Real Privacy Management (RPM) Overview Presentation April 2011.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

IPSec.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
K. Salah1 Security Protocols in the Internet IPSec.
Chapter 20: Network Security Business Data Communications, 4e.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
Doc.: IEEE /063 Submission May 2000 Y. Kuchiki, M. Ikeda Seiko Epson Corp. Slide 1 Yutaku Kuchiki, Masayuki Ikeda Seiko Epson Corporation May.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Chapter 14 Network Encryption
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Understand Internet Security LESSON Security Fundamentals.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Security of the Internet of Things: perspectives and challenges
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Encryption and Network Security
Cryptography and Network Security
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The Secure Sockets Layer (SSL) Protocol
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 36.
Lecture 36.
Cryptography and Network Security
Presentation transcript:

Real Privacy Management (RPM) Overview Presentation April 2011

Why RPM? What is it? What’s standard about it? What’s novel? (Features) What does novel give you? (Benefits) Is it proven? Practical proof of the features and benefits Example Technology: SSLX Reference Implementation RPM’s application to Financial Services Next steps RPM Technology Review

Real world, human networks have continuous, mutual authentication in all secure interactions, regardless of risk level. Electronic networks don’t. Why not? Because it’s too slow, effort-laden, complex. So it just isn’t done. Who cares? Tomorrow does. Horses -> cars. Fire -> electricity. Earth -> Star Wars The network will never be trusted until it’s just like humanity Why RPM?

Real Privacy Management (RPM) is a patented collection of cryptographic authentication and data security methods; as well as a distributed architecture that integrates RPM-enabled technology components providing end-to-end security services to any network. Using RPM, network participants are assured that every transmission is uniquely authenticated and encrypted in real-time. What is Real Privacy Management (RPM)?

IPSec, the complete security protocol for Next Generation Internet (IPv6), was developed as a framework for authenticated and encrypted IP traffic RPM can be thought of as an IPSec implementation; specifically, as IPSec ESP + Auth in tunnel mode (essentially, an IPSec VPN) RPM is IPSec. Features: Symmetric, one-pass, key establishment, key transport, key exchange, key management methods/system delivering authentication and data security (encryption) In this regard, RPM is best-practice ‘standard’ network security What’s Standard About RPM?

Cryptography New primitives, based on Underdetermined equation sets (provable security, both cryptographic and mathematic) Unique, random encryption message key per transmission (packet) Key sizing – Moore’s Law upkeep: add a byte, doubles key space Bandwidth (less overhead, no latency), Trust scaling and distribution Size Full RPM support library < 10KB Flexibility Federated Trust Model support – global network definition Full OSI ‘any-level’ support (network, transport, session, application) Full Standards support for ‘pieces’ (e.g., authentication, IKE, etc. – all/parts of RPM fulfills Standards calls in financial, HIPPA, etc.) What’s Novel About RPM?

Power Primitives, full operation optimized at machine level: registry-based computational effort (lowest possible) Performance Optimized computation delivers real time instantiation: 5 microseconds [CEBundle at Nanoseconds for 1,000,000 RPM Iterations including: 1. RNG creation, 2. Authentication credential update with associated output, and 3. Unique message key creation for presentation to a cipher] Application Design brings suitability for FGPA/ASIC (chip level) Math delivers RFID, key manipulation/tagging (doc management), Identifiers application (Credit Card numbers, SSNs, PINs, etc.) Size/low power brings sensors, drones, pacemakers – HW/SW Speed delivers real-time, especially where real-time security doesn’t exist What’s Novel About RPM?

Aside from the standard benefits of confidentiality, integrity, secrecy, privacy and authentication in any public/private network, RPM delivers several benefits because of its novel features: RPM fits where other protocols can’t RPM can operate where other protocols can’t RPM has less transmissions, sends less data than other protocols RPM can operate in real-time within the tolerances of most unsecured networks Novel RPM Benefits

The core technology of the RPM System is a new method for generating a sequence of master keys, with derived session and child keys, for use in encryption and authentication. This core technology is based on sound principles of randomization, derived keys, and presenting the adversary under certain attacks with underdetermined equations. –By Dr. Alan T. Sherman, May 27, 2005, An Initial Assessment of the RPM Authentication and Key-Management System: Highlights Is RPM Secure?

The realized security is sharing a pair of common-credentials, sharing a common-key, secrecy of messages, sender authentication, common-key authentication, message authentication, common-key renewal, renewal of a pair of common-credentials, etc. Such a security-function integrated simple communication system will be useful for the future wireless communication system such as handy phones and ubiquitous networks. – By Dr. Hatsukazu Tanaka, SCIS 2006 The 2006 Symposium on Cryptography and Information Security Hiroshima, Japan, Jan , 2006, The Institute of Electronics, Information and Communication Engineers Is RPM Secure?

Telcordia believes that the combination of all these paradigms and solutions in the RPM technology and system is a top-level, state-of-the-art, solution to the problem of designing an end-to-end multi-party security system. Overall, the RPM technology and system can certainly be considered as the result of sound, ingenious and novel thinking, targeting the most appropriate goals for the security properties of any system of this kind. More specifically, RPM has addressed essentially all major cryptographic and security attacks known in the related literature, and used essentially all necessary state-of-the-art cryptographic and security algorithms, protocols and techniques that are applicable to systems of this type. Additionally, RPM has proposed novel technology to solve the following problems: generation of a stream of pseudo-random values with special security guarantees, efficiently and securely encrypting data, continuously authenticating sender and receiver during an encryption session, protecting stored data or cryptographic keys, and providing communication security between any two parties. The RPM end-to-end security system reaches a level of content security that is comparable to the state of the art in this research direction, and, in fact, surpasses the state of the art by novel paradigms and solutions. –By Dr. Giovanni Di Crescenzo, Telcordia, March 2011, Cryptography Assessment of Real Privacy Management TM (RPM) System : Extended Summary Is RPM Secure?

10,000 RPM sessions in less than 100 seconds. DH takes longer than actual transmission Practical Proof of RPM Benefits

RPM has application across a wide spectrum of industries, including Financial, Wireless, Computing and Telecommunications, Entertainment, etc. In order to demonstrate RPM’s flexible application, it has been the core security protocol inside: TCP2 – a new secure version of TCP (Japan) Network Appliances – 10Mbps/100Mbps/1GB Secure Sockets Layer eXtended (SSLX) Noxx, Catalogs, bPositive Practical Proof of RPM Features

RPM in SSL Replacement - SSLX Governing body awards and monitors Public Directory Services Trusted third-party installs DS application and database Available: Windows server SSLX-VPN closed-community secure communication package/device Available: Windows server Web Browser Server SSLX Public Administrator Directory Service Private Directory Service User updates browser with Add-on for Firefox Site admin upgrades server. Available module: Apache mod_sslx

As another example of how RPM fits within an industry, here are some applications within Financial Services: Credit Card processing, payment gateways, POS, ATM, etc. Financial NFC systems (Active/Passive/BAP RFID, cellular, etc.) EMV Chip Card, POS and ATM systems (US rollout) RPM Application for Financial

Contact Information