The evolving storage encryption market

Similar documents
Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Cryptography MIS

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Public Key Cryptography

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Key Exchange. Secure Software Systems

Encryption. INST 346, Section 0201 April 3, 2018

Public Key Cryptography

Chapter 9. Public Key Cryptography, RSA And Key Management

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Diffie-Hellman. Part 1 Cryptography 136

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Computer Security: Principles and Practice

APNIC elearning: Cryptography Basics

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Encryption 2. Tom Chothia Computer Security: Lecture 3

CRYPTOGRAPHY & DIGITAL SIGNATURE

Introduction to Cryptography. Vasil Slavov William Jewell College

Lecture 6 - Cryptography

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 3/23/18

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

CS Computer Networks 1: Authentication

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Chapter 9 Public Key Cryptography. WANG YANG

Ref:

Cryptography and Network Security

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Public Key Algorithms

Lecture 2 Applied Cryptography (Part 2)

Introduction and Overview. Why CSCI 454/554?

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography (Overview)

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Computers and Security

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Garantía y Seguridad en Sistemas y Redes

Spring 2010: CS419 Computer Security

Overview. SSL Cryptography Overview CHAPTER 1

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

CSC 474/574 Information Systems Security

Getting to Grips with Public Key Infrastructure (PKI)

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CS669 Network Security

Public Key Algorithms

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Cryptographic Concepts

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

CSC 474/574 Information Systems Security

EEC-484/584 Computer Networks

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

Overview. Public Key Algorithms I

CSC 774 Network Security

14. Internet Security (J. Kurose)

Making and Breaking Ciphers

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

Kurose & Ross, Chapters (5 th ed.)

Other Topics in Cryptography. Truong Tuan Anh

Basics of Cryptography

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Cryptography and Network Security. Sixth Edition by William Stallings

Using Cryptography CMSC 414. October 16, 2017

4 PKI Public Key Infrastructure

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

Public Key (asymmetric) Cryptography

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Authentication and Key Distribution

CPSC 467: Cryptography and Computer Security

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

SECURITY IN NETWORKS 1

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

CSC 8560 Computer Networks: Network Security

PROTECTING CONVERSATIONS

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

CSC/ECE 774 Advanced Network Security

Key Management and Distribution

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Chapter 8 Information Technology

ECE 646 Lecture 4. Pretty Good Privacy PGP

Crypto CS 485/ECE 440/CS 585 Fall 2017

Chapter 7 Public Key Cryptography and Digital Signatures

Some Stuff About Crypto

Fall 2010/Lecture 32 1

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CCNA Security 1.1 Instructional Resource

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Transcription:

The evolving storage encryption market Alexander (S andy) S tewart S un M icros ys tems 1 S toragetek Drive, Louis ville, CO 80028 P hone:+1-303-673-2775 FAX: +1-303-661-5743 E-mail: alexander.s tewart@ s un.com Pres ented at the THIC Meeting at the National Center for Atmos pheric Res earch, 1850 Table Mes a Drive, Boulder CO 80305-5602 Augus t 21-22, 2007

Ciphers, Keys and Confusion A cipher is an algorithm for performing encryption (and the reverse, decryption) a series of welldefined steps that can be followed as a procedure. Symmetric Cryptography - a.k.a Secret Key Cryptography Same key used to encrypt and decrypt messages Problem is how to share key Asymmetric Cryptography - a.k.a Public Key Cryptography Different, mathematically linked keys for encryption and decryption Problem is process is computationally intensive

Symmetric Key Cryptography rot13 Algorithm is to rotate alphabet by n, Key n = 13 get well soon = trg jryy fbba Brute force attack requires <25 iterations Trivial to decipher using word structure Crytpoquip One letter substituted for another, key is definition of substitution get well soon = axo dxpp ywwr Brute force attack requires 4x 1026 iterations Easy to decipher using word structure AES (Advanced Encryption Standard) Message hashed using long key get well soon = dfcd3454bbea7 Brute force attack requires 3.67x1060 iterations when 256-bit key used No known alternative to brute force attack

Symmetric Key Cryptography Key Sharing Algorithm must be shared not an issue Key must be securely shared Independent secure communication Face-to-face whispered conversation Physically secured code-book Nested encrypted communication Hybrid approach using Public Keys to protect key transmissions

Key Protection = Volatile Memory = Non-volatile Memory Raw Key Values from CD or MARS Card Communications Key (Wrap Key(Media Key Split Key)) Media Key Split Key Wrap Key Communications Key Wrap Key (Media Key Split Key) Communications Key Media Key Split Key Wrap Key Communications Key

Asymmetric Key Cryptography History First invented (secretly) in early 1970 s by Ellis, Cocks and Williamson of UK GCHQ First published disclosure 1976 by Dr. Whit Diffie (Sun Fellow) and Martin Hellman Examples Diffie-Hellman key exchange RSA (Rivest, Shamir, Adleman) Elliptic Curve ElGamal

Asymmetric Key Cryptography How does it work Pairs of mathematically linked key values are created Public Key and Private Key The Public key may be widely distributed The public key is used by anyone wishing to send you a secure message Your Private key must be kept secret You use your private key to decrypt any secure message sent to you A message encrypted using your public key can only be decrypted using your private key Many people can send you messages encrypted using your public key but cannot read messages from other people encrypted using that public key

Asymmetric Key Cryptography Key Pairs The paired values are linked mathematically but it is not practicable to derive one from the other RSA Two large prime numbers form the key pairs The mathematical linkage is the exponentiation modulo of the product of these numbers Elliptic curve The two key pairs are the x/y coordinates of a defined elliptic curve

Example Drawing Wikipedia

Man-in-the-middle attack Alice s public key Message encrypted with Alice s public key Alice Alice s public key Substitute public key from Eric s key pair Eric Bob Eric s public key Decrypt, read or Message encrypted tamper, re-encrypt Message encrypted with Alice s public key with Eric s public key

Certificates and Certificate Authorities A Certificate binds a public key to a particular entity X.509 uses designated a set of Certificate Authorities who issue certificates PGP (Pretty Good Privacy) establishes a web of trust model where anyone can issue a certificate The structure of a user s X.509 v3 digital certificate is as follows: Certificate Version Serial Number Algorithm ID Issuer Validity Not Before Not After Subject Subject Public Key Info Public Key Algorithm Subject Public Key Issuer Unique Identifier (Optional) Subject Unique Identifier (Optional) Extensions (Optional) Certificate Signature Algorithm Certificate Signature The Certificate Authority has their own X.509 certificate that is used to validate the user s certificate Wikipedia

Asymmetric vs. Symmetric Comparison Asymmetric keys solve the problem of secure key communication Asymmetric key algorithms are much more computationally intensive Asymmetric key encryption requires significantly longer keys to achieve the same level of security as symmetric encryption

Optimum uses of Asymmetric Keys Secure transmission of short messages Credit card transactions using SSL/TLS protocols Digital Signature Proves that message comes from a trustable source Provide source with your public key Source hashes long message and attaches an encrypted (using your public key) version of the hash to the message On receipt, perform a separate hash of the message and compare it to the decrypted received hash Hybrid implementation with symmetric cryptography Plays to the strengths of both technologies Use Asymmetric Cryptography to securely share Symmetric Keys

Where do we go from here? Bulk encryption for Disk and Tape products is well under control Key Management is the issue Vendor specific systems exist IBM tailored to an IBM environment Sun independent of environment Backup Application Vendors are slow to engage Diligent efforts ongoing to define a compatible Key Management Protocol

Alphabet Soup NIST National Institute of Science and Technology FIPS Federal Information Processing Standard IEEE 1619 IEEE Encryption Working Groups 1619.1 1619.2 1619.3 TCG Trusted Computing Group T10/T11 SCSI Protocols

Evolving Products

Who is buying encryption Sun/STK Customers Upgrade for Encryption: Large Grocery Chain in Northern CA Large Office Supply Retailer Information Management Services Company Large Power (including Nuclear) Company Large Consumer Financial Services Company Major Finance House, Japan National Bank, Turkey National Bank, Poland etc.