Presentation is loading. Please wait.

Presentation is loading. Please wait.

KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.

Similar presentations


Presentation on theme: "KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012."— Presentation transcript:

1 KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Saikat.saha@safenet-inc.com denis.pochuev@safenet-inc.com Feb 2012

2 2 Purpose of HSM (Hardware Security Module) - Hardware based Key Storage Device - Provides High Assurance:  CC EAL 4+  FIPS 140-2 Level 2 & 3 - Full Critical Crypto key Lifecycle Protection  Symmetric Keys  Asymmetric Keys  Certificates - Provides Crypto Acceleration and root of trust (trust anchor) - Available in Multiple Form Factors:  Network Appliance  PCI Express card  USB attacked module - NIST disapproves key material leaving the FIPS boundary HW based Creation HW enforced Key Policies HW based Usage HW based backup Storage HW based Deletion

3 3 General idea behind MDO keys  Core Server Functionality = Key Mgmt + Key Usage  Where does the key usage happen?  - at the server  - at the client (HSM case)  Cryptographic Objects = Key Material + Meta Data  If key usage can be restricted only to clients, why not keep the key material there and only transfer Meta Data? Application HSM Server Key material perimeter

4 4 Enterprise Key Management for HSMs EKM Centralized Key Management Remote sites handle only IT related activities Key Archive Backup/Archive Initialization Activation Audit Log KMIP Key Management Interoperability Protocol Allows for interoperability between 1.differing device types 2.devices from different vendors EKM Management Console 4 Application HSM EKM Client HSM EKM Client

5 5 Backup HSM and Key Archive HSM With Multiple Partitions Audit Log Key Secure Application + HSM with EKM Client Database + HSM with EKM Client Initialization Activation EKM Web Browser Centralized Administration of HSMs with EKM KMIP EKM Centrally see all keys created and used by HSM Stores and manages key attributes Centralized audit for compliance

6 6 KMIP commands and MDO keys  Supported KMIP Commands  Create  Create Key Pair  Register  Locate  Get  Get Attributes  Get Attribute List  Add Attribute  Modify Attribute  Delete Attribute  Destroy  Query  MDO KMIP Commands  Create  Create Key Pair  Register  Locate  Get  Get Attributes  Get Attribute List  Add Attribute  Modify Attribute  Delete Attribute  Destroy  Query

7 7 Registered Object Meta-Data Regular KMIP Request  Request Message (0x420078) | 0x01 | 0000000000 |  Request Header (0x420077) | 0x01 | …  Batch Item (0x42000f) | 0x01 | 0000000000 |  Operation (0x42005c) | 0x05 | 0x00000004 | 0x00000003  Unique Batch Item ID (0x420093) | 0x08 | 0x00000001 | 39  Request Payload (0x420079) | 0x01 | 0000000000 |  Object Type (0x420057) | 0x05 | 0x00000004 | 0x00000002  Template-Attribute (0x420091) | 0x01 | 0000000000 |  Attribute (0x420008) | 0x01 | 0000000000 |  Attribute Name (0x42000a) | 0x07 | 0x00000018 | Cryptographic Usage Mask  Attribute Value (0x42000b) | 0x02 | 0x00000004 | 0x00000007  Attribute (0x420008) | 0x01 | 0000000000 |  Attribute Name (0x42000a) | 0x07 | 0x00000004 | Name  Attribute Value (0x42000b) | 0x01 | 0000000000 |  Name Value (0x420055) | 0x07 | 0x00000005 | mykey  Name Type (0x420054) | 0x05 | 0x00000004 | 0x00000001  Symmetric Key (0x42008f) | 0x01 | 0000000000 |  Key Block (0x420040) | 0x01 | 0000000000 |  Key Format Type (0x420042) | 0x05 | 0x00000004 | 0x00000001  Key Value (0x420045) | 0x01 | 0000000000 |  Key Material (0x420043) | 0x08 | 0x00000010 | 01 23 45 67 89 ab cd ef 01 23 45 67…  Cryptographic Algorithm (0x420028) | 0x05 | 0x00000004 | 0x00000003  Cryptographic Length (0x42002a) | 0x02 | 0x00000004 | 0x00000080 KMIP Register operation in detail

8 8 Regular KMIP Request  Request Message (0x420078) | 0x01 | 0000000000 |  Request Header (0x420077) | 0x01 | …  Batch Item (0x42000f) | 0x01 | 0000000000 |  Operation (0x42005c) | 0x05 | 0x00000004 | 0x00000003  Unique Batch Item ID (0x420093) | 0x08 | 0x00000001 | 39  Request Payload (0x420079) | 0x01 | 0000000000 |  Object Type (0x420057) | 0x05 | 0x00000004 | 0x00000002  Template-Attribute (0x420091) | 0x01 | 0000000000 |  Attribute (0x420008) | 0x01 | 0000000000 |  Attribute Name (0x42000a) | 0x07 | 0x00000018 | Cryptographic Usage Mask  Attribute Value (0x42000b) | 0x02 | 0x00000004 | 0x00000007  Attribute (0x420008) | 0x01 | 0000000000 |  Attribute Name (0x42000a) | 0x07 | 0x00000004 | Name  Attribute Value (0x42000b) | 0x01 | 0000000000 |  Name Value (0x420055) | 0x07 | 0x00000005 | mykey  Name Type (0x420054) | 0x05 | 0x00000004 | 0x00000001  Symmetric Key (0x42008f) | 0x01 | 0000000000 |  Key Block (0x420040) | 0x01 | 0000000000 |  Key Format Type (0x420042) | 0x05 | 0x00000004 | 0x00000001  Key Value (0x420045) | 0x01 | 0000000000 |  Key Material (0x420043) | 0x08 | 0x00000010 | 01 23 45 67 89 ab cd ef 01 23 45 67…  Cryptographic Algorithm (0x420028) | 0x05 | 0x00000004 | 0x00000003  Cryptographic Length (0x42002a) | 0x02 | 0x00000004 | 0x00000080 KMIP Register operation in detail MDO KMIP Request  Request Message (0x420078) | 0x01 | 0x00000180 |  Request Header (0x420077) | 0x01 | …  Batch Item (0x42000f) | 0x01 | 0x00000128 | Re  Operation (0x42005c) | 0x05 | 0x00000004 | 0x00000003  Unique Batch Item ID (0x420093) | 0x08 | 0x00000001 | 30  Request Payload (0x420079) | 0x01 | 0x00000100 |  Object Type (0x420057) | 0x05 | 0x00000004 | 0x00000002  Template-Attribute (0x420091) | 0x01 | 0x000000e8 |  Attribute (0x420008) | 0x01 | 0x00000030 |  Attribute Name (0x42000a) | 0x07 | 0x00000017 | Cryptographic Algorithm  Attribute Value (0x42000b) | 0x05 | 0x00000004 | 0x00000003  Attribute (0x420008) | 0x01 | 0x00000030 |  Attribute Name (0x42000a) | 0x07 | 0x00000014 | Cryptographic Length  Attribute Value (0x42000b) | 0x02 | 0x00000004 | 0x00000080  Attribute (0x420008) | 0x01 | 0x00000030 |  Attribute Name (0x42000a) | 0x07 | 0x00000018 | Cryptographic Usage Mask  Attribute Value (0x42000b) | 0x02 | 0x00000004 | 0x00000007  Attribute (0x420008) | 0x01 | 0x00000038 |  Attribute Name (0x42000a) | 0x07 | 0x00000004 | Name  Attribute Value (0x42000b) | 0x01 | 0x00000020 |  Name Value (0x420055) | 0x07 | 0x00000005 | mykey  Name Type (0x420054) | 0x05 | 0x00000004 | 0x00000001

9 9 New key format  What happened to Key Format in previous request?  - Key Format is not a full-fledged attribute  - Absence of the object => custom key format  - Key Format is purely internal

10 10 KMIP Updates for MDO keys  Crypto Domain Parameters o Crypto parameters need to be a part of the Register command, not only Create Key Pair  ECC Enumeration o Need a broader set of supported curves

11 11 Questions?  Thank you.


Download ppt "KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012."

Similar presentations


Ads by Google