SlideShare a Scribd company logo
1 of 2
Download to read offline
Introduction to
ACS Keystroke Transport
Layer Security™
(KTLS™
)
p until now, enterprises and government agencies
have lacked the ability to fully protect their endpoints
from a zero day keylogger, the single biggest threat that is
leveraged in the first stages of almost all advanced
threats. A keylogger, a primary component of all malware
and advanced persistent threats, is a type of surveillance
software that has the capability to record every keystroke
an employee makes on their keyboard. In addition, most
keyloggers come with the ability to change their form
(polymorphic) and go on undetected as they quickly
spread between the endpoints within the Enterprise.
KTLS ™ Protocol’s basic premise is that strong
cryptography should always begin at Ring 0 and not only
at Layer 4, Transport Layer, of the OSI.
KTLS™ Overview:
Keystroke Transport Layer Security™ (KTLS™) is an ACS
patented cryptographic protocol that provides for the
encryption and transport of keystrokes originating from the
kernel at the time of secure boot, entry in to any
application, web application or web browser. While SSL
and TLS begin strong cryptography at Layer 4 or, the
Transport Layer within OSI, KTLS™ begins strong
cryptography from the kernel level at ring 0 and encrypts
all keystrokes.
KTLS™ protocol can be utilized in both endpoint desktop
(PC and MAC) and endpoint mobile (IOS and Android)
environments as a primary component of endpoint
security. Endpointlock™ is the commercial product name
by which KTLS™ protocol is implemented within an
enterprise.
The primary goal of the patented KTLS™ protocol is to
provide strong cryptography at the time of keystroke entry
to protect the initial transmission of usernames and
passwords (as required by HIPPA, PCI 8.2.1 and 8.2.1a
and Homeland Security’s Critical Infrastructure Protection
Guidelines (“CIP”) and subsequent keystrokes entered in
to any program or application.
3880 VETERANS MEMORIAL HIGHWAY, BOHEMIA, NY 11716 | p: 1-866-417-9155
WWW.ADVANCEDCYBERSECURITY.COM
U
U.S. Department of Defense
TPM Requirements
The United States Department of
Defense (DoD) specifies that
"new computer assets (e.g.,
server, desktop, laptop, thin
client, tablet, smartphone,
personal digital assistant,
mobile phone) procured to
support DoD will include a TPM
version 1.2 or higher where
required by DISA STIGs and
where such technology is
available." The TPM is
anticipated to be used for device
identification, authentication,
encryption, measurement, and
device integrity.
KTLS™ protocol is currently
integrated in to Intel’s TPM for
enterprise endpoint desktop
deployments. If Intel (or other)
TPM is available for mobile
devices KTLS™ protocol can be
deployed.
3880 VETERANS MEMORIAL HIGHWAY, BOHEMIA, NY 11716 | p: 1-866-417-9155
WWW.ADVANCEDCYBERSECURITY.COM
When secured by KTLS™ protocol, connections between the keystroke and
applications have the following properties:
• Keystroke Cryptography begins within the kernel at Ring 0.
• Both encryption and decryption occur directly within the application without any
modification to the application required.
• The keys for this symmetric encryption are generated uniquely for each
connection and are based on a shared secret that is generated directly from the
Trusted Platform Module (“TPM”).
• The negotiation of a shared secret is both secure (the negotiated secret is
unavailable to Keyloggers and cannot be obtained, even by an attacker who
places himself in the middle of the connection) and reliable (no attacker can
modify the keystroke transmission during the negotiation without being detected
and kernel layer alerts being generated).
• The Key management is the management of cryptographic keys. KTLS™ uses
the AES algorithm with a key size of 256 bits to encrypt keystrokes. AES is a
symmetric encryption scheme. The same key is used to encrypt and decrypt.
• The Session key is generated once per session (KTLS™ loaded/unloaded). It
can be generated either by a TPM chip (if it is there), or else by a built-in Random
Number Generator.
• If a TPM chip is available for access to the KTLS™ system components, the
Session Key is encrypted/decrypted by a TPM Master Key Pair (RSA 2048 public
key cryptosystem), which resides on the TPM chip (and never leaves it).
• The encrypted Session Key is stored in secure memory shared by all KTLS™
system components. The TPM Master Key Pair is generated by the TPM chip
every time the computer is powered up. This can be accessed via the NULL
hierarchy.
• If a TPM chip is not available for access to the KTLS™ system components, the
Session Key is encrypted/decrypted by a Storage Master Key (AES 256 Key)
comprised of a combination of a hard coded part and a randomly generated part.
KTLS™
Overview continued

More Related Content

What's hot

PKI for DevOps
PKI for DevOpsPKI for DevOps
PKI for DevOpsDevOps.com
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyCryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyEric Larcheveque
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsAirTight Networks
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture shortAvirot Mitamura
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverijmnct
 
Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecurityLancope, Inc.
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)Maarten Mulders
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
Capitulo 6 v 2 0
Capitulo 6 v 2 0Capitulo 6 v 2 0
Capitulo 6 v 2 0milkux
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 

What's hot (20)

PKI for DevOps
PKI for DevOpsPKI for DevOps
PKI for DevOps
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyCryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
 
How We Protected Our Router
How We Protected Our RouterHow We Protected Our Router
How We Protected Our Router
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
 
Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Capitulo 6 v 2 0
Capitulo 6 v 2 0Capitulo 6 v 2 0
Capitulo 6 v 2 0
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

Similar to KTLS White-paper - Cyber - Keystroke Encryption technology

Omlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile PaymentsOmlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile PaymentsSimon Cairns
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestSandeep Patil
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionSenetas
 
Cryptomach_En
Cryptomach_EnCryptomach_En
Cryptomach_Ende77
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET Journal
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Mukesh Chinta
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?Alan Tatourian
 
Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESijsptm
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!OWASP
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)Alan Tatourian
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsLinaro
 

Similar to KTLS White-paper - Cyber - Keystroke Encryption technology (20)

Omlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile PaymentsOmlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile Payments
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Cryptomach_En
Cryptomach_EnCryptomach_En
Cryptomach_En
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg Final
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 

Recently uploaded

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 

Recently uploaded (7)

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 

KTLS White-paper - Cyber - Keystroke Encryption technology

  • 1. Introduction to ACS Keystroke Transport Layer Security™ (KTLS™ ) p until now, enterprises and government agencies have lacked the ability to fully protect their endpoints from a zero day keylogger, the single biggest threat that is leveraged in the first stages of almost all advanced threats. A keylogger, a primary component of all malware and advanced persistent threats, is a type of surveillance software that has the capability to record every keystroke an employee makes on their keyboard. In addition, most keyloggers come with the ability to change their form (polymorphic) and go on undetected as they quickly spread between the endpoints within the Enterprise. KTLS ™ Protocol’s basic premise is that strong cryptography should always begin at Ring 0 and not only at Layer 4, Transport Layer, of the OSI. KTLS™ Overview: Keystroke Transport Layer Security™ (KTLS™) is an ACS patented cryptographic protocol that provides for the encryption and transport of keystrokes originating from the kernel at the time of secure boot, entry in to any application, web application or web browser. While SSL and TLS begin strong cryptography at Layer 4 or, the Transport Layer within OSI, KTLS™ begins strong cryptography from the kernel level at ring 0 and encrypts all keystrokes. KTLS™ protocol can be utilized in both endpoint desktop (PC and MAC) and endpoint mobile (IOS and Android) environments as a primary component of endpoint security. Endpointlock™ is the commercial product name by which KTLS™ protocol is implemented within an enterprise. The primary goal of the patented KTLS™ protocol is to provide strong cryptography at the time of keystroke entry to protect the initial transmission of usernames and passwords (as required by HIPPA, PCI 8.2.1 and 8.2.1a and Homeland Security’s Critical Infrastructure Protection Guidelines (“CIP”) and subsequent keystrokes entered in to any program or application. 3880 VETERANS MEMORIAL HIGHWAY, BOHEMIA, NY 11716 | p: 1-866-417-9155 WWW.ADVANCEDCYBERSECURITY.COM U
  • 2. U.S. Department of Defense TPM Requirements The United States Department of Defense (DoD) specifies that "new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by DISA STIGs and where such technology is available." The TPM is anticipated to be used for device identification, authentication, encryption, measurement, and device integrity. KTLS™ protocol is currently integrated in to Intel’s TPM for enterprise endpoint desktop deployments. If Intel (or other) TPM is available for mobile devices KTLS™ protocol can be deployed. 3880 VETERANS MEMORIAL HIGHWAY, BOHEMIA, NY 11716 | p: 1-866-417-9155 WWW.ADVANCEDCYBERSECURITY.COM When secured by KTLS™ protocol, connections between the keystroke and applications have the following properties: • Keystroke Cryptography begins within the kernel at Ring 0. • Both encryption and decryption occur directly within the application without any modification to the application required. • The keys for this symmetric encryption are generated uniquely for each connection and are based on a shared secret that is generated directly from the Trusted Platform Module (“TPM”). • The negotiation of a shared secret is both secure (the negotiated secret is unavailable to Keyloggers and cannot be obtained, even by an attacker who places himself in the middle of the connection) and reliable (no attacker can modify the keystroke transmission during the negotiation without being detected and kernel layer alerts being generated). • The Key management is the management of cryptographic keys. KTLS™ uses the AES algorithm with a key size of 256 bits to encrypt keystrokes. AES is a symmetric encryption scheme. The same key is used to encrypt and decrypt. • The Session key is generated once per session (KTLS™ loaded/unloaded). It can be generated either by a TPM chip (if it is there), or else by a built-in Random Number Generator. • If a TPM chip is available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a TPM Master Key Pair (RSA 2048 public key cryptosystem), which resides on the TPM chip (and never leaves it). • The encrypted Session Key is stored in secure memory shared by all KTLS™ system components. The TPM Master Key Pair is generated by the TPM chip every time the computer is powered up. This can be accessed via the NULL hierarchy. • If a TPM chip is not available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a Storage Master Key (AES 256 Key) comprised of a combination of a hard coded part and a randomly generated part. KTLS™ Overview continued