security by design

24

Upload: samara

Post on 23-Jan-2016

74 views

Category:

Documents


2 download

DESCRIPTION

Security By Design. Scott A. Vanstone V.P. Cryptographic Research Research in Motion Distinguished Professor Emeritus University of Waterloo. Security by Design. When designing a new telecommunications system it is prudent to make security a fundamental part of the design process. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security By Design
Page 2: Security By Design

Security By Design

Scott A. VanstoneV.P. Cryptographic Research

Research in MotionDistinguished Professor Emeritus

University of Waterloo

Page 3: Security By Design

Security by Design

When designing a new telecommunications system it is prudent to make security a fundamental part of the design process.

Geneva, 6-7 December 2010 3Addressing security challenges on a global scale

Page 4: Security By Design

What is Cryptography?

• Cryptography is the study of mathematical techniques related to aspects of information security such as:

– confidentiality– data integrity– entity authentication – data origin authentication

Geneva, 6-7 December 2010 4Addressing security challenges on a global scale

Page 5: Security By Design

What is Cryptography (2)

• Cryptography plays a fundamental role in securing information based systems.

• Often cryptography (and security in general) is an afterthought and as such it is bolted on after the overall system has been completed.

Geneva, 6-7 December 2010 5Addressing security challenges on a global scale

Page 6: Security By Design

Think of the Postal Analogue

• You put a letter in an envelope to maintain the integrity of the information in the letter and keep the letter from prying eyes (integrity and encryption).

• You put your address in the upper left corner of the envelope to authenticate the sender which is you (authentication).

• You sign the letter so that at a later date you cannot say you did not send it.

6Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 7: Security By Design

The Digital World

• We want to mimic all of these services but electronically.

• This has been done and done more securely and efficiently than postal mail.

• It is all due to the advent of something called “public-key cryptography”.

• Canada is and continues to be a leader in this field.

7Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 8: Security By Design

Symmetric-Key Cryptography

• Communicating parties a priori share secret information.

8Addressing security challenges on a global scale Geneva, 6-7 December 2010

secure channel

Eve

Alice Bobunsecured channel

Page 9: Security By Design

Public-Key Cryptography

• Communicating parties a priori share authentic information.

9Addressing security challenges on a global scale Geneva, 6-7 December 2010

authentic channel

Eve

Alice Bobunsecured channel

Page 10: Security By Design

Symmetric-Key vs Public-Key

• Symmetric-Key has been used for thousands of years.

• Public-Key is relatively new dating from 1976.

• Public-key cryptography is based on hard mathematical problems.

10Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 11: Security By Design

Why Symmetric-Key?

• Typically very fast for bulk encryption (confidentiality).

• The Advanced Encryption Standard (AES) is well accepted as a superior algorithm for symmetric-key.

11Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 12: Security By Design

Disadvantages of Symmetric Key

• Key management can be a serious problem.

• Non-repudiation (digital signature) is very difficult to realize.

12Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 13: Security By Design

Why Public-Key?

• One disadvantage of symmetric-key cryptography is key management.

• Public-Key provides an efficient method to distribute keys.

• Public-key offers a very efficient way to provide non-repudiation. This is one of the great strengths of public-key.

13Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 14: Security By Design

Disadvantages of Public-Key

• Public-key operations require intense mathematical calculations.

• They can be thousands of times slower to encrypt data than a well designed symmetric-key scheme.

14Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 15: Security By Design

Hybrid Schemes

• Use symmetric-key schemes to do bulk encryption.

• Use public-key techniques to pass keys so that key management is not a problem.

15Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 16: Security By Design

Digital Signatures

• One of the truly great technologies that public-key cryptography can provide.

• Handwritten signatures are fixed to the message but not an integral part of the message.

• Digital signatures combine the message and private information of the signer.

16Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 17: Security By Design

Why Elliptic Curve Cryptography (ECC)?

• Most security per bit of any known public-key scheme

• Ideally suited to constrained environments– Computationally efficient– Bandwidth efficient– Battery efficient

• Well studied• Standardized in relevant influential

international standards17Addressing security challenges on a global scale Geneva, 6-7 December 2010

Page 18: Security By Design

Elliptic Curve: y2=x3+ax+b

18Addressing security challenges on a global scale Geneva, 6-7 December 2010

y y x x

y y

x x

1 1

2 1

2 1

slope

( )

Page 19: Security By Design

Suite B

Purpose Algorithm Unclassified Classified

Encryption AES 128 bit key 256 bit key

Signatures ECDSA 256 bit curve 384 bit curve

Key Exchange ECDH or ECMQV 256 bit curve 384 bit curve

Hashing SHA SHA-256 SHA-384

19

Page 20: Security By Design

Suite E for Embedded Systems

Purpose Algorithm Unclassified

Encryption AES 128 bit key

Signatures ECDSA 283 bit curve

Key Exchange ECDH or ECMQV 283 bit curve

Hashing SHA SHA-256

Geneva, 6-7 December 2010 20Addressing security challenges on a global scale

Page 21: Security By Design

Examples of Security by Design

• XM Radio

• Blackberry

Geneva, 6-7 December 2010 21Addressing security challenges on a global scale

Page 22: Security By Design

XM Radio

• XM Radio delivers digital radio to most of North America.

• XM approached Certicom in the late 90s to design security into the system from the ground up.

Geneva, 6-7 December 2010 22Addressing security challenges on a global scale

Page 23: Security By Design

BlackBerry

• RIM built security in from the beginning.

• Suite B was running on the device even before the NSA endorsement in 2003.

Geneva, 6-7 December 2010 23Addressing security challenges on a global scale

Page 24: Security By Design

Conclusion

• There is good security available.

• The simple but often forgotten message is:– Design security into the system from the

beginning.– Think the design through careful so that you meet

your objectives.

Geneva, 6-7 December 2010 24Addressing security challenges on a global scale