DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

Similar documents
Computer Security: Principles and Practice

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

CIS 4360 Secure Computer Systems Symmetric Cryptography

Cryptography MIS

Winter 2011 Josh Benaloh Brian LaMacchia

Computer Security CS 526

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

NIST Cryptographic Toolkit

Introduction to Modern Symmetric-Key Ciphers

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Content of this part

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Hydra PC FIPS Sector-based Encryption Module Security Policy

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Cryptographic Concepts

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

CSC 474/574 Information Systems Security

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Block Cipher Operation

Data Encryption Standard (DES)

Symmetric Encryption. Thierry Sans

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

CSCE 715: Network Systems Security

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

Certicom Security for Government Suppliers developing products to meet the US Government FIPS security requirement

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.

Computer Security 3/23/18

SecureDoc Disk Encryption Cryptographic Engine

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Cryptography Functions

Symantec Corporation

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

FIPS Security Policy

Security. Communication security. System Security

FIPS Security Policy

Lecture 1 Applied Cryptography (Part 1)

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

Barco ICMP FIPS Non-Proprietary Security Policy

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Introduction to Symmetric Cryptography

CSE 127: Computer Security Cryptography. Kirill Levchenko

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Network Security Essentials Chapter 2

CSCI 454/554 Computer and Network Security. Topic 3.2 Secret Key Cryptography Modes of Operation

ECE 646 Lecture 8. Modes of operation of block ciphers

RSA BSAFE Crypto-C Micro Edition Security Policy

Security Policy. 10 th March 2005

Encryption. INST 346, Section 0201 April 3, 2018

(2½ hours) Total Marks: 75

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

This Security Policy describes how this module complies with the eleven sections of the Standard:

Block Cipher Modes of Operation

PKI Credentialing Handbook

Unit 8 Review. Secure your network! CS144, Stanford University

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

05 - WLAN Encryption and Data Integrity Protocols

Chapter 3 Block Ciphers and the Data Encryption Standard

Cryptography [Symmetric Encryption]

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

IBM 4768 PCIe Cryptographic Coprocessor with Common Cryptographic Architecture (CCA) PCI-HSM Security Policy

Introduction to cryptology (GBIN8U16)

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

Symmetric, Asymmetric, and One Way Technologies

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu

CIS 6930/4930 Computer and Network Security. Topic 3.1 Secret Key Cryptography (Cont d)

Block cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75

Practical Aspects of Modern Cryptography

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Cryptography Introduction

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Cryptanalysis. Ed Crowley

Summary on Crypto Primitives and Protocols

CHAPTER 6. SYMMETRIC CIPHERS C = E(K2, E(K1, P))

Cryptography (Overview)

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version

Chapter 6 Contemporary Symmetric Ciphers

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Processing with Block Ciphers

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677

Cryptography ThreeB. Ed Crowley. Fall 08

CSC/ECE 574 Computer and Network Security. Processing with Block Ciphers. Issues for Block Chaining Modes

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Garantía y Seguridad en Sistemas y Redes

Introduction to Cryptography. Lecture 3

Transcription:

Submitted by SPYRUS, Inc.

Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based Encryption...5 SPYRUS Background...6 The Licensed Product may embody technology protected by one or more of the following patents or patent applications: U.S. Pat. Nos. 6,088,802; 6,981,149; 5,761,305; 5,889,865; 5,896,455, 5,933,504; 5,999,626; 6,122,736; 6,141,420; 6,336,188; 6,487,661; 6,563,928; 6,618,483; U.S. Pat. Appl. Ser. Nos. 60/886,087;11/258,596; 09/434,247; 09/558,256; 09/942,492; 10/185,735; Can. Pat. Appl. Ser. Nos. 2176972; 2176866; 2202566; 2174261; 2155038; 2174260; E.P. Pat. Appl. Ser. No. 96201322.3; 97106114.8; 96105920.1; 95926348.4; 96105921.9; PCT/US08/51729. 1

DT5000 and DT6000 Technology Overview The DT5000 and DT6000 is the flagship of the Kingston DataTraveler Flash drive product line and the culmination of five years of research and development of encryption by SPYRUS, Inc., using what are now called the Suite B algorithms, and in particular the highly efficient ECC P-384 plus AES-256 Cryptography algorithms. These high-strength but unclassified algorithms were specifically selected and approved by the U.S. Government and DoD for use in multi-national data sharing environments, including both classified and unclassified applications. Suite B provides significantly greater strength and much better performance than the RSA algorithms used by other sector-based encryption USB devices. The ECC P-384 keys used within the DT5000 and DT6000 are the equivalent of a 7,680-bit RSA key, yet the ECC operations are faster than RSA-2048, and 64 times faster than an RSA-7680 key would be. SPYRUS s development of the technology used by the DT5000 and DT6000 was guided by specific design criteria derived from its many years of individual and corporate experience in cryptography in general, and low-cost, high-assurance cryptographic hardware devices in particular. The design criteria used within the DT5000 and DT6000 include the following: Use dedicated security processor chips for all static key generation and storage, and for user authentication. Designed for the high-assurance, high-volume commercial banking, and pay-per-view markets where valuable content must be protected against the threats from millions of public users, these devices have numerous DoD applications for embedded security, and they have been extensively analyzed by several national governments and independent national laboratories. Supplement dedicated security processors with general-purpose processor chips (e.g., an ARM processor) for higher bandwidth applications, high-speed public key operations, and general control functions, including power-on self-tests and on-going health checks. Implement high-speed symmetric encryption and hash functions in a Field Programmable Gate Array (FPGA) for performance and flexibility. Incorporate approved very high entropy deterministic random bit generators. Prohibit all external key generation and key loading, as well as all private key extraction (key escrow). Too many compromises have occurred as a result of the human element involved in such processes. Use high-strength ECC P-384 plus AES-256 Cryptography for all key management. Ensure that the key strength of data confidentiality and data integrity mechanisms is sufficient to resist all known attacks for at least 150 years, or beyond a human lifespan. Design products to meet FIPS 140-2 Level 2 (DT5000) and Level 3 (DT6000) or even more stringent demands, including exotic tools such as electron microscopes, sophisticated chip-peeling techniques, and side channel and timing attacks. 2

Why DT5000 and DT6000 Encryption Is Different The DT5000 and DT6000 includes the following SPYRUS developed features, which are unique among all competing sector-based media encrypting flash drives: The DT5000 and DT6000 sector-based USB encryption device implements Suite B high-strength cryptographic algorithms and advanced key management, in accordance with Cryptographic Modernization directives, including Elliptic Curve Cryptography (ECC) with P-384 keys, AES-256 and SHA-384. The DoD established the Suite B algorithms as a national standard for national security information, with the algorithms themselves, not necessarily the implementation, used for TOP SECRET information and below. Suite B provides significantly greater strength than the RSA algorithms used by other USB devices. If an incorrect PIN is entered and the maximum number of attempts is exceeded, the keys are zeroized and no data stored on the drive can ever be decrypted in the future. The DT5000 and DT6000 also benefits customers by providing security for encryption key management that is more extensive than FIPS 140-2 standards, namely: The strength of AES-256 encryption keys is not defined by the encryption algorithm per se, but by the entropy or randomness of the bits composing the keys and by the strength of the public key algorithms used to communicate and protect those bits. SPYRUS uses approved high-assurance random number generation techniques to create high-entropy keys in accordance with NIST SP 800-90. The continuing strength of the encryption and signatures keys is dependent on the algorithmic and hardware mechanisms used for protecting the keys. All encryption is performed in hardware within a tamper-evident security boundary. Private keys cannot be imported, exported, or corrupted. For added security against brute-force attacks, the DT5000 and DT6000 permanently deletes the encryption keys after 10 incorrect PIN entries, rendering the encrypted data undecipherable. DT5000 and DT6000 does not store the PIN internally, even in a hashed form. Instead, the user s PIN is entered over a secure channel and is mathematically combined with other information using Suite B algorithms to generate a Master Key Encryption Key which is then used to protect the Media Encryption Key. DT5000 and DT6000 supports digitally signed firmware using ECDSA P-384 and SHA-384 cryptography. o Signed firmware updates are a new security requirement established by the U.S. DoD for encrypting USB flash drives. 3

Why DT5000 and DT6000 Encryption Is Different - Summary The DT5000 and DT6000 includes the following SPYRUS-developed features, which are unique among all competing sector-based media encrypting flash drives: The DT5000 and DT6000 is the only sector-based USB media encryption device that implements Suite B high-strength cryptographic algorithms, in accordance with Cryptographic Modernization directives, including Elliptic Curve Cryptography (ECC) with P-384 keys, AES-256 and SHA-384. The U.S. DoD established the Suite B algorithms as a national standard for protection national security information and communications. Suite B provides significantly greater strength than the RSA algorithms used by other USB encryption devices. DT5000 and DT6000 also benefits customers by providing security for encryption key management that is more extensive than FIPS 140-2 standards, namely: The strength of AES-256 encryption is not defined by the encryption algorithm per se, but by the entropy or randomness of the bits composing the keys and by the strength of the public key algorithms used to communicate and protect those bits. The DT5000 and DT6000 uses high-assurance, random number generation techniques to create high-entropy AES-256 keys, and ECC P-384 keys to protect them. By comparison, products that use RSA-2048 only provide the equivalent of 112 bits of protection for such keys. The result is like using a very strong lock on your front door, and then hiding the key under a flowerpot. The continuing strength of the encryption and signatures keys is dependent on the algorithmic and hardware mechanisms used for protecting the keys. All encryption is performed in hardware within a tamper-evident security boundary. Private keys cannot be imported, exported, or corrupted. Uses the XTS-AES encryption mode. DT5000 and DT6000 does not store the PIN internally, even in a hashed form. Instead, the user s PIN is entered over a secure channel and is mathematically combined with other information using Suite B algorithms to generate a Master Key Encryption Key, which is then used to protect the Media Encryption Key. Finally, if the maximum number of incorrect PIN attempts is exceeded, the keys are zeroed out. XTS-AES Sector-Based Encryption The Kingston DT5000 and DT6000 uses the more robust strength of XTS-AES sector-based hardware media encryption, developed by SPYRUS, Inc., to address certain vulnerabilities of conventional Electronic Code Book (ECB) encryption mode to known attacks which make such schemes questionable for disk and media encryption. 4

NIST recently addressed this issue in SP800-38E. This standard endorses the IEEE P1619 Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices, with a new Mode of Operation called XTS-AES, which is particularly well-suited for sector-base media encryption and far superior to competing implementations. NIST SP800-38E is a new security standard referenced by the U.S. DoD for encrypting USB flash drives. The problem that XTS-AES addresses (and that other modes do not) is that with media encryption and fixed-length sectors, there is no room to store the random Initialization Vector (IV) that normally is used to protect against replay attacks. As a result, a substitute must be used for an IV, based on the logical sector number. However, because that field is predictable, various attacks become feasible, including so-called watermarking and replay attacks. Alternatives used by competing products, such as Electronic Code Book (ECB) mode, have serious weaknesses. For example, because a single key is used to encrypt the entire disk or media, encrypting a known (or guessed) block of plaintext in ECB mode will generate a specific block of output in every case, no matter where on this disk it happens to occur. This significantly eases the work of the attacker, as pieces of a message may make use of fragments that are known in other contexts. Original Encrypted using ECB mode Encrypted using other modes As the above pictures (from http://en.wikipedia.org/wiki/block_cipher_modes_of_operation) make clear, ECB mode is far from ideal, because the same plaintext always generates the same ciphertext there is no mixing or diffusion of information that would make the encryption vary according to the context or the location on the media. Not only can this leak information across files written at different times, it can also leak information within a file, for example if a word or phrase is repeated. Other Modes of Operation are even worse, when used for sector-based media encryption. Output Feedback Mode (OFB), Counter Mode (CTR), and Counter with CBC-MAC (CCN) all operate similarly. They all generate a string of pseudo-random bits that begins with some starting point (an Initialization Vector), and that string is then exclusive-ored (XORed) with the plaintext that is to be encrypted. However, the Initialization Vector is derived from the sector number and therefore never changes, and thus the string of random bits used to encrypt a particular sector is always the same. Now consider what would happen if it were possible for an attacker to copy all of the encrypted sectors on the device at some initial point in time, 5

and then copy all of the encrypted data again at some later time. Assuming some of the data has changed, it would be possible to exclusive-or the two versions of the changed sector together. This would have the effect of cancelling out ALL of the random encryption bits, and leave the XOR of the two plaintext strings as a result. Because of the redundancy in any natural language, it is a trivial matter to decode such a result. The XTS-AES block encryption algorithm solves these problems through what is called a tweakable cipher 1 that adds additional security. With this scheme, TWO full-strength AES-keys are used. The first is used to generate what is called a tweak, which is an encrypted function of the logical sector number plus a continuing polynomial permutation, so that no two sectors on the storage medium are processed in exactly the same way. The permuted tweak is used to pre-whiten the plaintext before encrypting it, and later to post-whiten the ciphertext output. This prevents the adversary from decrypting any sector of the disk by copying it to an unused sector of the disk and performing an unauthorized decryption. It also prevents two identical plaintext sectors in different locations from encrypting to identical ciphertexts and thus leaking potentially useful information to an attacker. In effect, XTS-AES is using TWO AES-256 keys to tripleencrypt a sector in a manner reminiscent of two-key triple-des but with much stronger keys. The result is that the Kingston DT5000 and DT6000, using the XTS-AES technology developed by SPYRUS, is significantly more robust than any other sector-based media encryption products on the market. SPYRUS Background SPYRUS provides high-assurance security technology for the U.S. Government, industries required to comply with security regulations, and everyday users who want the best protection for sensitive information. All SPYRUS security technology is designed, developed, and manufactured entirely in the USA. SPYRUS hardware and software support the strongest commercially available cryptographic algorithms, including all Suite B algorithms and legacy algorithms such as RSA and triple-des. 1 A tweakable block cipher accepts a second input called the tweak along with its usual plaintext or ciphertext input. The tweak, along with the key, selects the permutation computed by the cipher. The. XTS-AES tweak cipher was approved as a standard by IEEE P-1619 in December 2007, and endorsed by NIST in SP 800-38E. 6 2011 Kingston Technology Corporation, 17600 Newhope Street, Fountain Valley, CA 92708 USA All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Printed in the USA MKP-157.2