SlideShare a Scribd company logo
1 of 26
Cryptomach Ltd. defended privacy
Company Activity ,[object Object],[object Object],[object Object],[object Object],[object Object]
Company Structure Department of scientific researches and hardware-software developments   ( R&D ) Department of integrated security systems (ISS) Digital Signature Certification Authority (DSCA)
Loyalty Card with Digital Signature Function Contact chip  (Infineon SLE66C42P) Contactless chip  (NXP Mifare DESFire)  with   built-in antenna Plastic with printed personal information on the back side of the card Card Structure Supported Cryptoalgorithms Digital signature :  DSTU  4145-2002  with key length  191  bit Session   keys derivation based on DH scheme and  DSTU 4145-2002 S ymmetric  ciphering and   MAC   authentication :  GOST  28147-89 Hash function :  GOST  34.311-95 Authentication and traffic encryption for contactless interface : Triple-DES
Card’s Functions Card owner identification tool (ID data is digitally signed) Reliable private keys keeper and digital signature tool (keys are generated and used only in the chip memory) Establishing secure channel for confidential data flow protection between user’s workstation and a server of the system Payment   Tool   that supports National Payment System of Ukraine  ( NSMEP), application  « check »  (PIN protected payments) Protected Storage of the Medical Emergency Information that provide secure reading and synchronization procedures Access Control Tool to the Private Information Storages on the workstation or at the network Contactless   card for Physical Access Control Systems (PACS). One card could support up to 12 PAC zones with independent keys. Support of loyalty systems and prepaid services based on contactless  technology Data Access  Control Loyalty System  support % Physical  Access Control E mergency Information Payment Card Digital  Signature Encrypted  Tunnel with Server Owner  Identification
Contactless Secure Physical Access Control Readers Implementation of cryptographic subsystem  for monitoring and access control systems on  the basis of contactless MIFARE Plus / DESFire / Ultralight C   smart cards (with reliable encryption) Contactless smart card (compatible with  DESFire ) or secure memory card (MIFARE Plus / Ultralight C) Crypto  subsystem   of PACS consists of three hardware elements : Executive (Door) Contactless Reader Service Contactless Reader
Main Features of Secure Readers Supporting of   open  cryptographic  standards : 3DES  /  AES,  with key length  112  and more   bit Key system fully defined by customer, each card has unique secrete key Contactless cards support : ISO 14443A/B Open protocol and   command system for   operating with card : MIFARE DESFire  EV1 One card supports up to 12 zones (access areas) with independent key systems Provide a   flexible and full secure   key management system Model with PIN-keyboard (by order)   2 bi-color LEDs and sound indication of operation state Communication   interface of executive and service readers with host-computer : USB 2.0 Communication   interfaces of executive reader   with PAC controller : Wiegand-26 /56 ,  KODOS,  RS-232/RS-485 ( optional )   Product can be adapted according the customer’s demands after specifications approval
Readers Integration Support of widespread communication protocols with PAC controllers   Cryptosystem is transparent for PACS Possibility of integration into existing PACS Possibility of step-by-step switch to cryptoprotected cards in the existing MIFARE based PACS
Smart Reader Platform ,[object Object],[object Object],[object Object],[object Object],[object Object],Multi-purpose hardware-software platform for development of the protected terminals for the contactless smart and secure memory cards servicing (it supports MIFARE Plus , Ultralight C ,  DESFire EV1 )   It is enough to realize the business logic of an appropriate user cards processing for completing specialized device on the basis of this platform
Smart Reader Platform Functionality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The platform contains the ready for use implementation of the main functions necessary for the terminal business logic implementation:
Secure keeping and usage of secret keys Hardware   Security   Module  « cm Token» True Random Numbers Generator (based on physical noise processing) Mutual Dynamic Authentication based on a symmetric algorithm Establishing of   secure channel with remote   authentication   server PIN-code protected storage of the   authentication keys and confidential data access keys
Generation of the strong random sequences   based on   physical source of noise Real-time automatic check of generated random sequence for accordance to the FIPS 140-2 Supported encryption algorithms:  AES -256  (FIPS 197) , GOST 28147-89, DSTU 4145-2002 (option) Models with  PIN-keyboard or fingerprint sensor (by order) Device has the token   form-factor of with  USB 2.0  interface Product can be adapted according the customer’s demands after specifications approval Hardware   Security   Module  « cm Token» 1 2 6 5 4 3
Joins LAN of remote offices in common virtual private network (VPN) with securing of the data transmitted through a public network Provides secure connection of portable workstations to data centre (server) by the ciphered and authentic channel D evice for  traffic tunneling and VPN creation over public networks IPsec implementation supported by hardware acceleration (AES, SHA, TRNG) Network   Security Device  "IP-encryptor"
Traffic Inspection: FireWall, IDS, AntiVirus Network   Safety Device  "IP-encryptor" Full control over built-in Web- interface Ethernet : Up to 5x RJ-45 LAN Gigabit Ethernet ports IP-Router (Static, RIP, BGP), Proxy, Traffic shaper Traffic protection: AES-256, SHA-256, GOST 28147-89, GOST 34311-95   Smart card based boot authentication (option) Supports Public Keys Infrastructure Hardware True Random Numbers Generator Quiet Computing (models without moving parts)
Secure Virtual Drive   Secure Data Storage   “ On-the-fly” encrypting by reliable ciphers without noticeable performance degradation Connection of the encrypted volume only after two-factor authentication (smart card + password) Securing of a virtual logical partition operated "below" a file system The standard recommended for usage in Ukraine that allows to use the product in the state organizations and establishments   Secure Virtual Drive allows to select the symmetric block cipher for container securing: Allows to use the most modern international standards of symmetric enciphering providing high reliability and efficiency AES-128 / 192 / 256   (FIPS 197) Camellia-128 / 192 / 256 GOST  28147-89
Fast and transparent disk operation (after  container mounting  the operation with the  secured volume  is carried out in the same way, as  for  usual  logical disks ) Creation of arbitrary   amount of protected   containers  (files which store the enciphered logical volume) Simultaneous mounting up to 8 protected disks Change of access password and/or smart card to a container without re-enciphering Usage of the reliable random numbers generator for secret keys generation Possibilities of  «Secure Virtual Drive»
Supports of various file systems - NTFS, FAT32, FAT Hot list for fast mounting of often used disks  Possibility to hide the free (unused) space of the protected container Fast and reliable erasing of the protected disk content without possibility to restore Support of emergency and safe unmounting of used disks Possibilities of  «Secure Virtual Drive»
Instant Messaging   Encryption Software «Crypto-IM»   Our  Miranda  IM plug-in provides secured interchange of  Instant Messages between Cryptomach PKI users For the secure conversation establishing it is necessary, that both correspondents must have valid Cryptomach CA certificates and use Miranda IM with our plug-in Crypto-IM Protocol independent messages encryption by GOST 28147-89 or AES-256 / Camellia-256 (option) Digital signature and ECDH session key derivation support Certificate based talker authentication and key derivation Certificate status on-line validation support (by Cryptomach CA) Active smart cards and tokens usage for private keys keeping and operating Hardware based session keys generation
GSM  Voice Encryption Software  «CryptoPhone»  Communication privacy the new  service at the market of  mobile communication
Application of the reliable cryptography for guaranteeing the traffic confidentiality and subscribers authenticity Secure channel establishing between end-users of GSM-communication GSM  Voice Encryption Software  «CryptoPhone»
Secure key setup protocol “ End-Point-to-End-Point“   Traffic protection Voice protection by usage of reliable and block cipher AES-256 (FIPS-197) Usage of the codec that provide sufficient   quality for low bit rate Protected text messages exchange Protected File Transfer GSM  Voice Encryption Software  «CryptoPhone»   1 2 6 5 4 3
General-purpose cryptographic libraries for support of own and third-party software products GOST 28147-89  (4 modes of operation defined by standard) AES, Camellia, DES ,  Triple-DES (5   modes of operation: ECB, OFB, CFB, CBC, CTR) Ukrainian Hashing standard GOST 34.311-95 International Hashing standards SHA-2, SHA-1, MD-5 Ukrainian Digital Signature standard DSTU 4145-2002 Key establishment standard DSTU ISO/IEC 15946-3 Foreign Digital Signature standards GOST 34.10 - 2000, ECDSA, ECGDSA, ECKDSA IEEE P1363 Key agreement schemes   ECKAS DH1, ECKAS DH2, ECKAS MQV Cryptographic Libraries
Pre-Boot Authentication Pre-Boot Authentication Hardware-software solution for user authentication before OS loading Working stations protection from unauthorized access Two-factor authentification of the user on the basis of the individual key carrier (smart card or USB-token) and the access password The software can be configured for operation with one or several OS In the case of key carrier   absence or authentication fail, the workstation loading can be either prohibited, or default OS could be loaded
The solution supports the operation with following key carriers of Cryptomach Ltd. : Pre-Boot Authentication Optionally the range of the supported carriers can be expanded by certain models, and also the solution can be integrated with other tools of disk partition enciphering. Smart card / token of the «GOST Key Keeper» system  Multifunctional smart-card «Social Card» USB- breloque  «cmToken»
Our Services Software development for information protection systems with individual requirements Hardware and hardware-software development of information protection complexes with individual requirements Consulting in the field of information technologies and information protection Theoretical researches in the field of information protection systems, development of new cryptographic algorithms and protocols, cryptanalysis research Electronic digital signature services in the  Digital Signature Certification Authority of  "Cryptomach Ltd." Services of administration and technical support of informational infrastructure 1 2 6 5 4 3
Contacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

15 sensors and proximity nfc and bluetooth
15   sensors and proximity nfc and bluetooth15   sensors and proximity nfc and bluetooth
15 sensors and proximity nfc and bluetoothWindowsPhoneRocks
 
ACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDAdvanced Card Systems Ltd.
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_usEmma Garnier
 
Omnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz SecurityOmnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz Security2FA, Inc.
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenówSzymon Dowgwillowicz-Nowicki
 
Fingerprint Time Attendance Systems with SUPREMA Bio Entry Plus
Fingerprint Time Attendance Systems with SUPREMA Bio Entry PlusFingerprint Time Attendance Systems with SUPREMA Bio Entry Plus
Fingerprint Time Attendance Systems with SUPREMA Bio Entry PlusAbdullah Al Masum
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)ADARSH KUMAR
 
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations NXP MIFARE Team
 
Blaze Automation Access Contrl Solutions
Blaze Automation Access Contrl SolutionsBlaze Automation Access Contrl Solutions
Blaze Automation Access Contrl SolutionsBlaze Automation
 

What's hot (18)

15 sensors and proximity nfc and bluetooth
15   sensors and proximity nfc and bluetooth15   sensors and proximity nfc and bluetooth
15 sensors and proximity nfc and bluetooth
 
Access controls
Access controlsAccess controls
Access controls
 
Rio pro-secure-2pp-a4-brochure-uk rio-pro-secure-2pp-a4-uk-issue-1-web
Rio pro-secure-2pp-a4-brochure-uk rio-pro-secure-2pp-a4-uk-issue-1-webRio pro-secure-2pp-a4-brochure-uk rio-pro-secure-2pp-a4-uk-issue-1-web
Rio pro-secure-2pp-a4-brochure-uk rio-pro-secure-2pp-a4-uk-issue-1-web
 
ACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCD
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_us
 
Omnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz SecurityOmnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz Security
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Talk-ID Engels (1)
Talk-ID Engels (1)Talk-ID Engels (1)
Talk-ID Engels (1)
 
Bio stamp 2c_-_bst2c02
Bio stamp 2c_-_bst2c02Bio stamp 2c_-_bst2c02
Bio stamp 2c_-_bst2c02
 
2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów
 
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011   RFID - NÂO ENVIADO AO EVENTONullcon 2011   RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
 
Civintec introduction 2015
Civintec introduction 2015Civintec introduction 2015
Civintec introduction 2015
 
Fingerprint Time Attendance Systems with SUPREMA Bio Entry Plus
Fingerprint Time Attendance Systems with SUPREMA Bio Entry PlusFingerprint Time Attendance Systems with SUPREMA Bio Entry Plus
Fingerprint Time Attendance Systems with SUPREMA Bio Entry Plus
 
Rklb57 rwklb575 ds_en
Rklb57 rwklb575 ds_enRklb57 rwklb575 ds_en
Rklb57 rwklb575 ds_en
 
System 6000
System 6000System 6000
System 6000
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)
 
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
 
Blaze Automation Access Contrl Solutions
Blaze Automation Access Contrl SolutionsBlaze Automation Access Contrl Solutions
Blaze Automation Access Contrl Solutions
 

Viewers also liked (7)

Narrative still life
Narrative still lifeNarrative still life
Narrative still life
 
Art And Technology
Art And TechnologyArt And Technology
Art And Technology
 
Inkwash1
Inkwash1Inkwash1
Inkwash1
 
Toned paper
Toned paperToned paper
Toned paper
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_En
 
Perspective
PerspectivePerspective
Perspective
 
Studycircle_041013
Studycircle_041013Studycircle_041013
Studycircle_041013
 

Similar to Cryptomach_En

Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Semlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex Europe
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
Web security
Web securityWeb security
Web securityLayla Tk
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere générationSylvain Maret
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsLinaro
 

Similar to Cryptomach_En (20)

Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control PanelsmartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Semlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex's Crossfinger - ENG
Semlex's Crossfinger - ENG
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Web security
Web securityWeb security
Web security
 
IoT Sense
IoT Sense IoT Sense
IoT Sense
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Cryptomach_En

  • 2.
  • 3. Company Structure Department of scientific researches and hardware-software developments ( R&D ) Department of integrated security systems (ISS) Digital Signature Certification Authority (DSCA)
  • 4. Loyalty Card with Digital Signature Function Contact chip (Infineon SLE66C42P) Contactless chip (NXP Mifare DESFire) with built-in antenna Plastic with printed personal information on the back side of the card Card Structure Supported Cryptoalgorithms Digital signature : DSTU 4145-2002 with key length 191 bit Session keys derivation based on DH scheme and DSTU 4145-2002 S ymmetric ciphering and MAC authentication : GOST 28147-89 Hash function : GOST 34.311-95 Authentication and traffic encryption for contactless interface : Triple-DES
  • 5. Card’s Functions Card owner identification tool (ID data is digitally signed) Reliable private keys keeper and digital signature tool (keys are generated and used only in the chip memory) Establishing secure channel for confidential data flow protection between user’s workstation and a server of the system Payment Tool that supports National Payment System of Ukraine ( NSMEP), application « check » (PIN protected payments) Protected Storage of the Medical Emergency Information that provide secure reading and synchronization procedures Access Control Tool to the Private Information Storages on the workstation or at the network Contactless card for Physical Access Control Systems (PACS). One card could support up to 12 PAC zones with independent keys. Support of loyalty systems and prepaid services based on contactless technology Data Access Control Loyalty System support % Physical Access Control E mergency Information Payment Card Digital Signature Encrypted Tunnel with Server Owner Identification
  • 6. Contactless Secure Physical Access Control Readers Implementation of cryptographic subsystem for monitoring and access control systems on the basis of contactless MIFARE Plus / DESFire / Ultralight C smart cards (with reliable encryption) Contactless smart card (compatible with DESFire ) or secure memory card (MIFARE Plus / Ultralight C) Crypto subsystem of PACS consists of three hardware elements : Executive (Door) Contactless Reader Service Contactless Reader
  • 7. Main Features of Secure Readers Supporting of open cryptographic standards : 3DES / AES, with key length 112 and more bit Key system fully defined by customer, each card has unique secrete key Contactless cards support : ISO 14443A/B Open protocol and command system for operating with card : MIFARE DESFire EV1 One card supports up to 12 zones (access areas) with independent key systems Provide a flexible and full secure key management system Model with PIN-keyboard (by order) 2 bi-color LEDs and sound indication of operation state Communication interface of executive and service readers with host-computer : USB 2.0 Communication interfaces of executive reader with PAC controller : Wiegand-26 /56 , KODOS, RS-232/RS-485 ( optional ) Product can be adapted according the customer’s demands after specifications approval
  • 8. Readers Integration Support of widespread communication protocols with PAC controllers Cryptosystem is transparent for PACS Possibility of integration into existing PACS Possibility of step-by-step switch to cryptoprotected cards in the existing MIFARE based PACS
  • 9.
  • 10.
  • 11. Secure keeping and usage of secret keys Hardware Security Module « cm Token» True Random Numbers Generator (based on physical noise processing) Mutual Dynamic Authentication based on a symmetric algorithm Establishing of secure channel with remote authentication server PIN-code protected storage of the authentication keys and confidential data access keys
  • 12. Generation of the strong random sequences based on physical source of noise Real-time automatic check of generated random sequence for accordance to the FIPS 140-2 Supported encryption algorithms: AES -256 (FIPS 197) , GOST 28147-89, DSTU 4145-2002 (option) Models with PIN-keyboard or fingerprint sensor (by order) Device has the token form-factor of with USB 2.0 interface Product can be adapted according the customer’s demands after specifications approval Hardware Security Module « cm Token» 1 2 6 5 4 3
  • 13. Joins LAN of remote offices in common virtual private network (VPN) with securing of the data transmitted through a public network Provides secure connection of portable workstations to data centre (server) by the ciphered and authentic channel D evice for traffic tunneling and VPN creation over public networks IPsec implementation supported by hardware acceleration (AES, SHA, TRNG) Network Security Device "IP-encryptor"
  • 14. Traffic Inspection: FireWall, IDS, AntiVirus Network Safety Device "IP-encryptor" Full control over built-in Web- interface Ethernet : Up to 5x RJ-45 LAN Gigabit Ethernet ports IP-Router (Static, RIP, BGP), Proxy, Traffic shaper Traffic protection: AES-256, SHA-256, GOST 28147-89, GOST 34311-95 Smart card based boot authentication (option) Supports Public Keys Infrastructure Hardware True Random Numbers Generator Quiet Computing (models without moving parts)
  • 15. Secure Virtual Drive Secure Data Storage “ On-the-fly” encrypting by reliable ciphers without noticeable performance degradation Connection of the encrypted volume only after two-factor authentication (smart card + password) Securing of a virtual logical partition operated "below" a file system The standard recommended for usage in Ukraine that allows to use the product in the state organizations and establishments Secure Virtual Drive allows to select the symmetric block cipher for container securing: Allows to use the most modern international standards of symmetric enciphering providing high reliability and efficiency AES-128 / 192 / 256 (FIPS 197) Camellia-128 / 192 / 256 GOST 28147-89
  • 16. Fast and transparent disk operation (after container mounting the operation with the secured volume is carried out in the same way, as for usual logical disks ) Creation of arbitrary amount of protected containers (files which store the enciphered logical volume) Simultaneous mounting up to 8 protected disks Change of access password and/or smart card to a container without re-enciphering Usage of the reliable random numbers generator for secret keys generation Possibilities of «Secure Virtual Drive»
  • 17. Supports of various file systems - NTFS, FAT32, FAT Hot list for fast mounting of often used disks Possibility to hide the free (unused) space of the protected container Fast and reliable erasing of the protected disk content without possibility to restore Support of emergency and safe unmounting of used disks Possibilities of «Secure Virtual Drive»
  • 18. Instant Messaging Encryption Software «Crypto-IM» Our Miranda IM plug-in provides secured interchange of Instant Messages between Cryptomach PKI users For the secure conversation establishing it is necessary, that both correspondents must have valid Cryptomach CA certificates and use Miranda IM with our plug-in Crypto-IM Protocol independent messages encryption by GOST 28147-89 or AES-256 / Camellia-256 (option) Digital signature and ECDH session key derivation support Certificate based talker authentication and key derivation Certificate status on-line validation support (by Cryptomach CA) Active smart cards and tokens usage for private keys keeping and operating Hardware based session keys generation
  • 19. GSM Voice Encryption Software «CryptoPhone» Communication privacy the new service at the market of mobile communication
  • 20. Application of the reliable cryptography for guaranteeing the traffic confidentiality and subscribers authenticity Secure channel establishing between end-users of GSM-communication GSM Voice Encryption Software «CryptoPhone»
  • 21. Secure key setup protocol “ End-Point-to-End-Point“ Traffic protection Voice protection by usage of reliable and block cipher AES-256 (FIPS-197) Usage of the codec that provide sufficient quality for low bit rate Protected text messages exchange Protected File Transfer GSM Voice Encryption Software «CryptoPhone» 1 2 6 5 4 3
  • 22. General-purpose cryptographic libraries for support of own and third-party software products GOST 28147-89 (4 modes of operation defined by standard) AES, Camellia, DES , Triple-DES (5 modes of operation: ECB, OFB, CFB, CBC, CTR) Ukrainian Hashing standard GOST 34.311-95 International Hashing standards SHA-2, SHA-1, MD-5 Ukrainian Digital Signature standard DSTU 4145-2002 Key establishment standard DSTU ISO/IEC 15946-3 Foreign Digital Signature standards GOST 34.10 - 2000, ECDSA, ECGDSA, ECKDSA IEEE P1363 Key agreement schemes ECKAS DH1, ECKAS DH2, ECKAS MQV Cryptographic Libraries
  • 23. Pre-Boot Authentication Pre-Boot Authentication Hardware-software solution for user authentication before OS loading Working stations protection from unauthorized access Two-factor authentification of the user on the basis of the individual key carrier (smart card or USB-token) and the access password The software can be configured for operation with one or several OS In the case of key carrier absence or authentication fail, the workstation loading can be either prohibited, or default OS could be loaded
  • 24. The solution supports the operation with following key carriers of Cryptomach Ltd. : Pre-Boot Authentication Optionally the range of the supported carriers can be expanded by certain models, and also the solution can be integrated with other tools of disk partition enciphering. Smart card / token of the «GOST Key Keeper» system Multifunctional smart-card «Social Card» USB- breloque «cmToken»
  • 25. Our Services Software development for information protection systems with individual requirements Hardware and hardware-software development of information protection complexes with individual requirements Consulting in the field of information technologies and information protection Theoretical researches in the field of information protection systems, development of new cryptographic algorithms and protocols, cryptanalysis research Electronic digital signature services in the Digital Signature Certification Authority of "Cryptomach Ltd." Services of administration and technical support of informational infrastructure 1 2 6 5 4 3
  • 26.