neither of the machines ever hold the key. When using Dyadic Key Protection for Endpoints, one share is placed on a mobile device, while the counterpart is placed on a dedicated server in the cloud or data center. When using Dyadic Key Protection for Cloud and Data Center, the two key shares are distributed on two separate servers, that are hardened and segregated according to Dyadic s security best practices (e.g. separate administrators, different platforms and operating systems, different physical locations). Dyadic s vhsm utilizes secure computation in order to compute all standard encryption and signing algorithms without ever bringing the key together on memory, on disk or over the wire. Furthermore, the input privacy property of secure MPC guarantees that neither of the machines can learn anything about the key share of the other machine (and thus about the actual key). Therefore, even if one server is breached by an attacker or infected by malware, the attacker still cannot learn anything about the key. Moreover, the values of the shares of the key are continually refreshed, without modifying the key itself. Thereby, if an attacker successfully attacks the device where one share of the key is held, and then attacks the device holding the counterpart key share, he will actually learn nothing about the key. This means that in order to obtain the key, the attacker has to successfully attack both machines, at the same time. On the other hand, each machine can use the crypto API securely to carry our all cryptographic operations using the key. Dyadic s vhsm is currently in process of certification for FIPS 140-2 Level 2 by the National Institute of Standards and Technology (NIST).

UBIQUITOUS KEY SECURITY: A PARADIGM SHIFT The emergence of a pure software solution that provides hardware level security has far-reaching consequences. High trust key security along with the flexibility, scalability and usability of software will eventually become ubiquitous. On the backend, key safeguarding will become virtual for many use cases, and key protection and management would be significantly simplified. From the end-user point of view, authentication and authorization would be accomplished with higher level of trust, from any device. This means that more services could be offered and more tasks could be performed safely, thus expanding business opportunities and increasing productivity. User experience will greatly improve with the ability to provide high trust level on and kind of BYOD, reducing the need for dedicated hardware device to carry around. This is a true paradigm shift in encryption and key protection that would eventually allow a more convenient and secure experience in a world that is rapidly shifting towards the cloud, mobility and IoT.