SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY

Similar documents
INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES

SENETAS CERTIFIED HIGH-ASSURANCE NETWORK ENCRYPTION FOR GOVERNMENT

100GBPS, ULTRA-FAST, CERTIFIED HIGH- ASSURANCE NETWORK ENCRYPTION FOR MEGA DATA

AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS

CN9000 Series 100Gbps Encryptors

TRAFFIC FLOW SECURITY USING SENETAS HIGH- ASSURANCE ENCRYPTORS TECHNICAL PAPER

Understanding Layer 2 Encryption

SENETAS CERTIFIED HIGH-ASSURANCE ENCRYPTION FOR THE DEFENCE INDUSTRY

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

VERSATILE ENTRY-LEVEL

HIGH-ASSURANCE ENCRYPTION SOLUTIONS SECURING FINANCIAL SERVICES DATA IN TRANSIT SOLUTION PAPER

ADVANCED DEFENCE-GRADE

BIG DATA INDUSTRY PAPER

Getting to Grips with Public Key Infrastructure (PKI)

Overview. SSL Cryptography Overview CHAPTER 1

Innovative Security Solutions For Protecting Data in Motion

PKI Credentialing Handbook

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

SENETAS CN8000 MULTI-LINK 10x10 GBPS ENCRYPTOR FREQUENTLY ASKED QUESTIONS

Cryptography and Network Security Chapter 14

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

Secure Connectivity for Multi-Site Organisations

Cryptographic Concepts

Datacryptor Key Features. Page 1 of 5. Document Number 40676

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

White Paper for Wacom: Cryptography in the STU-541 Tablet

Services & Professional Certification Programs

Cryptography MIS

Installation and usage of SSL certificates: Your guide to getting it right

(2½ hours) Total Marks: 75

MEF Certification Update

TLS 1.1 Security fixes and TLS extensions RFC4346

Who s Protecting Your Keys? August 2018

NIST Cryptographic Toolkit

New Services, Technology & Professional Certification Programs

Standard. Use of Cryptography. Information Security Manager. Page 1 of 12

MEF Certification Update

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Computer Security: Principles and Practice

Technical Specification MEF 6. Ethernet Services Definitions - Phase I. June 2004

Diffie-Hellman. Part 1 Cryptography 136

FIPS Validation Certificate

MEF Certification Update

Technical Specification MEF 13. User Network Interface (UNI) Type 1 Implementation Agreement. November, 2005

IBM i Version 7.2. Security Digital Certificate Manager IBM

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

VPN Overview. VPN Types

UNIT - IV Cryptographic Hash Function 31.1

The Open Protocol for Access Control Identification and Ticketing with PrivacY

MEF Standard MEF Layer 2 Control Protocols in Ethernet Services. December 2018

Configuring Security for VPNs with IPsec

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business

MetroEthernet Options

White paper. Combatant command (COCOM) next-generation security architecture

Verizon Software Defined Perimeter (SDP).

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Secure Extension of L3 VPN s over IP-Based Wide Area Networks

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government

SECURE DATA EXCHANGE

SUREDROP SECURE COLLABORATION. WITHOUT COMPROMISE.

HAI Network Communication Protocol Description

R&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s

Virtual private networks

OpenWay by Itron Security Overview

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

3 Data Link Layer Security

HARDWARE SECURITY MODULES (HSMs)

ETHERNET SERVICES FOR MULTI-SITE CONNECTIVITY

NETWORK SERVICES: ETHERNET WAN ETHERNET SERVICES PRODUCT PORTFOLIO SUMMARY DOCUMENT

The SafeNet Security System Version 3 Overview

S Series Switches. MACsec Technology White Paper. Issue 1.0. Date HUAWEI TECHNOLOGIES CO., LTD.

PassReview. PassReview - IT Certification Exams Pass Review

Authentication Technology for a Smart eid Infrastructure.

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Network Security and Cryptography. 2 September Marking Scheme

GTS Ethernet line is designed so as to be compliant with the specifications of the MEF 6.1 and MEF 10.2 standards.

FIPS SECURITY POLICY FOR

Secure Government Computing Initiatives & SecureZIP

Network Security Essentials

Digital Certificates Demystified

Securing Network Communications

Grenzen der Kryptographie

Practical application of Quantum Key Distribution and wider security implications.

Certification Report

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

Technical Specification. Amendment to MEF 45: OVC Services Requirements for L2CP. August, 2017

Service description ETHERNET

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Unit A - Connecting to the Network

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

Transcription:

SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY WHO SHOULD READ THIS DOCUMENT System Integrators, Cloud and Data Centre Service Providers, Layer 2 Data Networks Managers, Network Architects, Network Engineers, Data Security Managers and Staff, Chief Information Officers, Chief Information Security Officers, Data Security and Network Procurement Staff. KEYWORDS, High-assurance Encryption, Layer 2 Data Networks, Robust Encryption, Networks, High- Speed Data Networks, Network Data Security, Encryption Security, Network Encryption, Certified Encryption, Encryption Authentication, Encryption Hardware, Data Plane Information, MAC Header, SecTag, Secure Keys, Entropy, Certificate Authority, Public Key Algorithms, Pairwise Key System, Group Key System and Multicast Encryption.

is a crucial component of high-assurance encryption security for high-speed Layer 2 networks. IN NETWORK SECURITY, ONLY HIGH-ASSURANCE ENCRYPTION SOLUTIONS ELIMINATE THE WEAKNESSES OF LESSER AND HYBRID PRODUCTS. High-assurance solutions are those typically demanded by government agencies and corporations transmitting sensitive or confidential date. The level of data sensitivity usually mandates that any solution is required to have certified encryption components. High-assurance solutions are commonly known as robust encryption. To be truly robust or high-assurance, an encryption security product requires four key features: > Certification as being suitable for government and defence use by a recognised authority (e.g Common Criteria, FIPS, NATO or CESG) > Standards-based encryption algorithm (e.g AES 256). > Client-side encryption key management, where encrypted keys and encryption authentication is only accessible by the client. > Authenticated end-to-end encryption, where there is no point in the network, or link, where un-encrypted data is accessible. WHAT IS HIGH- ASSURANCE ENCRYPTION? There are numerous encryption solutions available today; both hardware and software-based. Some are designed specifically to protect static data at rest. Others are designed to protect data in motion as it travels across local and wide area networks. Robust network encryption solutions have been available for a number of decades and governments around the world have been their largest single beneficiary. In fact, it was governments demand for robust encryption that triggered many vendors to invest in developing encryption technology in the first place. An essential component of so-called unbreakable encryption is that the encryption keys themselves should not be accessible to anyone but the owners of the encrypted data. If the encrypted encryption keys are securely stored clientside, no matter what type of breach occurs, unauthorised parties can only access the data in its encrypted form. True to the saying: Never leave the keys under the mat, the same advice applies to network data encryption. When encryption keys are exposed to access by unauthorised parties, the solution is greatly weakened. It is no longer a robust ( highassurance )security solution. As the robust encryption solutions is also providing true end-to-end encryption security, there is no weak point. Even if a router or switch (as is frequently the case) is found to have weak-points or vulnerabilities to attacks, highassurance encryption ensures the data passing through those vulnerable devices is safe. This paper deals with one of the core components of highassurance encryption:

1. INTRODUCTION An encrypted high-speed data network s robustness is in a large part determined by the type of encryption key management. Ensuring that the transmitted data s encryption keys are not accessible to an unauthorised party is essential to ensuring that a network breach will only result in meaningless data in the hands of an unauthorised party. This paper details the state-of-the-art key management system used by high-assurance dedicated encryptors. 2. ENCRYPTION The encryption and decryption of a frame uses different elements. Some of them are local on the encryptor and the other ones are carried along in the frame header of the encrypted frame. The combination of the two is needed to encrypt and decrypt a frame. The information carried in the header is also used for key assignment. Data Plane Information (Frame Header) Control Plane Information (local) Destination address Sender address VLAN-ID CTR Ethertype Subtype Counter 2 bytes 1 byte 5 bytes Subtype in flat networks for assigning counter to multicast group sender ID. Subtype in VLAN-based networks for assigning counter to sender ID. An encrypted frame during transit has a SecTag and the ICV added while the payload is encrypted. Encryption depends on key management to provide and deliver the local information needed to encrypt and decrypt frames. uses a hybrid approach and combines the advantages of asymmetrical and symmetrical cryptography.

3. KEYS 3.1. SECURE KEYS Secure encryption depends on key security in all phases: > A safe key requires entropy (randomness). Whilst both hardware and software can be used to create random numbers, true randomness comes from a hardware source. > The encryption keys are in plain text while encrypting and decrypting are dependent on a safe encryption environment. encryptors feature a tamper-proof enclosure. Any tampering inevitably leads to the zeroisation of all data in memory, including the keys in use. > Keys need to be secure while being transported between encryptors. Keys are always encrypted while in transit. 3.2. KEY BUILD-UP Each encryptor has its own certificate, issued by the Certificate Authority (CA). The certificate is, initially, secret. Its public key is used as a digital signature, so the recipient can verify the sender. The key exchange uses the certificate to sign the keys (or partial keys) that are exchanged, ensuring that they are coming from the correct remote device. The partial keys are generated completely inside the encryptor, without any user having access to it. After exchanging the partial keys, both sides calculate the same shared secret. Subsequently, the encryptor internally generates the master key and encrypts it with the shared secret. The encryptor also generates the session key and uses the master key to encrypt it. The transmission of the master and session keys from one encryptor to the other is always encrypted. supports the two leading public key algorithms, RSA and ECC (elliptic curve cryptography), for the exchange of the master keys (key encryption keys). In case of ECC, ECDSA (elliptic curve digital signature algorithm) and ECKAS-DH (elliptic curve key agreement scheme) are used. The key build-up if RSA is used: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement RSA Signature Key Protocol Device Authentication RSA Certificate

The build-up of group keys adds an additional authentication per group: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement RSA Signature Key Protocol Group Membership Authentication RSA Certificate Signature Key Protocol Device Authentication RSA Certificate The key build-up if ECC (elliptic curve cryptography) is used: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement ECKAS-DH Signature Key Protocol Device Authentication ECDSA Certificate For each group keys there is also an additional level of authentication: Session Key Exchange Protocol Master Key Exchange Protocol Master Key Agreement ECKAS-DH Signature Key Protocol Group Membership Authentication ECDSA Certificate Signature Key Protocol Device Authentication ECDSA Certificate

3.3. KEY SYSTEMS offers users a choice of two key systems; pairwise key system or group key system (or a combination of both) in order to accommodate different topologies and usage scenarios. Metro and Carrier comes in three different topologies: point-to-point, point-to-multipoint and multipoint-to-multipoint. Each of these topologies comes in two variants: a port-based one and a VLAN-based one. Carrier E- Line (Point-to-Point) E- Tree (Point-to-Multipoint) E-LAN (Multipoint -to-multipoint) Private Line (EPL) Virtual Private Line (EVPL) Private Tree (EP-Tree) Virtual Tree Line (EVP-Tree) Private LAN (EP-LAN) Virtual LAN Line (EVP-LAN) ENNI ( Network-to-Network Interface) E- Access (Point-to-Point) Access Private Line (EPL) Access Virtual Private Line (EPL) Private: Port-based, one EVC per UNI Virtual: VLAN-based, multiple EVCs per UNI PAIRWISE KEY SYSTEM Pairwise key systems are designed for point-to-point connections and treat point-to-multipoint and multipoint networks as an accumulation of point-to-point connections.

POINT-TO-POINT (E-LINE) For a pairwise key system, point-to-point connections consist of a link whose end-points are defined by the two encryptors A and B. For the encryption of the data flowing from A to B the encryptor uses key AB. In the opposite direction, from B to A, the encryptor uses key BA. AB BA POINT-TO-MULTIPOINT (E-TREE) A pairwise key system is also well-suited for a point-to-multipoint topology if the network is set up as an accumulation of separate point-to-point links in a hub and spoke configuration. Spoke/Leaf B Spoke/Leaf C Spoke/Leaf D Hub/Root A AB/BA AC/CA AD/DA Spoke/Leaf E AE/EA AG/GA AF/FA Spoke/Leaf G Spoke/Leaf F key management supports the combination of a pairwise key system with a group key system, so multicast frames can be encrypted with a group key when using a point-to-multipoint topology. For unicast frame encryption, pairwise keys are used; while multicast frames are encrypted using the group key system. A multicast group can comprise all spokes: Key MG1

Or a multicast group can comprise only a subset of spokes: Multicast Group 2 Multicast Group 2 Multicast Group 2 Key MG2 Each multicast group has its own key and up to 256 individual multicast groups are supported. Broadcast frames are treated as a special case of multicast and are all encrypted using the same broadcast key. MULTIPOINT-TO-MULTIPOINT (E-LAN) Pairwise key systems also treat multipoint-to-multipoint topologies the same way they treat point-topoint connections. In this scenario, key management supports the combination of pairwise key system with a distributed group key system. This allows multicast frames to be encrypted with a group key when using a point-to-multipoint topology. For unicast frame encryption, pairwise keys are used; while multicast frames are encrypted using the group key system. As multicast groups can originate at different sites, the encryptor at such sites must be able to act as group key server for the multicast groups originating there. For unicast frame encryption each encryptor has a table with the local and remote MAC addresses. Security associations are created automatically. The MAC addresses are automatically learned and assigned to the security associations using a proprietary autodiscovery protocol. Multicast groups can either be discovered in discovery mode and be added automatically, or they can be added manually. The key servers work independently of each other and thus offer redundancy. Each multicast group has a senior member that is responsible for the key generation, the key exchange and the key updates. If this senior member drops out, the next member of the multicast group is promoted to senior member and takes over. The group key system ensures that the right keys are available at the right time to the group members. The group key server for that group generates the keys for that group, using a hardware-based true random number generator for the seed.

A multicast group can comprise all sites: key Server Multicast Group 1 Key MG1 Or it can comprise only a subset of the sites. key Server Key MG 2 Multicast Group 2 Multicast 2 Each multicast group has its own key and up to 256 individual multicast groups are supported. Broadcast frames are treated as a special case of multicast and are all encrypted using the same broadcast key. GROUP KEY SYSTEM Group keys are based on the principle that for the communication within a defined group the same key is used to encrypt the communication. The membership in one group does not exclude a member from concurrent membership in other groups. For the communication within different groups different keys are used. Keys are unique to a group and separate the groups cryptographically. A group consists of two or more members. For VLAN-based Carrier networks, group assignment is based on the VLAN tag. A group can consist of one or multiple VLANs. Each group uses an additional authentication step with each group member having an additional certificate per group. The maximum number of certificates per encryptor is 64. The cryptographic separation of groups combined with support for distributed key servers creates the foundation for a multi-tenancy in which all tenants belong to the same PKI. Group keys work for all three basic topologies.

POINT-TO-POINT (E-LINE) One encryptor is the group key server and generates and distributes the group key to the other group member. VLAN 110/Group 1 POINT-TO-MULTIPOINT (E-TREE) In point-to-multipoint scenarios there are two different approaches: The network members can be treated as single group. Group 1 Group 1 Group 1 Group Key 1 Group 1 Group 1 Group 1 Multiple groups with different memberships can be layered on top of each other: Group 2 Group Key 2 Group 2 Group 2

Each hub-spoke relationship can be treated as an individual group, with the spoke being the group key server: VLAN 101 VLAN 102 VLAN 103 VLAN 106 VLAN 105 VLAN 104 Or, a mix of VLANs with single or multiple members: Backup VLAN 101 VLAN 101 VLAN 103 VLAN 106 VLAN 103 VLAN 103 MULTIPOINT-TO-MULTIPOINT In multipoint-to-multipoint topologies, a group key system allows the layering of different groups. (eg. the individual mambers of a VLAN). If that VLAN covers all sties, then all sites are members of this group (unless specifically excluded).

Backup 2 Backup 1 Group 2 Backup 2 Backup 1

COUNTER IN GROUP KEY SYSTEMS Using authenticated encryption, a group shares both the key and the counter. Each group member uses a different counter offset that is transported together with the counter reading in the SecTag of each encrypted frame. VLAN 1D 110 The assignment in terms of counter reading looks as follows: Offset 1 Offset 2 Offset 3 Offset 7 Offset 4 VLAN 1D 110 Offset 6 Offset 5

GLOBAL SUPPORT AND DISTRIBUTION CN series encryptors are supported and distributed globally by Gemalto under its SafeNet encryption brand. Gemalto also provides pre-sales technical support to hundreds of accredited partners around the world; including systems integrators, networks providers, cloud and data centre service providers, telecommunications companies and network security specialists. For more information click here. TALK TO SENETAS OR OUR PARTNERS and Gemalto also work with customers existing data network service providers, systems integrators and information security specialists to specify the optimal high-assurance encryption solution for their needs. Wherever you are, simply contact Gemalto or to discuss your needs. Or, if you prefer, your service provider may contact Gemalto or on your behalf. HIGH-ASSURANCE NETWORK ENCRYPTION Whatever your Layer 2 network security needs, has a high-assurance solution to suit. They support modest 10Mbps to high-speed 10Gbps links and multi-port 10x10Gbps links. SENETAS CORPORATION LIMITED Scalable, agile and easy to use; high-assurance encryptors provide maximum security without compromising network performance. E info@senetas.com www.senetas.com manufactures high-assurance Layer 2 Metro Area and Carrier network encryptors. They support all Layer 2 protocols and topologies. Our multi-certified encryptors are used by some of the world s most secure organisations, including governments and defence forces; commercial and industrial enterprises; Cloud, data centre and telecommunications service providers in more than 30 countries. KEYMGT-PD0816