SlideShare a Scribd company logo
1 of 67
Copyright © 2010 Daniel D. Houser
Insert presenter logo
here on slide master
Crypto in the real world
…. Or how to scare an it auditor
Dan Houser, CISSP-ISSAP CISA CISM CGEIT
Member, (ISC)² Board of Directors
Security & Identity Architect, Cardinal
Health
Session ID: AND-206
Copyright © 2010 Daniel D. Houser
•
Cardinal Health, Inc. is a Fortune 17 company that
improves the cost-effectiveness of health care. As the
business behind health care, Cardinal Health helps
pharmacies, hospitals and ambulatory care sites focus
on patient care while reducing costs, improving efficiency
and quality, and increasing profitability.
•
More than 30,000 people worldwide.
•
$100 Billion Revenue
•
360+ facilities in 90 countries
Cardinal Health... Not a hospital
Copyright © 2010 Daniel D. Houser
Disclaimer
•
This presentation doesn't present any real-world
cryptographic implementations at Cardinal Health, nor
does this presentation represent statements of
Cardinal Health policies or engineering regarding
cryptography.
•
Cryptography is tricky stuff, and merits consideration.
•
This presentation isn't a complete guide to avoid being
burned by cryptography. Hire an expert.
•
Do-it-yourself Crypto is as advisable as self-surgery
•
The perspective is corporate cryptography, not
national secrets
Copyright © 2010 Daniel D. Houser
Cryptography in the Real World
•
Real-world cryptographic implementations, and
lessons learned.
•
Balancing security with expediency to deliver
"good enough" crypto
•
Case studies, real cryptography & cryptanalysis
efforts, and what gaps in design principles led to
compromises
•
Pragmatic view of cryptography
Copyright © 2010 Daniel D. Houser
Cryptography is Math
•
Pretty formulas
•
Theoretical, Logical
•
Sound premises lead to proof after proof
•
Unassailable conclusions on paper
•
Digital
•
4000+ years old
•
Means of turning coffee into tenure
11110000 XOR 10001110 = 01111110
Copyright © 2010 Daniel D. Houser
Information Security is Engineering
•
Excess of overlapping measures, controls
sufficient to overwhelm...
– Determined attackers
– Nature / Acts of God
– Idiots / Acts of Ignorance & Error
•
Layered defenses
•
Dozens of years old
•
Often poor tools & an indeterminate environment
•
Constant change
•
Problem: Engineers think they can solve for X
Copyright © 2010 Daniel D. Houser
Information Risk Mgmt is Analog
•
Even younger science
•
Rough Economic Models
•
ALE, RAROC
•
Probabilistic Losses
•
People issues
•
Balancing act
•
Imperfect measures
$
Security
Expense
Total cost
SCMM
Loss
Copyright © 2010 Daniel D. Houser
Cynic’s View of
Corporate Cryptography in Context
Perfect math…
– in imperfect algorithms, defined by incomplete requirements,
– implemented by lazy ADD developers, with 3rd party APIs,
– using unproven sample code from anonymous web sources,
– supplemented with low-bid contractors,
– through human processes, using flawed and incomplete
testing,
– on run-away projects to achieve…
– Incomplete measures of budgeted sufficiency,
– governed by managers who view security as a necessary evil,
– maintained by untrained, overworked admins,
– on buggy, general-purpose OS.
Perfect.
Copyright © 2010 Daniel D. Houser
Cryptography in Context
•
From Deterministic to Probabilistic
•
From Digital to Analog
•
From Perfect Math to Perfect Mess
•
Yields some Surprises
•
Let’s look at some of the Mess &
Surprises...
Copyright © 2010 Daniel D. Houser
Is it using SSL?
•
Perhaps the most over-used question in
all of Information Security.
•
SSL is not the magic elixir
•
Overused because it checks the box 
Copyright © 2010 Daniel D. Houser
Is it using SSL?
SSL is typically a weak control – Why?
SSL Accomplishes Two Pragmatic Things:
1) Server Side Authentication
– So... why doesn't it solve phishing?
2) Link to link confidentiality (untrusted networks)
– Control where there is NO attack
– Zero provable ROI (return on investment)
– Lawyer Repellent
– Private keys are almost always in the clear
Copyright © 2010 Daniel D. Houser
SSL & TLS support anonymous mode
RFC2246 A.5 pg54
The following cipher suites are used for completely anonymous
Diffie-Hellman communications in which neither party is
authenticated. Note that this mode is vulnerable to man-in-the-
middle attacks and is therefore deprecated.
CipherSuite TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 = { 0x00,0x17 };
CipherSuite TLS_DH_anon_WITH_RC4_128_MD5 = { 0x00,0x18 };
CipherSuite TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA = { 0x00,0x19 };
CipherSuite TLS_DH_anon_WITH_DES_CBC_SHA = { 0x00,0x1A };
CipherSuite TLS_DH_anon_WITH_3DES_EDE_CBC_SHA = { 0x00,0x1B };
source: http://www.ietf.org/rfc/rfc2246.txt
Is it using SSL?
Copyright © 2010 Daniel D. Houser
SSL & TLS Support NULL crypto ciphers
In other words, Cleartext is a valid SSL mode
RFC2246 6.1 Connection States – pg14
TLS Security...Parameters are defined in the presentation
language as:
enum { server, client } ConnectionEnd;
enum { null, rc4, rc2, des, 3des, des40 } BulkCipherAlgorithm;
enum { stream, block } CipherType;
enum { true, false } IsExportable;
enum { null, md5, sha } MACAlgorithm;
enum { null(0), (255) } CompressionMethod;
http://www.ietf.org/rfc/rfc2246.txt
Is it using SSL?
Copyright © 2010 Daniel D. Houser
By default, TLS must support CipherSuite:
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
However, your server admins or developers may have
implemented:
TLS_DH_anon_WITH_3DES_EDE_CBC_SHA
OR
TLS_NULL_WITH_NULL_NULL
Not necessarily an issue for internal data center traffic –
but do you know??
Is it using SSL?
Copyright © 2010 Daniel D. Houser
Better Questions
q What business problem are you trying to solve?
q What are you protecting/information value?
q What is the threat model?
q What compensating controls do/could exist?
q How are you using SSH/SSL?
q What properties of cryptography are desired?
Confidentiality/ Integrity/ non-
repudiation
q What crypto modes & ciphers are you using?
q How are you creating, protecting & managing
keys through the entire lifecycle?
q What is the level of assurance needed/provided?
See appendix, similar coverage
SSH…
Copyright © 2010 Daniel D. Houser
DES ≅ 3DES ≅ AES
“If the use of DES is your weakest control, then
your site is very secure indeed” - Bill Murray
We spend too much time arguing protocols, not
nearly enough time discussing:
– Key controls and key management
– Key change/exchange procedures
– Cryptographic toolkits
– Random number/seed generators
– Process & documentation
– Training
Copyright © 2010 Daniel D. Houser
Key Strength is Overrated
•
Arguing over 512 bits, 1024 bits and 4096 bits...
...is like upgrading the deadbolt on your
tent
•
Thieves don't pick locks (except on television)
•
Again, much more important to worry about:
– Key management
– Key exchange protocols
– Avoiding key re-use
– Cryptosystem DRP/BCP
– Repeatable, documented processes
– Training of crypto personnel
Copyright © 2010 Daniel D. Houser
Nobody* Brute Forces Crypto
“We always cheat. We never go after the
algorithm. We always go after the implementation,
and it works.”
- Ben Jun, VP Cryptography Research
*nearly nobody...
Copyright © 2010 Daniel D. Houser
Nobody Brute Forces Crypto
•
Cryptosystems fail due to implementation flaws
•
Brute force is too expensive
•
Only Intelligence services (e.g. NSA, GCHQ) &
Media Pirates use brute force
•
WEP – failed due to implementation, not RC4
•
CSS – failed implementation, cleartext key
•
Enigma – bad practices, poor key choice
Copyright © 2010 Daniel D. Houser
Toolkits Matter. A Lot.
•
There are lots of ways to screw up cryptographic
implementations
•
Key functions in toolkits can provide substantial
armouring of cryptosystems
•
Great skill is required to achieve comparable
protection using default language libraries
•
Use crypto toolkits such as Bouncy Castle, MS-
CAPI and RSA BSAFE
Copyright © 2010 Daniel D. Houser
I have this hobby that gives me perspective…
21
Copyright © 2010 Daniel D. Houser
Even great toolkits are dangerous
•
Easy to make mistakes constructing your own crypto
system, even with great tools… and exceedingly difficult
to test well.
•
Think Do-it-Yourself firearms @ 115,000psi
1. Buy a crypto system (e.g. PGP)
2. If you cannot, buy tools (e.g. BSAFE) and retain
cryptographic services
3. Never build your own crypto code if possible
4. NEVER create your own primitives (algorithms)
Copyright © 2010 Daniel D. Houser
Cryptographers are smart people
•
The converse is almost always wrong:
Smart People != cryptographers
•
Just because they're brilliant at math, physics,
programming or chess doesn't make them a
cryptographer
•
Snipers don’t make good Kevlar vests
•
Pharmacists don’t design life-saving drugs
•
Truck drivers don’t design good bridges
•
Arsonists don’t design fire-proof buildings
Copyright © 2010 Daniel D. Houser
Cryptographers are smart people
•
If you're doing custom crypto, stop.
•
If you don't listen, then at least have it certified
by a cryptographer.
•
Cryptographers, cryptanalysts, cryptologists,
and cryptographic implementers are different.
•
Know the difference. Hire the right one.
– See Appendix, for tips on staffing a crypto project
•
Fairly simple to positive test crypto. How will
your “brilliant programmer” negatively test it?
Copyright © 2010 Daniel D. Houser
Snake Oil Case Study
Commercial system – ASP/Cloud provider
– Vendor one-way hash
Asserted it could not be reversed
– Proprietary algorithm for protecting privacy
data (Social Security Numbers)
– Permutation cipher with algebraic transforms
– Programmer held a Physics PhD
See Appendix for tips on avoiding Snake Oil
Copyright © 2010 Daniel D. Houser
Snake Oil Case Study:
Permutation cipher as hash
f1: A' = INT(ABS(mod( B + (A2 –A) , 10)))
f2: B' = INT(ABS(mod( (A*C2*D2) - C , 10))))
f3: C' = INT(ABS(mod( √B*(B3-(C2 /A)) , 10)))
f4: D' = INT(ABS(mod( A-7 , 10)))
etc.
*Algorithm simplified for clarity... but not by much...
Copyright © 2010 Daniel D. Houser
Snake Oil Case Study:
Too clever by half
•
Bad crypto: Cracked in 20 minutes using Excel
• Mod 10 ensured it was easy to break
• Perfect algebraic plug-n-chug formula
• Given “hash”, my 9 yr old solved for A,B,C,D,E...
• Perfectly reversible, so not “hash”
•
Only protection was secret of the algorithm
•
It looked smart and complex - It wasn’t.
•
He was in over his head
•
Instant reaction of a real cryptographer:
“Why didn’t he just use SHA-1?”
Copyright © 2010 Daniel D. Houser
Case study:
Software key protection
•
Long ago in a company far, far away...
•
We needed to protect data at rest:
Column-level database encryption
•
Artificially constrained in use of tools:
Embedded crypto functions in a major database
engine
Copyright © 2010 Daniel D. Houser
Case Study:
Software key protection
What we found in the database crypto lib:
•
Implemented FIPS 46–DES in ECB only
•
No protection against weak keys
•
No PRNG, seed generation, LFSRs
•
No ability to securely erase keys/sub-keys
Copyright © 2010 Daniel D. Houser
Case Study:
Software key protection
What we found:
•
Key protection method = Caesar cipher
•
No key management functions
•
Difficult to use non-alpha keys
– Assumption of keyspace was passphrase
– “PASSWORD”, “FOOTBALL”, etc.
•
No support to provide safe cipher or key
handling (e.g. avoid delimeters)
Copyright © 2010 Daniel D. Houser
Case Study:
Software key protection
What we found:
•
No salt or seed support without hand-rolling
•
Only hash available was SHA (not SHA-1)
•
No X.509 support (RSA, Diffie-Hellman...)
•
Very poorly documented – Largely by sample
code
Copyright © 2010 Daniel D. Houser
Case Study:
Software key protection
However…
•
Sample code didn’t address inherent flaws
•
Sample code encouraged poor crypto practices
– Several weaknesses in sample code
– Keys of “LARRYLAR” and “SECURITY”
– Search engine found wide use of sample code
•
Apparent broad implementation of insecure sample code
•
Developers were posting their PRODUCTION crypto
implementations, with inherent weaknesses!
– Touted by vendor as strong cryptography
Copyright © 2010 Daniel D. Houser
Case Study result
•
Hired cryptographic implementer & cryptanalyst for short
engagement to vett and implement the code.
•
Copious documentation and testing
•
Had to spend more on labor to implement and run
manual key management than would have been spent
on a proper crypto engine.
•
Shared findings with vendor, who published some
developer notes and changed their documentation (but
left the bad sample code intact)
33
Copyright © 2010 Daniel D. Houser
Summary
1. Management needs to hear about key management,
not cryptography
2. Focus on capabilities, implementation, documentation &
processes, not products and protocols
3. Layered controls mean more than key space
4. Use risk analysis to determine when to bring in the
cryptographic hired guns
Copyright © 2010 Daniel D. Houser
Summary
5. Custom cryptosystems should be certified
commensurate with risk
6. Avoid vendor snake oil
7. Test cryptographic operational functions
8. Train your admins on key functions & key protection
Copyright © 2010 Daniel D. Houser
Q & A
Surely, there are questions???
Copyright © 2010 Daniel D. Houser
Logistics
Please fill out evaluation forms
Contact information:
Dan Houser
Copyright © 2010 Daniel D. Houser
Appendix
Or, how to fit 3 hours of material
into 60 minutes of time…
38
Copyright © 2010 Daniel D. Houser
Appendix
Ø Fragility of cryptography
Ø Identity & cryptography
Ø Stupid Developer Tricks
Ø Case Study: Death by Audit
Ø SSH – as many issues as SSL
Ø How to hire & staff a crypto project
Ø Detecting vendor snake oil
Ø Why self-signed certs are evil
Ø How good people buy bad crypto
Copyright © 2010 Daniel D. Houser
Crypto doesn't erode, it implodes
•
Engineering for key length focuses on:
– Brute force work required
– Moore's Law
•
However, cryptosystems don't erode, they collapse
catastrophically
•
Remember, brute force is last resort
•
Moore’s Law provides the OUTER limit of the key life,
not the INNER bound.
Copyright © 2010 Daniel D. Houser
Crypto doesn't erode, it implodes
•
So, why do we establish life of keys based on Moore's
Law? Because it's easy. It's also wrong.
•
Shouldn't the life of the cryptosystem be based on risk
management?
Risk = Vulnerability * Threat * Asset Valuation
Copyright © 2010 Daniel D. Houser
Crypto is about Identity
•
Almost all crypto addresses identity management
issues...
– Who are you?
– How do I know you are authentically you?
– Who can access this file?
– Who can encrypt or decrypt this file?
– Has an unauthorized change occurred?
– Did this really come from you?
– Are you authorized to access keys?
– Are you authorized to change keys?
Copyright © 2010 Daniel D. Houser
Crypto is about Identity
Without solid identity management, you can't implement
solid cryptography
Example: Sending OTP tokens through US Mail that
were requested by a Hotmail account user. Great crypto,
built on a lousy identity registration process, creates a
flawed sense of security.
To address cryptography problems, you must often
first address identity problems.
Copyright © 2010 Daniel D. Houser
Segregation of Duties is ROUGH
•
Very difficult to achieve operationally without
significant risk.
•
“Hit by a bus” “Hit the lottery” issue
•
Operational crypto teams often with:
– Root/ administrator for their servers
– Keymaster administrative account
– Sensitive data access
– Ability to substitute or pervert data streams
•
Segregation of duties would turn 3 people into
14 and dramatically reduce productivity.
Copyright © 2010 Daniel D. Houser
Most of our keys are Dictionary Words
...or are protected by dictionary passwords.
– Laptop encryption
– Windows EFS
– PGP keys
– Unix/Windows passwords
– Service execution passwords
– Sample code dropped into your source code
– Password-protected encrypted USB
– MANY keys are stored on file shares
Copyright © 2010 Daniel D. Houser
Keys protected by Dictionary words
Ø
Often keys and/or protecting passwords are dictionary
words in practice
Ø
English has high entropy
– 0.8 bits per byte
– 10 character passwords provide 8 bits of entropy ≅ 8 BIT CRYPTO
Ø
Far easier to guess and brute force
Ø
Theoretical vs. actual strength
Ø
Japanese entropy is much higher than English, at 4.30
Ø Still, 8-character DES key in Japanese ≅ 34 bits, not 64
Ø
Lesson: Don’t confuse key space with password space
Copyright © 2010 Daniel D. Houser
Stupid Developer Tricks
You will likely find these same practices in your source
code. I have!
•
Super Decoder Ring protection for keys in source code
or storage: ROT13, big-endian, bit shift, static XOR,
Caesar cipher, Base-64, XOR-shift
•
Search code for key=“ seed=“ IV=“
•
Search code for “hidden”
•
Use of static keys that never change
•
Keys on file share
Copyright © 2010 Daniel D. Houser
Case Study: Death by Audit
•
Mainframe application protected by RACF
•
Audit finding: system doesn’t detect similar passwords
(e.g. Smith001, Smith002…)
•
Auditors required system to detect substantially similar
passwords at reset
•
Solution – symmetric encryption of passwords in
storage, instead of RACF
Copyright © 2010 Daniel D. Houser
Case Study: Death by Audit
Brilliant programmers used this scheme:
(Password) XOR (Password Last Chg Date)
Note! Not DateTime, Date
Stored in database:
Encrypted Pwd, Password Last Chg Date
Set passwords for 30 day expiry
Copyright © 2010 Daniel D. Houser
Case Study: Death by Audit
Result:
•
No salt – moved from salted hash to this
•
Only 30 possible values for the key
•
In practice, only 22 values to try!!
•
Keys stored with ciphertext - horrible!
•
Moved from supported commercial system to total hack-
job
Copyright © 2010 Daniel D. Houser
More Stupid Developer Tricks
Using MS-CAPI, Java Crypto lib, C++ crypto without
training and scientific rigor
Developers should NEVER do crypto
I suggest instead that developers make calls to centralized
functions developed (and vetted by) cryptographic
developers:
Encrypt {Type=SSN}{Data=xxxxxxxxx}
Let centralized policy make the decisions
Returns {KeyIndexValue}{Method}{Ciphertext}
Copyright © 2010 Daniel D. Houser
Is it Using SSH?
•
Regulations encouraged encrypted connections.
•
In the US, intense pressure for Sarbanes-Oxley
compliance by SEC used by audit firms to force
project teams into broad application of encrypted
connections.
•
As a result, auditors learned to ask the
question…
Is it using SSH?
Copyright © 2010 Daniel D. Houser
SSH has a fundamental weakness
SSH is a GREAT protocol, but...
– Key management is required
– In an enterprise, distributing digital certificates to all SSH
servers and clients can be difficult
– In practice, SysAdmins often too lazy to validate SSH keys
– If SSH keys fingerprints aren't validated, then man-in-the
middle attacks and spoofing can be used to grab admin
passwords.
– You should require admins to distribute and keep a log of
validated hashes.
Copyright © 2010 Daniel D. Houser
• rfc4344 on SSH Security Modes recommends rekeying SSH
after 1Gb data
• Does your secure file transfer facility transfer large files?
• If so, do they rekey SSH after every 1Gb transfer?
• Host keys commonly stored on networked shares by SSH
clients, so open to tampering
• Configuration controls are on the client
• SSH Protocol can ignore authentication:
The protocol provides the option that the server
name - host key association is not checked when
connecting to the host for the first time. rfc4251
Is it Using SSH?
Copyright © 2010 Daniel D. Houser
• As with SSL, cleartext is a valid mode.
• SSH & SSL both let you make up your own crypto algorithms
on the fly:
Anyone can define additional algorithms or
methods by using names in the format name@domainname,
e.g., "ourcipher-cbc@example.com". -rfc4251
Lessons: As with SSL focus on:
– Key management
– Training
– Implementation of controls
– Documentation
Is it Using SSH?
Copyright © 2010 Daniel D. Houser
Engaging a Cryptographer
•
What are you trying to achieve?
– Building a secure cryptosystem
– Vetting/Certifying a cryptosystem
– Breaking the cryptosystem
– Implementing COTS cryptography
Copyright © 2010 Daniel D. Houser
Use more than one
Seed values / PRNG
Key Mgmt System
Database
programming
Cryptographer
Cryptographic
Implementer
Cryptographic
Programmer
Example: PCI Database encryption project
Copyright © 2010 Daniel D. Houser
Wrap the Engagement
Crypto Savvy Security Architect / Engineer
Cryptographic Implementer
Cryptographer
Cryptographic Programmer
Security
Savvy
Project
Mgr
Crypto Savvy Risk/Certification Analyst
Copyright © 2010 Daniel D. Houser
Cryptographers Aren't Cheap
– Segregate the work to permit each expert to
do the job they do best
– Use Security Engineer for “grunt-work”
•
Project management tasks
•
Requirements gathering
•
Managing the deliverables carefully
•
Engaging/managing cryptographic experts
•
Documentation, meetings, logistics
•
Performing due diligence on scope & requirements
•
Governance cycles & review
Copyright © 2010 Daniel D. Houser
Users don’t care about crypto
Why? We tell them not to care, every day in Dev, Test &
QA environments, by using self-signed certificates:
Copyright © 2010 Daniel D. Houser
Self-signed Certs are Evil
•
Why do we use self-signed certificates on our Intranet
sites?
– Cheap, economical, easy
– “It's just test”
•
Result: Users are trained to ignore security
•
In testing 99+% of users will click-through certificate
failure error messages in PROD
•
Same issues with domain changes producing stale
certificate warnings
Copyright © 2010 Daniel D. Houser
Snake Oil Danger Signs
“We have this brilliant guy”
Secret algorithms
“It’s just standard 3DES using standard Java”
New cryptography
...think “new drugs”, not “new car”
Won't disclose details, despite NDA and Star
Chamber meeting.
Not certified by a cryptographer
Copyright © 2010 Daniel D. Houser
Snake Oil Danger Signs
Name dropping - “The DoD uses it!”
Security experts, rave reviews, celebrity /
industry endorsements
Technobabble obfuscation – the half-modulo
perfect forward secrecy inverse hashinator.
“Trust us”
Claims of Infinite keyspace / perfect security
Revolutionary new concept
“Military Grade” cipher
Copyright © 2010 Daniel D. Houser
Snake Oil Danger Signs
Recoverable keys
Our is better, because theirs is insecure
Provably secure using One Time Pad
Bolt-on crypto added as a COTS feature
More emphasis on GUI than crypto
Foolproof products
Crypto vendors who don't understand key
crypto concepts (even their SMEs)
Copyright © 2010 Daniel D. Houser
Engaging a Cryptographer
•
What are you trying to achieve?
– Building a secure cryptosystem
– Vetting/Certifying a cryptosystem
– Breaking the cryptosystem
– Implementing COTS cryptography
Copyright © 2010 Daniel D. Houser
Why do People buy bad crypto?
•
Regulatory pressure is pushing us in the wrong direction
to check the box 
•
“Project ABC will implement Cryptonite 7.1”
– instead of fixing a business problem, states implementation of a
product as its own means to an end
– Loss of focus on the need to fix a business problem
•
Check the box, problem solved, we're done
•
However, have we improved our capabilities?
Copyright © 2010 Daniel D. Houser
People buy bad crypto
•
Built on a shaky foundation
•
Have you solved or moved the problem?
•
Instead, we should:
– Focus on building capabilities
– Start with the basics: Key management, cryptographic use
policies, information classification, identity management,
cryptographic governance, crypto team

More Related Content

Similar to Crypto in the Real World: or How to Scare an IT Auditor

The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation ApproachesPriyanka Aash
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!Dwolla
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Annie-Marie Page
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Cloudera, Inc.
 
Avira - NOAH17 Berlin
Avira - NOAH17 BerlinAvira - NOAH17 Berlin
Avira - NOAH17 BerlinNOAH Advisors
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksJohn Bambenek
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
Castle Presentation 08-12-04
Castle Presentation 08-12-04Castle Presentation 08-12-04
Castle Presentation 08-12-04Howard Hellman
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticEchoworx
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopMichele Chubirka
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 

Similar to Crypto in the Real World: or How to Scare an IT Auditor (20)

The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation Approaches
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17
 
Avira - NOAH17 Berlin
Avira - NOAH17 BerlinAvira - NOAH17 Berlin
Avira - NOAH17 Berlin
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Castle Presentation 08-12-04
Castle Presentation 08-12-04Castle Presentation 08-12-04
Castle Presentation 08-12-04
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 

More from Dan Houser

Hacking Bourbon
Hacking BourbonHacking Bourbon
Hacking BourbonDan Houser
 
2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called EthicsDan Houser
 
Securing Big Data and the Grid
Securing Big Data and the GridSecuring Big Data and the Grid
Securing Big Data and the GridDan Houser
 
RSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated IdentityRSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated IdentityDan Houser
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyDan Houser
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsDan Houser
 
Risk Based Planning for Mission Continuity
Risk Based Planning for Mission ContinuityRisk Based Planning for Mission Continuity
Risk Based Planning for Mission ContinuityDan Houser
 
Security Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIIISecurity Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIIIDan Houser
 
Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsDan Houser
 
Advanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM AuditAdvanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM AuditDan Houser
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security mythsDan Houser
 
Hacking a Major Security Conference
Hacking a Major Security ConferenceHacking a Major Security Conference
Hacking a Major Security ConferenceDan Houser
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity ProgramDan Houser
 
Case Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big DataCase Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big DataDan Houser
 

More from Dan Houser (14)

Hacking Bourbon
Hacking BourbonHacking Bourbon
Hacking Bourbon
 
2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics
 
Securing Big Data and the Grid
Securing Big Data and the GridSecuring Big Data and the Grid
Securing Big Data and the Grid
 
RSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated IdentityRSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated Identity
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
 
Risk Based Planning for Mission Continuity
Risk Based Planning for Mission ContinuityRisk Based Planning for Mission Continuity
Risk Based Planning for Mission Continuity
 
Security Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIIISecurity Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIII
 
Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security Professionals
 
Advanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM AuditAdvanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM Audit
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security myths
 
Hacking a Major Security Conference
Hacking a Major Security ConferenceHacking a Major Security Conference
Hacking a Major Security Conference
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Case Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big DataCase Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big Data
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

Crypto in the Real World: or How to Scare an IT Auditor

  • 1. Copyright © 2010 Daniel D. Houser Insert presenter logo here on slide master Crypto in the real world …. Or how to scare an it auditor Dan Houser, CISSP-ISSAP CISA CISM CGEIT Member, (ISC)² Board of Directors Security & Identity Architect, Cardinal Health Session ID: AND-206
  • 2. Copyright © 2010 Daniel D. Houser • Cardinal Health, Inc. is a Fortune 17 company that improves the cost-effectiveness of health care. As the business behind health care, Cardinal Health helps pharmacies, hospitals and ambulatory care sites focus on patient care while reducing costs, improving efficiency and quality, and increasing profitability. • More than 30,000 people worldwide. • $100 Billion Revenue • 360+ facilities in 90 countries Cardinal Health... Not a hospital
  • 3. Copyright © 2010 Daniel D. Houser Disclaimer • This presentation doesn't present any real-world cryptographic implementations at Cardinal Health, nor does this presentation represent statements of Cardinal Health policies or engineering regarding cryptography. • Cryptography is tricky stuff, and merits consideration. • This presentation isn't a complete guide to avoid being burned by cryptography. Hire an expert. • Do-it-yourself Crypto is as advisable as self-surgery • The perspective is corporate cryptography, not national secrets
  • 4. Copyright © 2010 Daniel D. Houser Cryptography in the Real World • Real-world cryptographic implementations, and lessons learned. • Balancing security with expediency to deliver "good enough" crypto • Case studies, real cryptography & cryptanalysis efforts, and what gaps in design principles led to compromises • Pragmatic view of cryptography
  • 5. Copyright © 2010 Daniel D. Houser Cryptography is Math • Pretty formulas • Theoretical, Logical • Sound premises lead to proof after proof • Unassailable conclusions on paper • Digital • 4000+ years old • Means of turning coffee into tenure 11110000 XOR 10001110 = 01111110
  • 6. Copyright © 2010 Daniel D. Houser Information Security is Engineering • Excess of overlapping measures, controls sufficient to overwhelm... – Determined attackers – Nature / Acts of God – Idiots / Acts of Ignorance & Error • Layered defenses • Dozens of years old • Often poor tools & an indeterminate environment • Constant change • Problem: Engineers think they can solve for X
  • 7. Copyright © 2010 Daniel D. Houser Information Risk Mgmt is Analog • Even younger science • Rough Economic Models • ALE, RAROC • Probabilistic Losses • People issues • Balancing act • Imperfect measures $ Security Expense Total cost SCMM Loss
  • 8. Copyright © 2010 Daniel D. Houser Cynic’s View of Corporate Cryptography in Context Perfect math… – in imperfect algorithms, defined by incomplete requirements, – implemented by lazy ADD developers, with 3rd party APIs, – using unproven sample code from anonymous web sources, – supplemented with low-bid contractors, – through human processes, using flawed and incomplete testing, – on run-away projects to achieve… – Incomplete measures of budgeted sufficiency, – governed by managers who view security as a necessary evil, – maintained by untrained, overworked admins, – on buggy, general-purpose OS. Perfect.
  • 9. Copyright © 2010 Daniel D. Houser Cryptography in Context • From Deterministic to Probabilistic • From Digital to Analog • From Perfect Math to Perfect Mess • Yields some Surprises • Let’s look at some of the Mess & Surprises...
  • 10. Copyright © 2010 Daniel D. Houser Is it using SSL? • Perhaps the most over-used question in all of Information Security. • SSL is not the magic elixir • Overused because it checks the box 
  • 11. Copyright © 2010 Daniel D. Houser Is it using SSL? SSL is typically a weak control – Why? SSL Accomplishes Two Pragmatic Things: 1) Server Side Authentication – So... why doesn't it solve phishing? 2) Link to link confidentiality (untrusted networks) – Control where there is NO attack – Zero provable ROI (return on investment) – Lawyer Repellent – Private keys are almost always in the clear
  • 12. Copyright © 2010 Daniel D. Houser SSL & TLS support anonymous mode RFC2246 A.5 pg54 The following cipher suites are used for completely anonymous Diffie-Hellman communications in which neither party is authenticated. Note that this mode is vulnerable to man-in-the- middle attacks and is therefore deprecated. CipherSuite TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 = { 0x00,0x17 }; CipherSuite TLS_DH_anon_WITH_RC4_128_MD5 = { 0x00,0x18 }; CipherSuite TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA = { 0x00,0x19 }; CipherSuite TLS_DH_anon_WITH_DES_CBC_SHA = { 0x00,0x1A }; CipherSuite TLS_DH_anon_WITH_3DES_EDE_CBC_SHA = { 0x00,0x1B }; source: http://www.ietf.org/rfc/rfc2246.txt Is it using SSL?
  • 13. Copyright © 2010 Daniel D. Houser SSL & TLS Support NULL crypto ciphers In other words, Cleartext is a valid SSL mode RFC2246 6.1 Connection States – pg14 TLS Security...Parameters are defined in the presentation language as: enum { server, client } ConnectionEnd; enum { null, rc4, rc2, des, 3des, des40 } BulkCipherAlgorithm; enum { stream, block } CipherType; enum { true, false } IsExportable; enum { null, md5, sha } MACAlgorithm; enum { null(0), (255) } CompressionMethod; http://www.ietf.org/rfc/rfc2246.txt Is it using SSL?
  • 14. Copyright © 2010 Daniel D. Houser By default, TLS must support CipherSuite: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA However, your server admins or developers may have implemented: TLS_DH_anon_WITH_3DES_EDE_CBC_SHA OR TLS_NULL_WITH_NULL_NULL Not necessarily an issue for internal data center traffic – but do you know?? Is it using SSL?
  • 15. Copyright © 2010 Daniel D. Houser Better Questions q What business problem are you trying to solve? q What are you protecting/information value? q What is the threat model? q What compensating controls do/could exist? q How are you using SSH/SSL? q What properties of cryptography are desired? Confidentiality/ Integrity/ non- repudiation q What crypto modes & ciphers are you using? q How are you creating, protecting & managing keys through the entire lifecycle? q What is the level of assurance needed/provided? See appendix, similar coverage SSH…
  • 16. Copyright © 2010 Daniel D. Houser DES ≅ 3DES ≅ AES “If the use of DES is your weakest control, then your site is very secure indeed” - Bill Murray We spend too much time arguing protocols, not nearly enough time discussing: – Key controls and key management – Key change/exchange procedures – Cryptographic toolkits – Random number/seed generators – Process & documentation – Training
  • 17. Copyright © 2010 Daniel D. Houser Key Strength is Overrated • Arguing over 512 bits, 1024 bits and 4096 bits... ...is like upgrading the deadbolt on your tent • Thieves don't pick locks (except on television) • Again, much more important to worry about: – Key management – Key exchange protocols – Avoiding key re-use – Cryptosystem DRP/BCP – Repeatable, documented processes – Training of crypto personnel
  • 18. Copyright © 2010 Daniel D. Houser Nobody* Brute Forces Crypto “We always cheat. We never go after the algorithm. We always go after the implementation, and it works.” - Ben Jun, VP Cryptography Research *nearly nobody...
  • 19. Copyright © 2010 Daniel D. Houser Nobody Brute Forces Crypto • Cryptosystems fail due to implementation flaws • Brute force is too expensive • Only Intelligence services (e.g. NSA, GCHQ) & Media Pirates use brute force • WEP – failed due to implementation, not RC4 • CSS – failed implementation, cleartext key • Enigma – bad practices, poor key choice
  • 20. Copyright © 2010 Daniel D. Houser Toolkits Matter. A Lot. • There are lots of ways to screw up cryptographic implementations • Key functions in toolkits can provide substantial armouring of cryptosystems • Great skill is required to achieve comparable protection using default language libraries • Use crypto toolkits such as Bouncy Castle, MS- CAPI and RSA BSAFE
  • 21. Copyright © 2010 Daniel D. Houser I have this hobby that gives me perspective… 21
  • 22. Copyright © 2010 Daniel D. Houser Even great toolkits are dangerous • Easy to make mistakes constructing your own crypto system, even with great tools… and exceedingly difficult to test well. • Think Do-it-Yourself firearms @ 115,000psi 1. Buy a crypto system (e.g. PGP) 2. If you cannot, buy tools (e.g. BSAFE) and retain cryptographic services 3. Never build your own crypto code if possible 4. NEVER create your own primitives (algorithms)
  • 23. Copyright © 2010 Daniel D. Houser Cryptographers are smart people • The converse is almost always wrong: Smart People != cryptographers • Just because they're brilliant at math, physics, programming or chess doesn't make them a cryptographer • Snipers don’t make good Kevlar vests • Pharmacists don’t design life-saving drugs • Truck drivers don’t design good bridges • Arsonists don’t design fire-proof buildings
  • 24. Copyright © 2010 Daniel D. Houser Cryptographers are smart people • If you're doing custom crypto, stop. • If you don't listen, then at least have it certified by a cryptographer. • Cryptographers, cryptanalysts, cryptologists, and cryptographic implementers are different. • Know the difference. Hire the right one. – See Appendix, for tips on staffing a crypto project • Fairly simple to positive test crypto. How will your “brilliant programmer” negatively test it?
  • 25. Copyright © 2010 Daniel D. Houser Snake Oil Case Study Commercial system – ASP/Cloud provider – Vendor one-way hash Asserted it could not be reversed – Proprietary algorithm for protecting privacy data (Social Security Numbers) – Permutation cipher with algebraic transforms – Programmer held a Physics PhD See Appendix for tips on avoiding Snake Oil
  • 26. Copyright © 2010 Daniel D. Houser Snake Oil Case Study: Permutation cipher as hash f1: A' = INT(ABS(mod( B + (A2 –A) , 10))) f2: B' = INT(ABS(mod( (A*C2*D2) - C , 10)))) f3: C' = INT(ABS(mod( √B*(B3-(C2 /A)) , 10))) f4: D' = INT(ABS(mod( A-7 , 10))) etc. *Algorithm simplified for clarity... but not by much...
  • 27. Copyright © 2010 Daniel D. Houser Snake Oil Case Study: Too clever by half • Bad crypto: Cracked in 20 minutes using Excel • Mod 10 ensured it was easy to break • Perfect algebraic plug-n-chug formula • Given “hash”, my 9 yr old solved for A,B,C,D,E... • Perfectly reversible, so not “hash” • Only protection was secret of the algorithm • It looked smart and complex - It wasn’t. • He was in over his head • Instant reaction of a real cryptographer: “Why didn’t he just use SHA-1?”
  • 28. Copyright © 2010 Daniel D. Houser Case study: Software key protection • Long ago in a company far, far away... • We needed to protect data at rest: Column-level database encryption • Artificially constrained in use of tools: Embedded crypto functions in a major database engine
  • 29. Copyright © 2010 Daniel D. Houser Case Study: Software key protection What we found in the database crypto lib: • Implemented FIPS 46–DES in ECB only • No protection against weak keys • No PRNG, seed generation, LFSRs • No ability to securely erase keys/sub-keys
  • 30. Copyright © 2010 Daniel D. Houser Case Study: Software key protection What we found: • Key protection method = Caesar cipher • No key management functions • Difficult to use non-alpha keys – Assumption of keyspace was passphrase – “PASSWORD”, “FOOTBALL”, etc. • No support to provide safe cipher or key handling (e.g. avoid delimeters)
  • 31. Copyright © 2010 Daniel D. Houser Case Study: Software key protection What we found: • No salt or seed support without hand-rolling • Only hash available was SHA (not SHA-1) • No X.509 support (RSA, Diffie-Hellman...) • Very poorly documented – Largely by sample code
  • 32. Copyright © 2010 Daniel D. Houser Case Study: Software key protection However… • Sample code didn’t address inherent flaws • Sample code encouraged poor crypto practices – Several weaknesses in sample code – Keys of “LARRYLAR” and “SECURITY” – Search engine found wide use of sample code • Apparent broad implementation of insecure sample code • Developers were posting their PRODUCTION crypto implementations, with inherent weaknesses! – Touted by vendor as strong cryptography
  • 33. Copyright © 2010 Daniel D. Houser Case Study result • Hired cryptographic implementer & cryptanalyst for short engagement to vett and implement the code. • Copious documentation and testing • Had to spend more on labor to implement and run manual key management than would have been spent on a proper crypto engine. • Shared findings with vendor, who published some developer notes and changed their documentation (but left the bad sample code intact) 33
  • 34. Copyright © 2010 Daniel D. Houser Summary 1. Management needs to hear about key management, not cryptography 2. Focus on capabilities, implementation, documentation & processes, not products and protocols 3. Layered controls mean more than key space 4. Use risk analysis to determine when to bring in the cryptographic hired guns
  • 35. Copyright © 2010 Daniel D. Houser Summary 5. Custom cryptosystems should be certified commensurate with risk 6. Avoid vendor snake oil 7. Test cryptographic operational functions 8. Train your admins on key functions & key protection
  • 36. Copyright © 2010 Daniel D. Houser Q & A Surely, there are questions???
  • 37. Copyright © 2010 Daniel D. Houser Logistics Please fill out evaluation forms Contact information: Dan Houser
  • 38. Copyright © 2010 Daniel D. Houser Appendix Or, how to fit 3 hours of material into 60 minutes of time… 38
  • 39. Copyright © 2010 Daniel D. Houser Appendix Ø Fragility of cryptography Ø Identity & cryptography Ø Stupid Developer Tricks Ø Case Study: Death by Audit Ø SSH – as many issues as SSL Ø How to hire & staff a crypto project Ø Detecting vendor snake oil Ø Why self-signed certs are evil Ø How good people buy bad crypto
  • 40. Copyright © 2010 Daniel D. Houser Crypto doesn't erode, it implodes • Engineering for key length focuses on: – Brute force work required – Moore's Law • However, cryptosystems don't erode, they collapse catastrophically • Remember, brute force is last resort • Moore’s Law provides the OUTER limit of the key life, not the INNER bound.
  • 41. Copyright © 2010 Daniel D. Houser Crypto doesn't erode, it implodes • So, why do we establish life of keys based on Moore's Law? Because it's easy. It's also wrong. • Shouldn't the life of the cryptosystem be based on risk management? Risk = Vulnerability * Threat * Asset Valuation
  • 42. Copyright © 2010 Daniel D. Houser Crypto is about Identity • Almost all crypto addresses identity management issues... – Who are you? – How do I know you are authentically you? – Who can access this file? – Who can encrypt or decrypt this file? – Has an unauthorized change occurred? – Did this really come from you? – Are you authorized to access keys? – Are you authorized to change keys?
  • 43. Copyright © 2010 Daniel D. Houser Crypto is about Identity Without solid identity management, you can't implement solid cryptography Example: Sending OTP tokens through US Mail that were requested by a Hotmail account user. Great crypto, built on a lousy identity registration process, creates a flawed sense of security. To address cryptography problems, you must often first address identity problems.
  • 44. Copyright © 2010 Daniel D. Houser Segregation of Duties is ROUGH • Very difficult to achieve operationally without significant risk. • “Hit by a bus” “Hit the lottery” issue • Operational crypto teams often with: – Root/ administrator for their servers – Keymaster administrative account – Sensitive data access – Ability to substitute or pervert data streams • Segregation of duties would turn 3 people into 14 and dramatically reduce productivity.
  • 45. Copyright © 2010 Daniel D. Houser Most of our keys are Dictionary Words ...or are protected by dictionary passwords. – Laptop encryption – Windows EFS – PGP keys – Unix/Windows passwords – Service execution passwords – Sample code dropped into your source code – Password-protected encrypted USB – MANY keys are stored on file shares
  • 46. Copyright © 2010 Daniel D. Houser Keys protected by Dictionary words Ø Often keys and/or protecting passwords are dictionary words in practice Ø English has high entropy – 0.8 bits per byte – 10 character passwords provide 8 bits of entropy ≅ 8 BIT CRYPTO Ø Far easier to guess and brute force Ø Theoretical vs. actual strength Ø Japanese entropy is much higher than English, at 4.30 Ø Still, 8-character DES key in Japanese ≅ 34 bits, not 64 Ø Lesson: Don’t confuse key space with password space
  • 47. Copyright © 2010 Daniel D. Houser Stupid Developer Tricks You will likely find these same practices in your source code. I have! • Super Decoder Ring protection for keys in source code or storage: ROT13, big-endian, bit shift, static XOR, Caesar cipher, Base-64, XOR-shift • Search code for key=“ seed=“ IV=“ • Search code for “hidden” • Use of static keys that never change • Keys on file share
  • 48. Copyright © 2010 Daniel D. Houser Case Study: Death by Audit • Mainframe application protected by RACF • Audit finding: system doesn’t detect similar passwords (e.g. Smith001, Smith002…) • Auditors required system to detect substantially similar passwords at reset • Solution – symmetric encryption of passwords in storage, instead of RACF
  • 49. Copyright © 2010 Daniel D. Houser Case Study: Death by Audit Brilliant programmers used this scheme: (Password) XOR (Password Last Chg Date) Note! Not DateTime, Date Stored in database: Encrypted Pwd, Password Last Chg Date Set passwords for 30 day expiry
  • 50. Copyright © 2010 Daniel D. Houser Case Study: Death by Audit Result: • No salt – moved from salted hash to this • Only 30 possible values for the key • In practice, only 22 values to try!! • Keys stored with ciphertext - horrible! • Moved from supported commercial system to total hack- job
  • 51. Copyright © 2010 Daniel D. Houser More Stupid Developer Tricks Using MS-CAPI, Java Crypto lib, C++ crypto without training and scientific rigor Developers should NEVER do crypto I suggest instead that developers make calls to centralized functions developed (and vetted by) cryptographic developers: Encrypt {Type=SSN}{Data=xxxxxxxxx} Let centralized policy make the decisions Returns {KeyIndexValue}{Method}{Ciphertext}
  • 52. Copyright © 2010 Daniel D. Houser Is it Using SSH? • Regulations encouraged encrypted connections. • In the US, intense pressure for Sarbanes-Oxley compliance by SEC used by audit firms to force project teams into broad application of encrypted connections. • As a result, auditors learned to ask the question… Is it using SSH?
  • 53. Copyright © 2010 Daniel D. Houser SSH has a fundamental weakness SSH is a GREAT protocol, but... – Key management is required – In an enterprise, distributing digital certificates to all SSH servers and clients can be difficult – In practice, SysAdmins often too lazy to validate SSH keys – If SSH keys fingerprints aren't validated, then man-in-the middle attacks and spoofing can be used to grab admin passwords. – You should require admins to distribute and keep a log of validated hashes.
  • 54. Copyright © 2010 Daniel D. Houser • rfc4344 on SSH Security Modes recommends rekeying SSH after 1Gb data • Does your secure file transfer facility transfer large files? • If so, do they rekey SSH after every 1Gb transfer? • Host keys commonly stored on networked shares by SSH clients, so open to tampering • Configuration controls are on the client • SSH Protocol can ignore authentication: The protocol provides the option that the server name - host key association is not checked when connecting to the host for the first time. rfc4251 Is it Using SSH?
  • 55. Copyright © 2010 Daniel D. Houser • As with SSL, cleartext is a valid mode. • SSH & SSL both let you make up your own crypto algorithms on the fly: Anyone can define additional algorithms or methods by using names in the format name@domainname, e.g., "ourcipher-cbc@example.com". -rfc4251 Lessons: As with SSL focus on: – Key management – Training – Implementation of controls – Documentation Is it Using SSH?
  • 56. Copyright © 2010 Daniel D. Houser Engaging a Cryptographer • What are you trying to achieve? – Building a secure cryptosystem – Vetting/Certifying a cryptosystem – Breaking the cryptosystem – Implementing COTS cryptography
  • 57. Copyright © 2010 Daniel D. Houser Use more than one Seed values / PRNG Key Mgmt System Database programming Cryptographer Cryptographic Implementer Cryptographic Programmer Example: PCI Database encryption project
  • 58. Copyright © 2010 Daniel D. Houser Wrap the Engagement Crypto Savvy Security Architect / Engineer Cryptographic Implementer Cryptographer Cryptographic Programmer Security Savvy Project Mgr Crypto Savvy Risk/Certification Analyst
  • 59. Copyright © 2010 Daniel D. Houser Cryptographers Aren't Cheap – Segregate the work to permit each expert to do the job they do best – Use Security Engineer for “grunt-work” • Project management tasks • Requirements gathering • Managing the deliverables carefully • Engaging/managing cryptographic experts • Documentation, meetings, logistics • Performing due diligence on scope & requirements • Governance cycles & review
  • 60. Copyright © 2010 Daniel D. Houser Users don’t care about crypto Why? We tell them not to care, every day in Dev, Test & QA environments, by using self-signed certificates:
  • 61. Copyright © 2010 Daniel D. Houser Self-signed Certs are Evil • Why do we use self-signed certificates on our Intranet sites? – Cheap, economical, easy – “It's just test” • Result: Users are trained to ignore security • In testing 99+% of users will click-through certificate failure error messages in PROD • Same issues with domain changes producing stale certificate warnings
  • 62. Copyright © 2010 Daniel D. Houser Snake Oil Danger Signs “We have this brilliant guy” Secret algorithms “It’s just standard 3DES using standard Java” New cryptography ...think “new drugs”, not “new car” Won't disclose details, despite NDA and Star Chamber meeting. Not certified by a cryptographer
  • 63. Copyright © 2010 Daniel D. Houser Snake Oil Danger Signs Name dropping - “The DoD uses it!” Security experts, rave reviews, celebrity / industry endorsements Technobabble obfuscation – the half-modulo perfect forward secrecy inverse hashinator. “Trust us” Claims of Infinite keyspace / perfect security Revolutionary new concept “Military Grade” cipher
  • 64. Copyright © 2010 Daniel D. Houser Snake Oil Danger Signs Recoverable keys Our is better, because theirs is insecure Provably secure using One Time Pad Bolt-on crypto added as a COTS feature More emphasis on GUI than crypto Foolproof products Crypto vendors who don't understand key crypto concepts (even their SMEs)
  • 65. Copyright © 2010 Daniel D. Houser Engaging a Cryptographer • What are you trying to achieve? – Building a secure cryptosystem – Vetting/Certifying a cryptosystem – Breaking the cryptosystem – Implementing COTS cryptography
  • 66. Copyright © 2010 Daniel D. Houser Why do People buy bad crypto? • Regulatory pressure is pushing us in the wrong direction to check the box  • “Project ABC will implement Cryptonite 7.1” – instead of fixing a business problem, states implementation of a product as its own means to an end – Loss of focus on the need to fix a business problem • Check the box, problem solved, we're done • However, have we improved our capabilities?
  • 67. Copyright © 2010 Daniel D. Houser People buy bad crypto • Built on a shaky foundation • Have you solved or moved the problem? • Instead, we should: – Focus on building capabilities – Start with the basics: Key management, cryptographic use policies, information classification, identity management, cryptographic governance, crypto team

Editor's Notes

  1. Case Study:
  2. Several years ago I was working on a project that required software based key storage. So, we looked at the commercial language library crypto that was available, and discovered: No crypto debug mode
  3. Several years ago I was working on a project that required software based key storage. So, we looked at the commercial language library crypto that was available, and discovered: No crypto debug mode
  4. Several years ago I was working on a project that required software based key storage. So, we looked at the commercial language library crypto that was available, and discovered: No crypto debug mode
  5. Several years ago I was working on a project that required software based key storage. So, we looked at the commercial language library crypto that was available, and discovered: No crypto debug mode
  6. Several years ago I was working on a project that required software based key storage. So, we looked at the commercial language library crypto that was available, and discovered: No crypto debug mode
  7. Several years ago I was working on a project that required software based key storage. So, we looked at the commercial language library crypto that was available, and discovered: No crypto debug mode
  8. Several years ago I was working on a project that required software based key storage. So, we looked at the commercial language library crypto that was available, and discovered: No crypto debug mode