360 likes | 377 Views
Explore security concerns, techniques, and methodologies to safeguard B2B commerce. Understand encryption, access control, and key management for secure transactions.
E N D
Security for B2B Commerce A Review of Security Concerns, Techniques and Methodologies <Bills_Info> <Name>Bill Cafiero</Name> <Phone>972-231-2180</Phone> <e-mail>jcaf@airmail.net</e-mail> </Bills_Info>
Honeywell intends to use the Internet to cut costs by $500M-$1B no later than 2005. Chairman Lawrence Bossidy The Internet is going to be about a lot more than the ability to call up stock quotes. It will really explode for us when broadband arrives.Disney CEO Michael Eisner Évery dealer in this country has about 70 days of supply. In simple truth, there's tremendous waste in that.GM CEO Jack Smith As highlighted in the now-famous destroyyourbusiness.com speech, old-line companies have to think in radically new ways. GE Chief Jack Welch Dot-Com is fast becoming DOW-Com
Access points become International Partners Can Now Collaborate You’ll have access to your partners (and they’ll have access to you) Employees can work from home, at night, over the weekends, and on holiday Application servers can support entire divisions Every internal modem is now a gateway into a network of networks Strengths Become Weaknesses
A New Focus Is Needed Yesterday Today External focus Internal focus Suppliers, customers, and prospects all need some form of access Access is granted to employees only Distributed assets Centralized assets Applications and data are distributed across servers, locations, and business units Applications and data are centralized in fortified IT bunkers Generate revenue Prevent losses The goal of security is to protect against confidentiality breaches The goal of security is to enable eCommerce IT control Business control Security manager decides who gets access Business units want the authority to grant access Source: Forrester Research, Inc.
Electronic Business Is a Priority “Time to market” will always win over security if you are not careful Dynamic Networks and Security Confusion Who owns security? Who knows about new projects, new networks, new connections? Limited Security Resources and Expertise Security administrators in California earn an unburdened average of $73,863 (SANS 2000 salary survey) Average turnover is 24 months. Security Management Is Too Complex But there are security challenges
Credit Card Data We can only guess what this breach cost Egghead in terms of downtime, audit, negative PR, and lost business. Sources inside the credit-card industry told ZDNet News that Egghead may warn up to 3.7 million credit-cards holders that their card numbers had been stolen.
New technology is cool, but hardly ever secure Clay Shirky, a well-known open source pundit and partner with New York investment firm Accelerator Group, is thrilled by all this network openness. "I'm not worried about security, because security and convenience are always a tradeoff," he explains. "We walked around the Financial District with a laptop and an antenna, and we could pick up about six networks per block," says Matt Peterson, a network engineer
Consequences • Lack of consumer confidence • Exposure to Legal Liability • Decreased Stockholder Equity • Damaged Image - 30 Seconds on CNN • Decreased Employee Productivity • Loss of Intellectual Property & Assets
The Issues • The rest of this presentation deals with message security: • What are our security needs? • Just how do cryptographic security techniques work? • In other words - a primer on authentication, encryption, digital signatures and key management
What are the Security Needs? Alice and Bob are planning a merger Now I have the details on the merger Confidentiality
What are the Security Needs? I will convince Bob that I am Alice Authentication
What are the Security Needs? I’ll just change this a bit. Bob will never notice Integrity
What are the Security Needs? You can’t deny your role in this transaction Bob Neither can you Alice Non-repudiation
Basics of Encryption qazws ed ty xedcr dcrfv ui rgbth thn olputui n loijg frt ugd iopyt nuytrbyi This is plain text. It can be read by anyone. Encrypt Decrypt This is plain text. It can be read by anyone. PlainText CipherText PlainText • Encryption satisfies two of our needs: • Confidentiality - Original data is completely private • Integrity - Data has not been altered • Plus encryption provides an additional feature: • Access Control - Only those who have the right keys can decrypt the CipherText
Encryption • There are two types of algorithms • Symmetric (or Private Key) algorithms • Asymmetric (or Public Key) algorithms Both types of algorithms have advantages and disadvantages
Private Key Encryption Shared Key Encrypt Decrypt PlainText PlainText CipherText • Symmetric Encryption • Ex: Data Encryption Standard (DES)
Public Key Encryption Bob’s Public Key Bob’s Private Key Encrypt Decrypt PlainText PlainText CipherText • Asymmetric Key Encryption • Ex: Rivest Shamir Adleman (RSA)
Public Key Encryption • Bob’s Private Key • Kept secret and secure by Bob • Used by Bob to decrypt messages from others; or… • Used by Bob to generate his digital signature • Bob’s Public Key • Made publicly available to others • Used by others to encrypt message for Bob; or… • Used by others to verify Bob’s digital signature Knowing the public key, it is not possible to deduce the private key
Basics of Digital Signature This is plain text. It can be read by anyone. This is plain text. It can be read by anyone. Sign Verify tybs58bdn6 PlainText Signed PlainText • Digital Signatures satisfy the last two needs: • Authentication - The originator’s signature is on the file • Non-repudiation - The originator cannot deny signing the file
How a Digital Signature Works Alice’s Signing Process Bob’s Verification Process Calculate fresh hash This is plain text. It can be read by anyone. This is plain text. It can be read by anyone. Calculate hash nh9ft4mjae tybs58bdn6 tybs58bdn6 nh9ft4mjae tybs58bdn6 Encrypt hash with Alice’s private key Decrypt original hash with Alice’s public key = ? This is plain text. It can be read by anyone. tybs58bdn6 tybs58bdn6 Compare decrypted hash with fresh hash Signed PlainText nh9ft4mjae
Putting it All Together Decrypt and Verify Encrypt and Sign qazws ed ty xedcr dcrfv ui rgbth thn olputui n loijg frt ugd iopyt nuytrbyi This is plain text. It can be read by anyone. This is plain text. It can be read by anyone. tybs58bdn6 PlainText PlainText Signed CipherText Verify Hash • Confidentiality • Authentication • Integrity • Non-repudiation • and • Access control Are we done yet?
Another Issue I’ll just substitute my public key for what Alice thinks is Bob’s public key Interloper’s Private Key Decrypt Alter Interloper uses Bob’s Public Key Interloper’s Public Key Masquerading as Bob’s Public Key Encrypt CipherText Bob’s Private Key Encrypt Decrypt PlainText PlainText It’s a valid message from Alice Public Key Substitution Risk
Bob Certificate Issuance • Binds a key to its owner • Digitally signed by a “certification authority” • Guarantees integrity • Authenticates the owner • Prevents masquerading • Establishes trust • An electronic version of a “notary public”
Key Expiry and Update • Public key expiry date defined in certificate • Set by security officer • Key update • Automatic • Transparent • Different rules for encryption and digital signature key pairs • Key histories • Easily decrypt data protected with “old” keys
Third Party Trust Certification Authority Trust Trust Trust Bob Alice Third Party Trust
Cross Certification Certification Authority Certification Authority Cross Certify Trust Trust Trust Trust Trust Trust Alice Bob Carol Ted
The Real Issues • Cryptographic algorithms are not the problem • The problems are: • Large scale key management • Establishing and maintaining third party trust • Corporate control of information • Making cryptography accessible to everyone, across applications • Security has to be easy to use Key management issues...
Key Management • The most difficult security problem • Generating keys • Keeping backup keys • Delivering keys • Dealing with compromised keys • Changing keys • Destroying old keys The Public Key advantage
Bob Bob Key Management Lifecycle Key Generation Certificate Issuance Key Usage Key Expiry Key Update
Summary • Five key security requirements • Confidentiality - Encryption • Integrity - Encryption • Authentication - Digital signature • Non-repudiation - Digital signature • Access Control - Encryption • Two types of algorithms • Private Key - Symmetric • Public Key - Asymmetric • Importance of key management • Certification of public keys Make security easy to use and implement it across all of your important applications