090902 Conference Presentation
Transcription
090902 Conference Presentation
TecSec®, Incorporated Protecting Information From Ancient Times To The Digital Age ©TecSec®, Incorporated 2008. All rights reserved. Session Objectives There are three primary objectives for this Session ©TecSec®, Incorporated 2008. All rights reserved. § Provide an historical overview of the need for Information Security § Establish the need for Information Security in the Digital Age § Explain how TecSec’s Constructive Key Management® (CKM®) Technology provides data confidentiality in a networked world Definitions § Plain text – Readable text § Cipher text – Data that has been encrypted. – Cipher text is unreadable until it has been converted into plain text (decrypted) with a key. § Cryptography – Creating and using secure codes § Cryptanalysis – Breaking other people's codes § Cryptology – The study of code, includes Cryptography and Cryptanalysis ©TecSec®, Incorporated 2008. All rights reserved. Where We’ve Been… ©TecSec®, Incorporated 2008. All rights reserved. Shared Secrets The need to control access to information can be traced backed to ancient times Secrets needed to be shared in a controlled manner ©TecSec®, Incorporated 2008. All rights reserved. The Eqyptians The Egyptians concealed information using hieroglyphics as far back as 3000 BC ©TecSec®, Incorporated 2008. All rights reserved. Steganography The science of sending concealed messages is known as "steganography", Greek for "concealed writing" ©TecSec®, Incorporated 2008. All rights reserved. § Persian Emperor Xerxes moved to attack Greece in 480 BC. The Greeks were warned by Demaratus, who was living in exile in Persia. Demaratus wrote a vital message on the wooden tablet itself and covered it with wax. § Other techniques included tatooing a message on the scalp of a messenger, letting his hair grow back, and then sending him on a journey. At the other end, the recipient shaved the messenger's hair off and read the message. Codes and Ciphers § If someone finds the hidden message, all its secrets are revealed. § That led to the idea of obscuring the message so that it could not be read even if it were intercepted, and the result was "cryptography", Greek for "hidden writing". § The result was the development of "codes", or secret languages, and "ciphers", or scrambled messages. ©TecSec®, Incorporated 2008. All rights reserved. The Spartans Spartans established the first system of military cryptography as early as the fifth century B.C. They employed a device called the 'skytale' which consists of a staff of wood around which a strip of papyrus or leather or parchment is wrapped close-packed. The secret message is written on the parchment down the length of the staff; the parchment is then unwound and sent on its way. ©TecSec®, Incorporated 2008. All rights reserved. The Romans Julius Caesar invented the first substitution cipher around 50 BC, which bears his name to this day. The substitution key is formed by cyclically displacing an alphabet with respect to itself. A plaintext message is enciphered by substituting for each letter the corresponding letter from the shifted alphabet.to produce cipher text. A cryptogram enciphered in this way can be deciphered by reversing the process and translating each cipher text letter into its plaintext equivalent. ©TecSec®, Incorporated 2008. All rights reserved. Caesar Substitution An example of a four character “Caesar-shift” for a 21 character alphabet is shown below: ©TecSec®, Incorporated 2008. All rights reserved. Monks, Scientists and Alchemists Ciphers were used by monks "for scribal amusement” Around the middle of the 13th century, the English monk Roger Bacon wrote "Concerning the Marvelous Power of Art and of Nature and Concerning the Nullity of Magic". He listed seven cipher methods and asserted that "a man is crazy who writes a secret in any other way than one which will conceal it from the vulgar". Scientists and alchemists used ciphers to protect their writings. ©TecSec®, Incorporated 2008. All rights reserved. Chaucer Geoffrey Chaucer used cryptography in his writings In The Equatorie of the Planetis, a supplement to his 1391 Treatise on the Astrolabe, Chaucer included six passages written in cipher. The cipher system consists of a substitution alphabet of symbols as shown below: Picture Copyright © President and Fellows of Harvard College ©TecSec®, Incorporated 2008. All rights reserved. The Venetians By the 15th and 16th centuries, ciphers had become extremely important for diplomatic purposes The art of frequency analysis had been reinvented in Europe. The first famous European codebreaker was Giovanni Soro, who was appointed as the Venetian cipher secretary in 1506. He acquired a great reputation for cracking ciphers for Venice, the Vatican, and other Italian city-states. ©TecSec®, Incorporated 2008. All rights reserved. Frequency Analysis Frequency analysis is a statistical method e: 12.7 t: 9.1 a: 8.2 o: 7.5 i: 7.0 n: 6.9 s: 6.3 h: 6.1 r: 6.0 d: 4.2 l: 4.0 c: 2.8 u: 2.8 m: 2.4 w: 2.4 f: 2.2 g: 2.0 y: 2.0 p: 1.9 b: 1.5 v: 1.0 k: 0.8 j: 0.2 x: 0.2 q: 0.1 z: 0.1 ©TecSec®, Incorporated 2008. All rights reserved. § In every language, some letters are used on the average more than others, and the percentages of characters in different languages tends to be constant. § For example, the "frequencies" of the different letters of the alphabet in English are shown. § Statistics could now be used to decrypt ciphers Leon Alberti Leon Alberti wrote about Cipher Disks around 1470 Leon Battista Alberti invented the cipher disk. Alberti dealt "especially with theories and processes of cipherment, methods of decipherment, and statistical data" Graphics source: www.mega.it ©TecSec®, Incorporated 2008. All rights reserved. Mary, Queen of Scots Mary, Queen of Scots was executed based on decrypted cipher that utilized “nulls” Picture source: www.royal-stuarts.org ©TecSec®, Incorporated 2008. All rights reserved. § Mary, Queen of Scots, was executed as directed by Queen Elizabeth I of England. § Mary was condemned on the basis of evidence obtained from enciphered messages cracked by Thomas Phelippes, in the employ of Elizabeth's Principal Secretary, Sir Francis Walsingham. § Phelippes was able to crack a cipher used by Mary and conspirators who wanted to place her on the English throne. Thomas Jefferson Thomas Jefferson wrote about a 26-disk Cipher Wheel in 1780 Jefferson expanded upon Alberti’s Cipher Disk. The disks on the Cipher Wheel can be rotated individually, making the associated key more complex than just shifting letters left or right. Picture source: www.Whitehouse.gov ©TecSec®, Incorporated 2008. All rights reserved. Thomas Jefferson – Cipher Wheel This enciphering and deciphering device was acquired from West Virginia by NSA in the early 1980s. It is thought to have been a model of the "Jefferson cipher wheel," so called because Thomas Jefferson described a similar device in his writings. Picture source: www.NSA.gov ©TecSec®, Incorporated 2008. All rights reserved. Native Americans Codetalkers were used in WWI and WWII • Lacking secure battlefield voice communications during the Great War, the Army employed Choctaws to encrypt voice communications, using their native language, itself encoded. • The Army studied the program even before war was declared in 1941, and during World War II employed Commanches, Choctaws, Kiowas, Winnebagos, Seminoles, Navajos, Hopis and Cherokees. • The Marine Corps took the Army work and codified, expanded, refined and perfected it into a true security discipline, using Navajos exclusively. ©TecSec®, Incorporated 2008. All rights reserved. Navajo Codetalkers in WWII § The Japanese, who were skilled code breakers, remained baffled by the Navajo language. § The Japanese chief of intelligence, Lieutenant General Seizo Arisue, said that while they were able to decipher the codes used by the U.S. Army and Army Air Corps, they never cracked the code used by the Marines. § Praise for their skill, speed and accuracy accrued throughout the war. At Iwo Jima, Major Howard Connor, 5th Marine Division signal officer, declared, "Were it not for the Navajos, the Marines would never have taken Iwo Jima." Connor had six Navajo code talkers working around the clock during the first two days of the battle. Those six sent and received over 800 messages, all without error. ©TecSec®, Incorporated 2008. All rights reserved. The Germans German Enigma Encryption/Decryption Machine used in WWII The German Enigma, as famous for its insecurities as for the security that it theoretically gave to German ciphers. It was broken, first by the Poles in the 1930s, then by the British in World War II. Americans furnished many of the resources to attack ever more complex versions of the Enigma, especially the naval Enigma. Information from the decrypted messages was used by the Allies to outmaneuver German armies. Picture and information source: www.NSA.gov ©TecSec®, Incorporated 2008. All rights reserved. The Digital Age and Cryptology § The development of the computer provided a very powerful tool to both break ciphers and generate them. § Computers could perform high-speed searches and statistical analyses of ciphertext and perform a set of scramblings on data that would be easy to implement as compared to rotors or electromechanical devices, and do it much more quickly and reliably. § In order to counter the computational capability of cryptoanalysts using computers, the encryption key was lengthed. ©TecSec®, Incorporated 2008. All rights reserved. The Migration from Text Data to Streaming Data § Data on a computer is generally stored as a file, which is electronically equivalent to paper files in a file cabinet § The data in the file is the form of a sequence of binary bits. – The digitized data can be text, sound, a picture, etc. – The data file does not represent a text message. § Traditional encryption schemes can be implemented with a computer program (For example, replicating Enigma machines) – It is much more useful to encrypt data files at the bit level. – For binary data, it is more appropriate to change the colloquial of plaintext and ciphertext to plaindata and cipherdata. § Rather than speaking of encrypting a data file, computer cryptographers speak of encrypting a data "stream". § Stream and Block ciphers were developed to address streaming data. ©TecSec®, Incorporated 2008. All rights reserved. Key Distribution Steam and Block Ciphers provide adequate security for on-line transactions. However…. § …how are the cryptographic keys distributed in a secure manner? § Key distribution is traditionally the weak link in cipher security – The British defeated the Enigma by stealing German codebooks § The open environment of the Internet makes the problem that much greater. – The Internet is an open environment, implying a certain "promiscuity" in handing out keys. ©TecSec®, Incorporated 2008. All rights reserved. "New Directions in Cryptography" - 1975 Diffie, Hellman, and Merkle published "New Directions in Cryptography" paper in 1975 § Explains the group’s key exchange scheme and the outline for the concept of public key cryptography. – Public Key ciphers consist of two keys, one that is "public", available to anyone, that can be used to encipher a message; and one that is "private", known only to one person, that can be used to decipher a message. § When the paper was published, they did not know whether Public Key could be done. ©TecSec®, Incorporated 2008. All rights reserved. RSA - 1977 Rivest, Shamir and Adleman developed Public Key Cipher in 1977 § Ron Rivest, Adi Shamir, and Ron Adleman named their public key cipher "RSA" after their initials. § Enables the use of public key cryptography to protect information. § Good for point-to-point and/or person-to-person communications ©TecSec®, Incorporated 2008. All rights reserved. The Digital Evolution The Digital Evolution began with Mainframes which evolved into Intranets and Extranets The network becomes the computer in a distributed computing environment ©TecSec®, Incorporated 2008. All rights reserved. Business Shift in the Digital Age § Paper processes migrate to electronic processes § Processes become more streamlined § Real time access to information – improved service to customers § Business is moving from “faceto-face” to faceless § Information is shared with entities vice persons The challenge is to control access to information based on “need-to-know” ©TecSec®, Incorporated 2008. All rights reserved. Summary Security concepts have stayed the same from Ancient Times to to the Digital Age… § Physical Security – Castles and Moats versus Buildings, Locks and Firewalls § Transportation Security – Guards versus SSL and VPNs …All of the models presented so far are point to point – person to person, here to there. ©TecSec®, Incorporated 2008. All rights reserved. Where We are Today… ©TecSec®, Incorporated 2008. All rights reserved. Interconnectivity The need for people and businesses to be connected has created complex and interconnected networks Internet We are a virtual point on the network ©TecSec®, Incorporated 2008. All rights reserved. A Networked World We live in a networked world of electronic information - The Internet makes connectivity ubiquitous § § § There are approximately 110 million Internet hosts on the World Wide Web – 5 years ago there were only 6.6 million There are 30 million domain names – 3 years ago there were 2 million It is estimated that 62% of all U.S. households are online* Who is on the net? Who has access to my data? Where is my data? Unable to tell. * Jeffrey Eisenach, Thomas Lenard, and Stephen McGonegal, The Digital Economay Fact Book (3rd edition, 2001), (Washington, D.C.; Progress and Freedom Foundation), 1-9. ©TecSec®, Incorporated 2008. All rights reserved. Risks in the Digital Age § Gross National Product (GNP): – “Information Warfare currently costs the United States an estimated $100-300 billion per year, and the financial impact on our economy increases every year.” * § Personal – Credit cards, credit reports, DMV, health records, insurance profiles, identity theft, etc. § Corporate – Intellectual Property, business strategies, account numbers, denial of service, etc. § Global – Economic sabotage through electronic means * Information Warfare, Winn Schwartau; © 1994, Winn Schwartau ©TecSec®, Incorporated 2008. All rights reserved. Business Challenges § The Business needs the ability to control access to information – Data in transit across networks can be compromised – Keeping track of the data and who accesses the data is difficult § Data at rest may be accessed by an unauthorized person who could use the information in a detrimental way – Laptops can be stolen – Over 50% of attacks come from “insiders” ©TecSec®, Incorporated 2008. All rights reserved. Challenges for Organizations § Increased work load - The retirement of baby boomers will dramatically increase workload, especially Healthcare – Processes will need to be automated in order to maintain quality of service § Service to the Citizen - Access to personal information and online services are expected – typically by citizens at home using the Internet § Compliance with Regulations – Health Insurance Portability and Accountability Act (HIPAA) of 1996 – Gramm Leach Bliley Act (GLBA) of 1999 – Government Paperwork Elimination Act (GPEA) ©TecSec®, Incorporated 2008. All rights reserved. The Information Security need in a Networked World “How does one protect selective electronic information that has been released without having a chance of knowing who may see it or come into possession of it downstream?” ©TecSec®, Incorporated 2008. All rights reserved. For Example 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Healthcare payment claims Enrollment and disenrollment in a health plan Eligibility transactions Healthcare payment and remittance advice Health plan premium payments Healthcare claim status Referral certification and authorization Provider inquiries Customer financial transactions Customer records and information Customer financial information and records Client information in the new m-Commerce world ©TecSec®, Incorporated 2008. All rights reserved. What is Constructive Key Management® (CKM®)? CKM Provides Data Confidentiality in a Networked World CKM is a technology and methodology that provides an organization with the ability to control access to data based on a user’s role, at the object level, using cryptography. ©TecSec®, Incorporated 2008. All rights reserved. CKM® Characteristics § Properties of CKM: – Key material is specific to roles - not specific to individuals – Addresses the one-to-many distribution problem of cryptography key management – Access privileges bound to data via cryptography – Built-in key recovery performed by system owner § What is CKM good for? – – – – Modeling Role-Based Access Control (RBAC) Enterprise information security Content-based security Complementing Public Key Infrastructure (PKI) ©TecSec®, Incorporated 2008. All rights reserved. CKM® System Architecture § System owner creates a CKM Domain – Credentials are created based on business process needs – Roles are mapped to Credentials § Members are enrolled into the system through a registration process – Members are assigned Roles – Token created for each Member – Token is distributed to each Member ©TecSec®, Incorporated 2008. All rights reserved. CKM® Roles and Credentials § Roles are established by function and responsibility § A Role is defined by a set of Credentials – Each Credential represents an attribute of the data described in the underlying information classification model (e.g. Project X, Software Engineer, Company Employee) § Individuals may perform multiple roles § Those performing the same role, and thus having the same Credential(s), share the same ability to access information ©TecSec®, Incorporated 2008. All rights reserved. The Quality Net Exchange Data Confidentiality Provided by CKM® § Secure Web Portal – Access to portal is through CKM Smart Token™ - Single Sign On – Portal content is based on user’s role(s) § CKM Smart Token™ stores PKI certificate and CKM credentials – PKI certificate is used for identity authentication and digital signature (when required) – CKM credential(s) are used for the following: • Data Confidentiality • Role-based authentication and access control • Persistent protection of sensitive data (Patient Healthcare Information) – on workstation, in transit over the Internet/Intranet and at rest in an Oracle database ©TecSec®, Incorporated 2008. All rights reserved. CKM® Status at CMS § Approved as Emerging Technology for QNet Exchange § Contract with OIS: – Develop Policy for CMS Programs. – Determine options on the implementation of CKM within the CMS enterprise architecture. – Meet with business areas to make them aware that CKM is available as a tool to help meet HIPAA and GPEA, improve processes, save money, etc. ©TecSec®, Incorporated 2008. All rights reserved. § Electronic State Plan Amendment submissions § Electronic Forms One Document, Different Access Levels Different sections of this document were encrypted with different Credentials… ABC, Inc. ABC, Inc. Financial Report -1Q01 …and sent over the Internet, Corporate Network, Intranet, Extranet or VPN Executive Information Financial Information General Information Financial Report -1Q01 Users holding the “CMSExec” Credential can see all the information This information is intended for the Executive Management Team 100 80 60 East 40 West 20 North 0 1st Qtr 2nd Qtr 3rd Qtr 4th Qtr This information is general information and is intended for all Members of CCE Domain ABC, Inc. ABC, Inc. Financial Report -1Q01 Financial Report -1Q01 Executive Information Financial Information Financial Information General Information General Information ABC, Inc. Financial Report -1Q01 Note: Users must identify and authenticate themselves to activate their Credentials ©TecSec®, Incorporated 2008. All rights reserved. Users holding the “OFM” Credential can see Financial & General information Users not holding any Credentials can only see the unencrypted information What does this mean to you? § You can be assured that sensitive data within QNet Exchange is protected § CKM enables the following: – – – – – – Data confidentiality Secure automation of business processes Role-based access control to information Control of access to information “downstream” Secure transmission of information over the Internet Information protection in transit and at rest ©TecSec®, Incorporated 2008. All rights reserved. Summary § Cryptography has been used throughout history to protect data from point to point – In today’s networked world, that is not enough § CKM provides data confidentiality in a networked world § CKM can be a key component of a HIPAA compliant information system ©TecSec®, Incorporated 2008. All rights reserved. In Closing…. “Never discourage anyone...who continually makes progress, no matter how slow” Plato ©TecSec®, Incorporated 2008. All rights reserved. (427 – 327 B.C.) Constructive Key Management® (CKM®) enables the enforcement of the rules and roles of business processes CKM Features Benefits Integrated enterprise information security and information management Access to information can be controlled, based on roles, in a distributed environment Administration is managed centrally, yet it can be controlled locally in a distributed manner Centralized management of policy with the ability to delegate authorities to business owners Role-Based Access Control (RBAC) through Cryptographically Enforced Access Management (CEAM™) Assignment of fine -grained access control, at the object level, for data and information Security adjudication performed on client Users can work disconnected; network performance is improved Fully scalable across the enterprise Remote management of tokens for millions of users across the enterprise Built-in cryptographic key recovery Key and data recovery (100%) is controlled solely by System Owner Supports x.509v3 digital certificates for PKI encryption, digital signature creation and verification Flexibility to choose which processes and digital certificates to use for Identification and Authentication (I&A) as well as non-repudiation Standards based technology CKM has been through the peer review of ANSI ©TecSec®, Incorporated 2008. All rights reserved. The HIPAA Security Rule (NPRM) and TecSec (1) * Security Requirement Access Control Implementation Description § Procedure for emergency access § At least one of the following features: – Context-based access – Role-based access – User-based access Audit Controls § Mechanisms to record & monitor system activity Authorization Control § At least one of the following features: Data Authentication § Provide corroboration that data has not been altered or destroyed in an unauthorized manner – Role-based access – User-based access TecSec Technology § 100% key recovery by system owner – who, what and when defined in procedure § RBAC enforced though cryptography § Integrates with PKI for User-Based access § Audit trails can be developed based on data access by User and/or Role § Access to data based on user’s Role § PKI certificate can be stored on CKM Smart Token™ § MAC is currently an option – and is the default for the next version of products § Supports the use of digital certificates * Based on the Draft Security Regulation * A message authentication code (MAC) is an authentication tag (also called a checksum) derived by applying an authentication scheme, together with a secret key, to a message. Unlike digital signatures, MACs are computed and verified with the same key, so that they can only be verified by the intended recipient. There are four types of MACs: (1) unconditionally secure, (2) hash function-based, (3) stream cipher-based, or (4) block cipher-based. ©TecSec®, Incorporated 2008. All rights reserved. The HIPAA Security Rule (NPRM) and TecSec (2) * Security Requirement Entity Authentication Implementation Description § Automatic logoff (Mandatory) § Unique user identification (Mandatory) § At least one of the following features: – Biometric – Password – PIN – Telephone callback – Token Communications/ Network Controls (If employed) § Integrity controls § Message authentication § At least one of the following: – Access controls – Encryption Network Controls (If employed) § Mandatory Controls – Alarm – Audit trail – Entity authentication – Event reporting Digital Signature (If employed) § Message integrity § Non-repudiation § User authentication * Based on the Draft Security Regulation ©TecSec®, Incorporated 2008. All rights reserved. TecSec Technology § Integrates with PKI § Can be integrated with Biometrics § Smart Token™ is password protected § CKM issues soft tokens – and can be integrated with hard tokens § Business owner controls access to data § Message can be MACed § Supports the use of digital certificates § Provides access control using encryption § CKM provides persistent protection of data at the object level. § See above. § CKM supports RSA and DSA and is compliant with the electronic signature law § The CKM Smart Token™ stores multiple x.509v3 certificates § Can be integrated with PKI