260 likes | 513 Views
Internet Security and Authentication Issues. (for a Machine with a Fruit on the Front) Rodney Thayer. Topics. What’s the question? Security Applications Platform Dreams Security Considerations. What’s the Question?. Security and Authentication. Features required for applications
E N D
Internet Security and Authentication Issues (for a Machine with a Fruit on the Front) Rodney Thayer
Topics • What’s the question? • Security Applications • Platform Dreams • Security Considerations Security/Auth for Mac's
What’s the Question? Security/Auth for Mac's
Security and Authentication • Features required for applications • Features required for users • No bone-implant computing devices, yet • Opportunites for Mac applications • Real world requirements Security/Auth for Mac's
Security Applications Security/Auth for Mac's
Applications • Secure Web path • VPN Client • Secure Email • Secure client applications (e.g. router manager) • Credit Cards • Payment technologies • Identification schemes Security/Auth for Mac's
Why Security or Authentication? • Money • Intellectual Property • Regulation • Privacy • Insurance • Property Protection Security/Auth for Mac's
What’s Mac Specific? • Opportunity to exploit capabilities • Application set (e.g. multimedia) • Platform design opportunities • Other platforms suck, Macs could suck less Security/Auth for Mac's
Secure Web Applications • Browsers, Java applications, Custom applications • Bulk encryption of data link • Authentication of end entities • Browser protocols using legacy SSL or TLS or beyond • light performance load Security/Auth for Mac's
VPN Applications • Remote access to work group network • Road Warriors • Telecommuting • Wireless Networks • IPsec/SSH/Other Tunnels • Authentication and Bulk encryption • light to heavy performance load Security/Auth for Mac's
Secure Email • Signed and/or Encrypted email among users and entities • Various standards, some even work ;-) • We wish we had authentication • authentication and limited bulk encryption • light to medium load Security/Auth for Mac's
Media Applications • Post-Napster post-Superbowl audio/video • Payment applications • If encrypting, high performance load • Heavy performance load Security/Auth for Mac's
Secure Client/Server • Applications that are security-aware • Network Management • Hard core commerce applications • all sorts of performance requirements Security/Auth for Mac's
Platform Dreams Security/Auth for Mac's
What do you want to encrypt today? • Any data I have • At any speed • Securely • Easily, from any application • Standards-based • Provided by vendor(?) Security/Auth for Mac's
User Requirements • Zero extra blobs to carry • Practically interface to single package • No extra power requirements • No cost increase • Common interface • No extra steps (e.g. mouse wiggling) Security/Auth for Mac's
Application Requirements • Access to authentication protocols • Access to encryption protocols • Token capabilities (key rings) • Hardware encryption capability • Secure memory • Two-factor capability (fingerprint, retinal, etc. Security/Auth for Mac's
Crypto Requirements • Public key cryptography (RSA, EC, DSA) • Large keys -- 1024/2048/etc. • Symmentric Ciphers (3DES, AES) • Hardware tokens • Zeroization capability • Physical/Electrical security Security/Auth for Mac's
What about the Mac? • Opportunities to design in features • Token access • Hardware crypto • Entropy Generation • Biometric devices • Suck Less Security/Auth for Mac's
Security Considerations Security/Auth for Mac's
Issues • Crypto Issues • Non-crypto issues • Human factors • Packaging Security/Auth for Mac's
Crypto Issues • Parameters: key size, etc. • Design choices of algorithms -- licensing, embedded software issues • Installed base intertia • Human error Security/Auth for Mac's
Non-crypto issues • Many security failures are not the crypto • Protocol implementation issues • User Interface issues • New implementations->bugs • Additional hardware and software needed Security/Auth for Mac's
Human factors • Trouble getting people to do extra work • Entropy generation is hard • pass phrases can be forgotten • stigma issues • fear issues Security/Auth for Mac's
Threat Issues • Fancy screens -- information leakage • Fancy plastic -- case hacking • Risk of using hardware tokens • Misuse of hardware acceleration • Wide use -- better target Security/Auth for Mac's
Rodney Thayer rodney@tillerman.to Presentation is at: http://www.pkiclue.com/presentations Security/Auth for Mac's