Database Key Management CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
Securing the Worlds Information Secure Dynamic Credit and Debit Cards Stop Credit Card and Identity Theft Andre Brisson Stephen Boren Co founders/ Co.
Advertisements

CSCI 6962: Server-side Design and Programming Input Validation and Error Handling.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Cryptography and Network Security
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Principles of Information Security, 2nd edition1 Cryptography.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Cryptographic Technologies
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Diffie-Hellman Key Exchange
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
CSCI 6962: Server-side Design and Programming
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Electronic Mail Security
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Cryptography, Authentication and Digital Signatures
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT By Alexander Beck Jens Graupmann Frank Ortmeier.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Pretty Good Privacy (PGP) Security for Electronic .
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
1 KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS J. G. Steiner, C. Neuman, J. I. Schiller MIT.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
Information Integrity and Message Digests CSCI 5857: Encoding and Encryption.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
CSCI 6962: Server-side Design and Programming Shopping Carts and Databases.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Lecture 5 Page 1 Advanced Network Security Review of Cryptography: Cryptographic Keys Advanced Network Security Peter Reiher August, 2014.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
1 Example security systems n Kerberos n Secure shell.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Security Handshake Pitfalls. Client Server Hello (K)
Web Applications Security Cryptography 1
Database Key Management
Attacks on Public Key Encryption Algorithms
Outline Properties of keys Key management Key servers Certificates.
Security at the Application Layer: PGP and S/MIME
Presentation transcript:

Database Key Management CSCI 5857: Encoding and Encryption

Outline Record-based encryption Applications and secure databases Dedicated encryption server Encryption receipts Key vault security and master keys Key migration Key backup

3 Database Keys: Bad Ideas Encrypting entire database with a key –Accessing single record requires encrypting/decrypting entire database Far too time consuming for large database Exposes entire database to potential observation Encrypted database Encryption/ decryption Plaintext database Change to single record “I have you now!”

4 Record-based Encryption Different fields in database encrypted with different keys Allows different levels of security for different information NamePhoneCredit Card Fred Flintstone Barney Rubble ……… Low security: No encryption Moderate security: 192-bit 3DES key Changed every month High security: 256-bit AES key Changed every week

5 Applications and Encrypted Databases Most secure databases accessed by other applications as part of large-scale information system Applications must be able to rapidly access plaintext version of information in database Keys should not be accessible to unauthorized users application

6 Database Keys: Bad Ideas Embedding keys in applications that access database –Easy for adversary to extract key from application or hardware running application –Changing key requires changing all applications that access database Application “I have you now!”

7 Overall Database Architecture All encryption/decryption done by single cryptographic application on dedicated machine All keys stored securely in “key vault” on that dedicated machine (and never leave that machine!) Encrypted database application encrypted record field Cryptographic application Key vault record field

8 Database Record Encryption Bob enters new field value into application Application submits value + fieldname to cryptosystem Cryptosystem retrieves appropriate key for that field from key vault and encrypts value Cryptosystem returns encrypted value + receipt Application stores encrypted value + receipt in database application encrypted field value + receipt Cryptographic application Key vault new field value encrypted field value + receipt new field value

9 Encryption Receipts Might have many different keys used for encryption Receipt contains ID of key used to encrypt that value –Not actual key! –Can also contain other useful data, such as key expiration date Stored in database with encrypted value Used to determine which key to use for later decryption NamePhonePhone Receipt Credit CardCredit Card Receipt Fred Flintstoneskdf0234rnef2p32045/sdfgm29c845 Barney Rubble8h5rqw;ernq3p32Nc9343f3r,38c844 …………

10 Database Record Decryption Bob enters request for field value into application Application retrieves encrypted value + receipt from database Cryptosystem retrieves key with matching ID from key vault and decrypts value Cryptosystem returns decrypted value to application application encrypted field value + receipt Cryptographic application Key vault decrypted field value encrypted field value + receipt decrypted field value

11 Key Vault Security Keys encrypted in any non-volatile storage –Even if steal machine, cannot get to keys Key IDEncrypted Key ValueField … p32Up204thf2-05hphone c845Kdfg3[045taqrogn[39-45tsdcreditcard c846Vmp405h82[-35ut1-49uf12creditcard ………… “I can’t read these”

12 Master Keys Used to decrypt keys for use by cryptosystem –Neither master key nor decrypted key values in non-volatile memory Stored on separate secure system(s) Often broken into two parts for maximum security –Generate random “mask” K mask –XOR with actual master key K master to create stored key K stored –Keys K mask and K stored stored separately –Combined as K master = K stored  K mask when needed Cryptography application Key vault volatile memory K master  K mask K stored

13 Key Migration Database keys should have limited lifespan –Longer use  more data for known/chosen plaintext attacks –Rapid changes = less damage if key compromised Usual components: –Start: Date at which key can be used for encryption/decryption –Decommission: Date at which migration from this key begins Only used for decryption, not for encryption –Expiration: Date at which key no longer used Key ID…StartDecommissionExpiration p32…3/10/20154/10/20154/24/2015 c845…4/2/20154/9/20154/12/2015 c846…4/7/20154/12/20154/15/2015 ……………

14 Key Migration Only active keys are used for encryption As records accessed and run through cryptosystem, records decrypted with decommissioned key automatically re- encrypted with a different active key Can force migration of records not accessed –For all fields with receipt containing expired key –Decrypt/re-encrypt with cryptosystem c844 c845 active 4/2 migration 4/94/12 active 4/5 migration 4/124/15

15 Replacing Network Keys Easy to replace lost key in network transmission –Lose symmetric session key: Just resend with another –Lose private key in public key encryption: –Just generate another and post a new certificate E K s2 D E public (K S2, K PU ) P K s2 E D PE symmetric (P, K S ) “We’ll try again with K s2 ” new

16 Replacing Database Keys Database keys must be stored over long time –Lifetime of key(s) = lifetime of database –If lose keys, lose information in database!

17 Key Backup Must back up key vault regularly –At a minimum, each time new key is added to vault –Should keep multiple backups, paper and electronic Backups must only contain encrypted version of keys –Otherwise, keys vulnerable to observation –Must back up master keys separately –Can encrypt backup version with different keys stored separately Cryptographic application Key vault backup paper backup electronic backup