Bunker mail security

1,070 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,070
On SlideShare
0
From Embeds
0
Number of Embeds
54
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • PCI-DSS places many requirements on companies that handle Payment Card Information.BunkerMail addresses three main requirements with one technical solution for sending messages and files across company boundaries.Requirement 3 deals with Encryption at Rest. When you email or FTP a file to a business partner the file may be encrypted by HTTPS or SSL during transmission, but when the file is uploaded to a server often it is stored in an unencrypted state. End-to-End Encryption is an answer for this problem, but you have to distribute cryptographic keys to each user. BunkerMail makes this simple.Requirement 4 deals with Encryption in Motion. Most secure applications use HTTPS or SSL encrypted email sessions and cover encryption in motion. BunkerMail takes this a step further and authenticates the channel to thwart phishing and man-in-the-middle attacks.Requirement 8 deals with Strong Authentication. Users should be uniquely credentialed and multi-factor authentication should be used where possible. BunkerMail employs a strong, bi-directional multi-factor authentication that is simple to use.
  • GlobalCrypto recognizes that cryptographic key distribution is a hard. Certificates and key files are alien to end users and complex to set up.BunkerMail distributes crypto keys to end users by hiding them inside of digital images. Web technologies such as .NET and Flash are used to seamlessly store these images on the end user’s machine. End users hold these credentials on their computers which contain:-An RSA-1024 bit key pair (public and private keys) for the end user.-An RSA-2048 bit public key for the BunkerMail web application.-Partial digital signatures for the user and the web application for Authentication purposes.All of this cryptographic materiel is stored encrypted with AES where the key is a password. Note that the password is never transmitted or stored.
  • BunkerMail’s image-key is essentially a Virtual Smartcard with a password.The web application stores the image on the user’s machine for later use and recalls the image for authentication.Users only have to type in their password on an enrolled machine.The password is used to decrypt the partial digital signatures as well as the cryptographic keys.Authentication takes place over a secure channel via a session AES key that is exchanged using BunkerMail’s keys. This thwarts phishing and man-in-the-middle attacks that may plague HTTPS. HTTPS is used as a redundant protocol, but is not necessary.See our knowledge center at www.globalcrypto.com for a more in depth study of our authentication.
  • Here is what the user sees at authentication time. The web server retains a copy of the right-hand side of the image with partial digital signatures.When the user enters a password, the left-hand side is unlocked and transmitted to the server over a secure channel. If authenticated, the web server sends down an unlocked right-hand side of the image and the user is authenticated.The user sees both sides of the image come together and is logged in.
  • All information is sent as XML through previously authenticated and encrypted sessions. Encryption in motion is always maintained.However, some information is encrypted end-to-end:--The Private note is a message field for Rich Text and is encrypted end-to-end.--Any attachments are end-to-end encrypted.Each attachment and the private note are encrypted with a unique AES key.The AES keys are transmitted to the BunkerMail server using the Server’s public key. BunkerMail re-encrypts the AES keys using the recipient’s public keys.BunkerMail will escrow any AES keys that are bound for users who have not previously established an account and therefore don’t have a public key yet. Upon registration, the AES keys are re-encrypted using the new user’s public key.
  • We have a great technical solution to solve file transfer and sending of messages in a PCI regulated environment.We have solid cryptographic security and provide a simple user experience.Try us out at www.bunkermail.com
  • Bunker mail security

    1. 1. SecurityOverview<br />BunkerMail encryption<br />and key exchange<br />October 7, 2010 GlobalCrypto.com<br />
    2. 2. Todd Merrill, CEO GlobalCrypto <br />@ToddMerrill<br />info@globalcrypto.com<br />
    3. 3. Challenges with PCI-DSS <br />Requirement 3: (Encrypt at Rest)<br />“Protect stored cardholder data”<br />Crypto-key distribution<br />Requirement 4: (Encrypt in Motion)<br />“Encrypt transmission of cardholder data across open, public networks”<br />Requirement 8: (Strong Authentication)<br />“Assign a unique ID to each person with computer access”<br />
    4. 4.
    5. 5. We distribute Crypto keys to web users<br />We hide crypto in digital pictures  Steganography!<br />User credential contains (AES encrypted):<br />RSA-1024 user key pair (public-private)<br />RSA-2048 public key for BunkerMail application<br />Dual digital signatures for Authentication<br />
    6. 6. Authentication<br />Strong, Multi-Factor Authentication <br />Picture = Virtual Smartcard<br />Password is never transmitted or stored<br />Bi-directional Authentication <br />Sessions are encrypted using unique AES key exchanged upon Authentication (via our PKI)<br />HTTPS used in addition, (redundant)<br />globalcrypto.com/knowledge-center-overview<br />
    7. 7. Authentication<br />
    8. 8. Encryption—end-to-end<br />Private Note and Attachments are encrypted with unique AES keys.<br />AES keys are encrypted with BunkerMail public key (RSA-2048).<br />BunkerMail decrypts the AES keys and re-encrypts them with the public key(s) of recipients<br />AES keys are escrowed if a user is not in the system (no public key yet)<br />
    9. 9.
    10. 10. Ideal technical solution<br />Encrypts at rest <br />Encrypts in motion, end-to-end<br />Provides audit logging, robust audit trail<br />Housed in a secure data center<br />Provides encrypted, automated archival<br />Enforces strong, unique access controls<br />Simple to use<br />

    ×