SlideShare a Scribd company logo
IBM SECRET-KEY
MANGEMENT PROTOCOL
PRESENTED BY (CRYPTAQUIRE)
GAURI PATIL - 69
JIGAR CHAHUHAN - 17
JAYPRAKRASH CHAURASIA - 20
ROHIT CHAURASIA - 21
DIVYANG KHATRI - 47
HISTORY
• In late 1970,by IBM developed complete key management system for
Communication and security purpose.(using symmetric key cryptography).
• This protocol provides three things: secure communications between a server and
several terminals, secure file storage at the server, and secure communication
among servers.
INTERNAL WORKING OF KEYS
• The heart of the protocol is a tamper-resistant module, called a cryptographic facility.
• The most important keys, those used to generate the actual encryption keys, are
stored in this module. These keys can never be read once they are stored. And they
are tagged by use: A key dedicated for one purpose cannot accidentally be used for
another.
KM0
(master key)
KM1 KM2
A VARIATION
• This scheme of master and session keys can be found in [1478].
• It’s built around network nodes with key notarization facilities that serve local
terminals
• Why it’s designed?
Secure two way communication at any terminal.
Secure communication using encrypted mail
Personal file protection, digital signature capability.
1.Scheme uses keys
generated in the key notarization facility
and sent to the users encrypted under
a master key
2.This key
notarization feature is
central to the system
3.A key could have only come
from a particular source and
could
only be read at a particular
destination
BENEFITS OF KEY MANAGEMENT OF IBM
1.Centralized, transparent key management through provide secure storage of key
material and the serving of keys at the time of use.
2. Simple, secure integration between data-at-rest storage systems and IBM Security
Key Lifecycle Manager with the industry-standard KMIP protocol.
3.Reduces key management costs by automating the assignment and rotation of keys.
FEATURES OF IBM SECURITY KEY LIFECYCLE
MANAGER
Enables multi-master clustering for flexibility, ease of use
Provides more efficient and simplified key management
Delivers simple secure integration with IBM storage systems
Speeds implementation and enables interoperability
Provides certified communications
• IBM security key lifecycle manager supports multi-master clustering.
• Give more flexibility, synchronized and delivered in real time.
• More than 20 master may be synchronized at a time, allowing for hyper-redundancy
and localized
• Availability.
• So keys are ready and available when and where they are needed.
1. ENABLES MUTI-MASTER CLUSTERING
FOR FLEXIBILITY, EASE OF USE
https://www.ibm.com/in-en/marketplace/ibm-security-key-lifecycle-manager
2.PROVIDES MORE EFFICIENT AND SIMPLIFIED
KEY MANAGEMENT
• This will allow manage the lifecycle of keys by automating the creation, import,
distribution and back-up of keys.
• generation and distribution from a centralized location and groups devices into
separate domains for simpler key management.
• supports role-based access control of administrative accounts.
3.PROVIDES CERTIFIED COMMUNICATIONS
• Communications will be certified with the Storage Networking Industry Association
Secure Storage Industry Forum (SNIA-SSIF) as compliant with version 1.2 of the
OASIS KMIP standard.
• What is OASIS KMIP standard ?
4. DELIVERS SIMPLE SECURE INTEGRATION
WITH IBM STORAGE SYSTEMS
• end-to-end security for key serving.
• supports Federal Information Processing Standard(US gov. computer security).
• There certain levels which enhance key security.
for e.g : FIPS 140-2 Level 3 validated hardware
5. SPEEDS IMPLEMENTATION AND ENABLES
INTEROPERABILITY
• reduces operating costs, speeds implementation and enables interoperability with
wizard-based assistance.
• It allows administrators to quickly configure integration with multiple KMIP- and IPP-
compatible devices and provides an administration welcome page that delivers
critical notices.
• solution offers a web-based GUI that helps ease key configuration and management
tasks, including automating key provisioning, rotating keys and destroying keys.
KEY MANAGEMENT
• A dynamic VPN provides additional security for your communications by using the Internet Key Exchange
(IKE) protocol for key management.
• A security association (SA) contains information that is necessary to use the IPSec protocols. For
example, an SA identifies algorithm types, key lengths and lifetimes, participating parties, and
encapsulation modes.
• There are two phase.
• Phase 1:
• master secret from which subsequent cryptographic keys are derived in order to protect user data
traffic.
• VPN uses either RSA signature mode or preshared keys to authenticate phase 1 negotiations, as
well as to establish the keys that protect the IKE messages that flow during the subsequent phase 2
negotiations.
• Negotiates the security associations and keys that protect the actual application data
exchanges, no application data has actually been sent. Phase 1 protects the phase
2 IKE messages.
• Once phase 2 negotiations are complete, your VPN establishes a secure,
dynamic connection over the network and between the endpoints that you
defined for your connection. All data that flows across the VPN is delivered
with the degree of security and efficiency that was agreed on by the key
servers during the phase 1 and phase 2 negotiation processes.
PHASE 2:
Thank You

More Related Content

What's hot

Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
Barani Tharan
 
Sha3
Sha3Sha3
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
ArthyR3
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Hash function
Hash function Hash function
Hash function
Salman Memon
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
Aes
AesAes
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
farazvirk554
 
Cryptography
Cryptography Cryptography
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
omarShiekh1
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
ankita pandey
 

What's hot (20)

Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
Sha3
Sha3Sha3
Sha3
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Cryptography
CryptographyCryptography
Cryptography
 
Hash function
Hash function Hash function
Hash function
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Aes
AesAes
Aes
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Cryptography
Cryptography Cryptography
Cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
 

Similar to IBM Secret Key management protoco

Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17
LennartF
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016
Leif Davidsen
 
IBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedIBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplified
Anthony Beardsmore
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
AliMohamed855266
 
network security
network securitynetwork security
network security
Dayanna Moyano
 
CCNA_Security_02.ppt
CCNA_Security_02.pptCCNA_Security_02.ppt
CCNA_Security_02.ppt
veracru1
 
Curso de Seguridad de Redes Inalambricas CCNA
Curso de Seguridad de Redes Inalambricas CCNACurso de Seguridad de Redes Inalambricas CCNA
Curso de Seguridad de Redes Inalambricas CCNA
VictorTonio
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
ssusere142fe
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Luigi Perrone
 
System 6000
System 6000System 6000
System 6000
Mail Box Production
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
Mike Sherwood
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
Citrix
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
ali raza
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security components
D.Rajesh Kumar
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
cnnetwork
 
Quantum brochure
Quantum brochureQuantum brochure
Quantum brochure
Mail Box Production
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
KishoreTs3
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
HelpSystems
 
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Leif Davidsen
 

Similar to IBM Secret Key management protoco (20)

Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016
 
IBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedIBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplified
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
network security
network securitynetwork security
network security
 
CCNA_Security_02.ppt
CCNA_Security_02.pptCCNA_Security_02.ppt
CCNA_Security_02.ppt
 
Curso de Seguridad de Redes Inalambricas CCNA
Curso de Seguridad de Redes Inalambricas CCNACurso de Seguridad de Redes Inalambricas CCNA
Curso de Seguridad de Redes Inalambricas CCNA
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
System 6000
System 6000System 6000
System 6000
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security components
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
Quantum brochure
Quantum brochureQuantum brochure
Quantum brochure
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 
Chapter08
Chapter08Chapter08
Chapter08
 
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
 

Recently uploaded

JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

IBM Secret Key management protoco

  • 1. IBM SECRET-KEY MANGEMENT PROTOCOL PRESENTED BY (CRYPTAQUIRE) GAURI PATIL - 69 JIGAR CHAHUHAN - 17 JAYPRAKRASH CHAURASIA - 20 ROHIT CHAURASIA - 21 DIVYANG KHATRI - 47
  • 2. HISTORY • In late 1970,by IBM developed complete key management system for Communication and security purpose.(using symmetric key cryptography). • This protocol provides three things: secure communications between a server and several terminals, secure file storage at the server, and secure communication among servers.
  • 3. INTERNAL WORKING OF KEYS • The heart of the protocol is a tamper-resistant module, called a cryptographic facility. • The most important keys, those used to generate the actual encryption keys, are stored in this module. These keys can never be read once they are stored. And they are tagged by use: A key dedicated for one purpose cannot accidentally be used for another.
  • 5. A VARIATION • This scheme of master and session keys can be found in [1478]. • It’s built around network nodes with key notarization facilities that serve local terminals • Why it’s designed? Secure two way communication at any terminal. Secure communication using encrypted mail Personal file protection, digital signature capability.
  • 6. 1.Scheme uses keys generated in the key notarization facility and sent to the users encrypted under a master key 2.This key notarization feature is central to the system 3.A key could have only come from a particular source and could only be read at a particular destination
  • 7. BENEFITS OF KEY MANAGEMENT OF IBM 1.Centralized, transparent key management through provide secure storage of key material and the serving of keys at the time of use. 2. Simple, secure integration between data-at-rest storage systems and IBM Security Key Lifecycle Manager with the industry-standard KMIP protocol. 3.Reduces key management costs by automating the assignment and rotation of keys.
  • 8. FEATURES OF IBM SECURITY KEY LIFECYCLE MANAGER Enables multi-master clustering for flexibility, ease of use Provides more efficient and simplified key management Delivers simple secure integration with IBM storage systems Speeds implementation and enables interoperability Provides certified communications
  • 9. • IBM security key lifecycle manager supports multi-master clustering. • Give more flexibility, synchronized and delivered in real time. • More than 20 master may be synchronized at a time, allowing for hyper-redundancy and localized • Availability. • So keys are ready and available when and where they are needed. 1. ENABLES MUTI-MASTER CLUSTERING FOR FLEXIBILITY, EASE OF USE https://www.ibm.com/in-en/marketplace/ibm-security-key-lifecycle-manager
  • 10. 2.PROVIDES MORE EFFICIENT AND SIMPLIFIED KEY MANAGEMENT • This will allow manage the lifecycle of keys by automating the creation, import, distribution and back-up of keys. • generation and distribution from a centralized location and groups devices into separate domains for simpler key management. • supports role-based access control of administrative accounts.
  • 11. 3.PROVIDES CERTIFIED COMMUNICATIONS • Communications will be certified with the Storage Networking Industry Association Secure Storage Industry Forum (SNIA-SSIF) as compliant with version 1.2 of the OASIS KMIP standard. • What is OASIS KMIP standard ?
  • 12. 4. DELIVERS SIMPLE SECURE INTEGRATION WITH IBM STORAGE SYSTEMS • end-to-end security for key serving. • supports Federal Information Processing Standard(US gov. computer security). • There certain levels which enhance key security. for e.g : FIPS 140-2 Level 3 validated hardware
  • 13. 5. SPEEDS IMPLEMENTATION AND ENABLES INTEROPERABILITY • reduces operating costs, speeds implementation and enables interoperability with wizard-based assistance. • It allows administrators to quickly configure integration with multiple KMIP- and IPP- compatible devices and provides an administration welcome page that delivers critical notices. • solution offers a web-based GUI that helps ease key configuration and management tasks, including automating key provisioning, rotating keys and destroying keys.
  • 14. KEY MANAGEMENT • A dynamic VPN provides additional security for your communications by using the Internet Key Exchange (IKE) protocol for key management. • A security association (SA) contains information that is necessary to use the IPSec protocols. For example, an SA identifies algorithm types, key lengths and lifetimes, participating parties, and encapsulation modes. • There are two phase. • Phase 1: • master secret from which subsequent cryptographic keys are derived in order to protect user data traffic. • VPN uses either RSA signature mode or preshared keys to authenticate phase 1 negotiations, as well as to establish the keys that protect the IKE messages that flow during the subsequent phase 2 negotiations.
  • 15. • Negotiates the security associations and keys that protect the actual application data exchanges, no application data has actually been sent. Phase 1 protects the phase 2 IKE messages. • Once phase 2 negotiations are complete, your VPN establishes a secure, dynamic connection over the network and between the endpoints that you defined for your connection. All data that flows across the VPN is delivered with the degree of security and efficiency that was agreed on by the key servers during the phase 1 and phase 2 negotiation processes. PHASE 2:

Editor's Notes

  1. Just read all content
  2. Explain 2-3 lines on OASIS KMIP
  3. FIPS is us government security….there are certain level to enhance its security…
  4. IBM implement’s this features….