SlideShare a Scribd company logo
1 of 22
Learning to SKI Again: The Renaissance of
Symmetric Key Infrastructures
Burt Kaliski,
RSA, The Security Division of EMC,
02/06/07 – DEV-208
Learning to Ski … Again
• Around 1980, I first learned to ski downhill at the McIntyre Ski Area
in Manchester, NH
• Over 20 years later, I started skiing again with my family
• Skiing has changed a lot in two decades:
— Shaped skis offer easier turns
— Snowboards provide a single-board alternative
• Still, skiing is just as much fun
Symmetric Key Infrastructure
• A symmetric key infrastructure or SKI is a coordinated set of
components and services for managing symmetric keys
• Symmetric keys include:
— Data encryption and integrity-protection keys
— Key encryption keys
— Device authentication keys
Passwords can also be considered a type of symmetric key
• “Managing” includes full key lifecycle
Why Symmetric Key Management?
• As information becomes more valuable, data protection also grows
in importance
— Encryption “safe harbor” in breach notification legislation is a
significant driver
• But data is stored and processed in many different layers, locations
— Databases, files, disks, tapes, virtual images …
• Encrypting data is the (relatively) easy part
• Managing all the decryption keys is the hard part
• Symmetric keys are needed for many other purposes as well
Why SKI?
• Typical key management solutions are application-specific
• Enterprise IT managers need policy, auditing across the solutions
• Keys sometimes have to be shared among multiple applications
• A common key management infrastructure enables IT managers to
focus on policy, and applications to focus on security integration
— SKI = an infrastructure of key managers – not a single server
How valid are these points in your
deployments?
SKI Functions
• Application interface (illustrative):
— Get Key (keyID)  key, attributes
— Get Key (attributes)  key, keyID -- lookup, or generate as needed
— Set Key (keyID, attributes, key)
• Administrative operations
— Policy management
— Key lifecycle: create, distribute, archive, retrieve, revoke, destroy
• Built on a foundation of identity & access management
— A role for PKI within the SKI!
Uber versus Meta Key Managers
• Über key manager stores the keys for other key managers
• Meta key manager coordinates policies and placement
• Probably need some of each
Which fits better in your
organization or product?
SKI vs. PKI
• Similarities:
— Policy and lifecycle administration
— Application interfaces
•e.g., PKI GetKey (issuer / serial)  public key / certificate
•PKI SetKey ~= local generation + certificate registration
• Differences in key secrecy, availability:
— PKI public keys: Public, available to everyone
— PKI private keys: Secret, available to one principal
— SKI keys: Secret, available to a group of principals
•typically associated with one data classification
SKI over the Years
• Even before public-key encryption and PKI, there have always
been symmetric keys to manage …
• Data Encryption Standard published in 1976
• IBM’s work leading to Common Cryptographic Architecture dates
back to 1978
• X9.17 - Financial Institution Key Management (Wholesale),
introduced in 1985 for the banking industry.
• Kerberos, released in 1987, manages keys for user authentication
• Conditional access systems have long delivered symmetric keys
for cable and satellite TV
Towards a Renaissance
• In a sense, PKI has been the “dark ages” of SKI
• SKIs have continued, but have been out of focus for the last
decade
• Risks of renewal without reflection:
— Trying to use an existing SKI as is
— Trying to make a new SKI fit the PKI mold
— Forgetting about lessons learned from both SKI and PKI
• Better: Apply the experiences of three decades from both areas
How do you see the “SKI
renaissance” playing out?
Some Lessons to Consider
1. Key hierarchies reduce compromise risk.
• Master Key / Key Encrypting Key / Data Encrypting Key
• Lower-levels keys wrapped with (next) higher-level key
• Time- and context-limited keys
• PKI trust hierarchies are similar, but for certification, not secrecy
2. Key derivation gives more flexibility and reduces risk, without
additional key distribution.
• Key2 = KDF (Key1, parameters)
• Benefits: key separation; forward security; “subscription” models
• PKI counterparts: forward-secure signatures, ID-based encryption
Key Derivation: Example
• Verifier-specific keys for one-time password tokens:
— KTV = KDF (KT, IDV)
• Key manager stores token key KT, distributes KTV to verifier V
• Token stores KT, derives KTV given IDV
• Token can authenticate to verifier via KTV; verifiers don’t have to
share keys
• Another example: KB = KDF (KA, time) – parties can “subscribe” to
supply of keys for a given time interval (Micali ’94 for key escrow)
• Also: KB = KDF (KA, “next”) – KA remains secret if KB compromised
 forward security for non-repudiation
Some Lessons to Consider
3. Key wrapping is more than just encryption.
• AES-KeyWrap encrypts & integrity-protects key, and can associate
with attributes (usage, etc.)
• Various public-key encryption schemes also offer “associated data”
3. Keys are security objects, not just sensitive data.
• Encrypt at security module layer, not (only) application layer
• i.e., key wrapping and SSL
5. Key usage restrictions provide better control.
• Encryption vs. authentication vs. key transport vs. …
• MAC generation separate from verification, though same key
Some Lessons to Consider
6. Key classification should be driven by data classification and
policy. More than just encryption vs. signature.
7. Key access control should model “need to know”: more often
groups of applications than single principals.
8. Algorithm agility is essential.
• Not just DES and triple-DES anymore …
6. Trusted software execution can help provide assurances
required for security modules – as well as non-repudiation.
7. Side channel attacks continue to be a threat. Short-lived keys
are a valuable countermeasure.
Final Thought: What if There Were No PKI?
• More accurately: What if there were no PK encryption?
• Related question: What if PK encryption hadn’t been invented?
• Quantum computing makes this a realistic possibility over a 30-
year timeframe
Is anybody seriously thinking
about this?
Typical Cryptographic Security Services Today
User
Authentication
Passwords / OTPs + PKI encryption
PKI tokens
Encryption Symmetric algorithms
Non-Repudiation PKI signatures
Symmetric algorithms w/trusted verifier
Key
Establishment
(online case)
PKI encryption
Symmetric algorithms w/TTP
Key
Establishment
(offline case)
PKI encryption
The Picture without Today’s PK Encryption …
User
Authentication
--
--
Encryption Symmetric algorithms
Non-Repudiation --
Symmetric algorithms w/trusted verifier
Key
Establishment
(online case)
--
Symmetric algorithms w/TTP
Key
Establishment
(offline case)
--
Next, with a Renaissance of SKI
User
Authentication
Password/OTP + trusted client w/symmetric crypto
Symmetric crypto tokens
Encryption Symmetric algorithms
Non-Repudiation --
Symmetric algorithms w/trusted verifier
Key
Establishment
(online case)
--
Symmetric algorithms w/TTP
Key
Establishment
(offline case)
--
… and Some Other Technologies (Old & New)
User
Authentication
Password/OTP + trusted client w/symmetric crypto
Symmetric crypto tokens
Encryption Symmetric algorithms
Non-Repudiation Merkle hash signatures
Symmetric algorithms w/trusted verifier
Key
Establishment
(online case)
--
Symmetric algorithms w/TTP
Key
Establishment
(offline case)
Near-Field Communication
Conclusions
• Symmetric Key Infrastructures are seeing a renaissance, thanks to
increased interest in data protection
• PKI was perhaps the “dark ages” for SKI
• Lessons learned from SKI past as well as PKI present can be
applied to SKI future
Questions?
• Questions?
Contact Information
• Burt Kaliski
RSA Laboratories
burt@rsa.com
kaliski_burt@emc.com
http://www.rsasecurity.com/rsalabs

More Related Content

What's hot

Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMDiego Alberto Tamayo
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchainCeline George
 
XML Key Management Protocol for Secure Web Service
XML Key Management Protocol for Secure Web ServiceXML Key Management Protocol for Secure Web Service
XML Key Management Protocol for Secure Web ServiceMd. Hasan Basri (Angel)
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationGokul Alex
 
Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...
Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...
Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...Martin Chapman
 
03 - An introduction to hyperledger composer
03 - An introduction to hyperledger composer03 - An introduction to hyperledger composer
03 - An introduction to hyperledger composerMerlec Mpyana
 
Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...
Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...
Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...Identity Days
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in BlockchainEC-Council
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인StartupAlliance
 
blockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and ChallangesChetan Kumar S
 
Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchainsAdri Jovin
 
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionKeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionJAYAPRAKASH JPINFOTECH
 
Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Arnaud Le Hors
 
Blockchain On Azure
Blockchain On AzureBlockchain On Azure
Blockchain On AzureJohan Zammit
 
Hyper ledger febric
Hyper ledger febricHyper ledger febric
Hyper ledger febricRohit Verma
 
Security best practices for hyperledger fabric
Security best practices for hyperledger fabric Security best practices for hyperledger fabric
Security best practices for hyperledger fabric ManishKumarGiri2
 

What's hot (20)

Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
 
Blockchain Breakout Session Tech Coast Conference Jacksonville
Blockchain Breakout Session Tech Coast Conference JacksonvilleBlockchain Breakout Session Tech Coast Conference Jacksonville
Blockchain Breakout Session Tech Coast Conference Jacksonville
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
XML Key Management Protocol for Secure Web Service
XML Key Management Protocol for Secure Web ServiceXML Key Management Protocol for Secure Web Service
XML Key Management Protocol for Secure Web Service
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
 
Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...
Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...
Smart Home Inventory Management using a Private Blockchain and a Purchase Ord...
 
KISS API
KISS APIKISS API
KISS API
 
03 - An introduction to hyperledger composer
03 - An introduction to hyperledger composer03 - An introduction to hyperledger composer
03 - An introduction to hyperledger composer
 
Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...
Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...
Identity Days 2020 - Quelles sont les méthodes et le niveau de sécurisation/r...
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
 
blockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challanges
 
Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchains
 
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionKeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
 
Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508
 
Blockchain On Azure
Blockchain On AzureBlockchain On Azure
Blockchain On Azure
 
Hyper ledger febric
Hyper ledger febricHyper ledger febric
Hyper ledger febric
 
Security best practices for hyperledger fabric
Security best practices for hyperledger fabric Security best practices for hyperledger fabric
Security best practices for hyperledger fabric
 

Viewers also liked

Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Information Security Awareness Group
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
 
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Information Security Awareness Group
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
A Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy Andem
A Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy AndemA Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy Andem
A Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy AndemInformation Security Awareness Group
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 

Viewers also liked (14)

Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
 
Philippe Oechslin
Philippe OechslinPhilippe Oechslin
Philippe Oechslin
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
Xrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew HanushevskyXrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew Hanushevsky
 
Phil Zimmerman Netiva Caftori Pgp
Phil Zimmerman  Netiva Caftori PgpPhil Zimmerman  Netiva Caftori Pgp
Phil Zimmerman Netiva Caftori Pgp
 
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
A Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy Andem
A Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy AndemA Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy Andem
A Cryptanalysis of the Tiny Encryption Algorithm Vikram Reddy Andem
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 

Similar to Burt Kaliski RSA conference 2007

Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iPrecisely
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22WesComer2
 
EC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIEC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIParnashreeSaha
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docxdurantheseldine
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2Alfred Ouyang
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
7.1. SDLC try me to implenment
7.1. SDLC try me to implenment7.1. SDLC try me to implenment
7.1. SDLC try me to implenmentdefconmoscow
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Diego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMDiego Alberto Tamayo
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Codit
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultTom Kerkhove
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitToni de la Fuente
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
 

Similar to Burt Kaliski RSA conference 2007 (20)

Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22Indianapolis Splunk User Group Dec 22
Indianapolis Splunk User Group Dec 22
 
EC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIEC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKI
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
7.1. SDLC try me to implenment
7.1. SDLC try me to implenment7.1. SDLC try me to implenment
7.1. SDLC try me to implenment
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 

More from Information Security Awareness Group

Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Information Security Awareness Group
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...Information Security Awareness Group
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Information Security Awareness Group
 
Digital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun Li
Digital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun LiDigital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun Li
Digital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun LiInformation Security Awareness Group
 

More from Information Security Awareness Group (20)

IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Big data analysis concepts and references
Big data analysis concepts and referencesBig data analysis concepts and references
Big data analysis concepts and references
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
PKI by Gene Itkis
PKI by Gene ItkisPKI by Gene Itkis
PKI by Gene Itkis
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
THE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth PordesTHE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth Pordes
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Security Open Science Grid Doug Olson
Security Open Science Grid Doug OlsonSecurity Open Science Grid Doug Olson
Security Open Science Grid Doug Olson
 
Open Science Group Security Kevin Hill
Open Science Group Security Kevin HillOpen Science Group Security Kevin Hill
Open Science Group Security Kevin Hill
 
Privilege Project Vikram Andem
Privilege Project Vikram AndemPrivilege Project Vikram Andem
Privilege Project Vikram Andem
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
Cache based side_channel_attacks Anestis Bechtsoudis
Cache based side_channel_attacks Anestis BechtsoudisCache based side_channel_attacks Anestis Bechtsoudis
Cache based side_channel_attacks Anestis Bechtsoudis
 
Rakesh kumar srirangam
Rakesh kumar srirangamRakesh kumar srirangam
Rakesh kumar srirangam
 
Digital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun Li
Digital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun LiDigital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun Li
Digital Signature Algorithm Der-Chyuan Lou, Jiang Lung Liu, Chang-Tsun Li
 
Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis
Proxy cryptography Anca-Andreea Ivan , Yevgeniy DodisProxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis
Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis
 
Quan nguyen symmetric versus asymmetric cryptography
Quan nguyen   symmetric versus asymmetric cryptographyQuan nguyen   symmetric versus asymmetric cryptography
Quan nguyen symmetric versus asymmetric cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Burt Kaliski RSA conference 2007

  • 1. Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures Burt Kaliski, RSA, The Security Division of EMC, 02/06/07 – DEV-208
  • 2. Learning to Ski … Again • Around 1980, I first learned to ski downhill at the McIntyre Ski Area in Manchester, NH • Over 20 years later, I started skiing again with my family • Skiing has changed a lot in two decades: — Shaped skis offer easier turns — Snowboards provide a single-board alternative • Still, skiing is just as much fun
  • 3. Symmetric Key Infrastructure • A symmetric key infrastructure or SKI is a coordinated set of components and services for managing symmetric keys • Symmetric keys include: — Data encryption and integrity-protection keys — Key encryption keys — Device authentication keys Passwords can also be considered a type of symmetric key • “Managing” includes full key lifecycle
  • 4. Why Symmetric Key Management? • As information becomes more valuable, data protection also grows in importance — Encryption “safe harbor” in breach notification legislation is a significant driver • But data is stored and processed in many different layers, locations — Databases, files, disks, tapes, virtual images … • Encrypting data is the (relatively) easy part • Managing all the decryption keys is the hard part • Symmetric keys are needed for many other purposes as well
  • 5. Why SKI? • Typical key management solutions are application-specific • Enterprise IT managers need policy, auditing across the solutions • Keys sometimes have to be shared among multiple applications • A common key management infrastructure enables IT managers to focus on policy, and applications to focus on security integration — SKI = an infrastructure of key managers – not a single server How valid are these points in your deployments?
  • 6. SKI Functions • Application interface (illustrative): — Get Key (keyID)  key, attributes — Get Key (attributes)  key, keyID -- lookup, or generate as needed — Set Key (keyID, attributes, key) • Administrative operations — Policy management — Key lifecycle: create, distribute, archive, retrieve, revoke, destroy • Built on a foundation of identity & access management — A role for PKI within the SKI!
  • 7. Uber versus Meta Key Managers • Über key manager stores the keys for other key managers • Meta key manager coordinates policies and placement • Probably need some of each Which fits better in your organization or product?
  • 8. SKI vs. PKI • Similarities: — Policy and lifecycle administration — Application interfaces •e.g., PKI GetKey (issuer / serial)  public key / certificate •PKI SetKey ~= local generation + certificate registration • Differences in key secrecy, availability: — PKI public keys: Public, available to everyone — PKI private keys: Secret, available to one principal — SKI keys: Secret, available to a group of principals •typically associated with one data classification
  • 9. SKI over the Years • Even before public-key encryption and PKI, there have always been symmetric keys to manage … • Data Encryption Standard published in 1976 • IBM’s work leading to Common Cryptographic Architecture dates back to 1978 • X9.17 - Financial Institution Key Management (Wholesale), introduced in 1985 for the banking industry. • Kerberos, released in 1987, manages keys for user authentication • Conditional access systems have long delivered symmetric keys for cable and satellite TV
  • 10. Towards a Renaissance • In a sense, PKI has been the “dark ages” of SKI • SKIs have continued, but have been out of focus for the last decade • Risks of renewal without reflection: — Trying to use an existing SKI as is — Trying to make a new SKI fit the PKI mold — Forgetting about lessons learned from both SKI and PKI • Better: Apply the experiences of three decades from both areas How do you see the “SKI renaissance” playing out?
  • 11. Some Lessons to Consider 1. Key hierarchies reduce compromise risk. • Master Key / Key Encrypting Key / Data Encrypting Key • Lower-levels keys wrapped with (next) higher-level key • Time- and context-limited keys • PKI trust hierarchies are similar, but for certification, not secrecy 2. Key derivation gives more flexibility and reduces risk, without additional key distribution. • Key2 = KDF (Key1, parameters) • Benefits: key separation; forward security; “subscription” models • PKI counterparts: forward-secure signatures, ID-based encryption
  • 12. Key Derivation: Example • Verifier-specific keys for one-time password tokens: — KTV = KDF (KT, IDV) • Key manager stores token key KT, distributes KTV to verifier V • Token stores KT, derives KTV given IDV • Token can authenticate to verifier via KTV; verifiers don’t have to share keys • Another example: KB = KDF (KA, time) – parties can “subscribe” to supply of keys for a given time interval (Micali ’94 for key escrow) • Also: KB = KDF (KA, “next”) – KA remains secret if KB compromised  forward security for non-repudiation
  • 13. Some Lessons to Consider 3. Key wrapping is more than just encryption. • AES-KeyWrap encrypts & integrity-protects key, and can associate with attributes (usage, etc.) • Various public-key encryption schemes also offer “associated data” 3. Keys are security objects, not just sensitive data. • Encrypt at security module layer, not (only) application layer • i.e., key wrapping and SSL 5. Key usage restrictions provide better control. • Encryption vs. authentication vs. key transport vs. … • MAC generation separate from verification, though same key
  • 14. Some Lessons to Consider 6. Key classification should be driven by data classification and policy. More than just encryption vs. signature. 7. Key access control should model “need to know”: more often groups of applications than single principals. 8. Algorithm agility is essential. • Not just DES and triple-DES anymore … 6. Trusted software execution can help provide assurances required for security modules – as well as non-repudiation. 7. Side channel attacks continue to be a threat. Short-lived keys are a valuable countermeasure.
  • 15. Final Thought: What if There Were No PKI? • More accurately: What if there were no PK encryption? • Related question: What if PK encryption hadn’t been invented? • Quantum computing makes this a realistic possibility over a 30- year timeframe Is anybody seriously thinking about this?
  • 16. Typical Cryptographic Security Services Today User Authentication Passwords / OTPs + PKI encryption PKI tokens Encryption Symmetric algorithms Non-Repudiation PKI signatures Symmetric algorithms w/trusted verifier Key Establishment (online case) PKI encryption Symmetric algorithms w/TTP Key Establishment (offline case) PKI encryption
  • 17. The Picture without Today’s PK Encryption … User Authentication -- -- Encryption Symmetric algorithms Non-Repudiation -- Symmetric algorithms w/trusted verifier Key Establishment (online case) -- Symmetric algorithms w/TTP Key Establishment (offline case) --
  • 18. Next, with a Renaissance of SKI User Authentication Password/OTP + trusted client w/symmetric crypto Symmetric crypto tokens Encryption Symmetric algorithms Non-Repudiation -- Symmetric algorithms w/trusted verifier Key Establishment (online case) -- Symmetric algorithms w/TTP Key Establishment (offline case) --
  • 19. … and Some Other Technologies (Old & New) User Authentication Password/OTP + trusted client w/symmetric crypto Symmetric crypto tokens Encryption Symmetric algorithms Non-Repudiation Merkle hash signatures Symmetric algorithms w/trusted verifier Key Establishment (online case) -- Symmetric algorithms w/TTP Key Establishment (offline case) Near-Field Communication
  • 20. Conclusions • Symmetric Key Infrastructures are seeing a renaissance, thanks to increased interest in data protection • PKI was perhaps the “dark ages” for SKI • Lessons learned from SKI past as well as PKI present can be applied to SKI future
  • 22. Contact Information • Burt Kaliski RSA Laboratories burt@rsa.com kaliski_burt@emc.com http://www.rsasecurity.com/rsalabs

Editor's Notes

  1. Branstad-Smid developed Key Notarization Facility for NBS, c. 1983 X9.17 defines: Triple-DES Three-level symmetric key hierarchy (master, key-encrypting, data)
  2. Key derivation needs more explicit support in key management infrastructure, e.g., a way of recording the associations between derived keys and other keys so that it’s not necessary to do a lookup
  3. PKI assumes certificates, i.e., a signature algorithm, for identity and attribute management
  4. PKI assumes certificates, i.e., a signature algorithm, for identity and attribute management
  5. PKI assumes certificates, i.e., a signature algorithm, for identity and attribute management
  6. PKI assumes certificates, i.e., a signature algorithm, for identity and attribute management