SlideShare a Scribd company logo
TrustLeapAuthentication Platform (One-Time Passwords)
MULTIPASS
www.trustleap.com
Unbreakable Passwords For Cloud Services
TODAY'S STATE OF THE ART
RSA SecurID and VASCO Digipass
dongles make 6-digit OTP (One-Time
Passwords) for use in Web applications,
VPNs, firewalls, servers or to protect rights
(multimedia, patents, contracts, etc.).
But just looking at these values sent via
public networks (and exposed on people's
desks or belts) makes it possible to identify
each dongle's secret key.
With this information, all the passwords
that a dongle will issue in the future can be
calculated in advance.
SecurID reverse-engineered in 2000 is
"easily breakable" claim experts. The
newest AES-based SecurID 800 has
been cracked in 2012 in... 13 minutes.
Some claim that SSL and static PINs make
these exposures impossible or harmless.
But SSL delegates the security chain, and
these broken OTP designs were supposed
to be safer than static PIN codes.
2 AND 3-FACTOR DONE PROPERLY
Instead of using leaking hashes made by
imperfect encryption, TrustLeap tokens are
proven as cryptanalytically unbreakable
(safe against unlimited computing power).
TrusLeap-secured data can't be attacked:
it does not expose enough information to
make it possible to break the encryption.
Intercepting tokens cannot help to guess
any future values. And altering, hijacking or
replaying sessions will just lead to bad
passwords, instantly raising alerts.
TrustLeap tokens' lifespan is also limited,
but this delay can't be used to predict
future passwords: indistinguishable from
true random data, there's nothing to break
as there's no remaining correlation to spot.
The RSA SecurID fiasco illustrates how
weak technology can cause undetectable
harm: all the RSA dongle fraudsters were
properly authenticated – by systems which
design was too weak to be trustworthy.
© 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 1/4
TrustLeap
TrustLeap MULTIPASS
MULTIPASS RATIONALE
Rightly, the established practice of using
static passwords is discouraged: like user
names, static passwords can too easily be
guessed, stolen, reused, or passed on.
But passwords can only be safe when they
are (a) confidential, (b) unpredictable and
(c) can't be stolen nor replayed.
Two-factor authentication vendors have
provided banks, critical infrastructure, and
governments with OTP dongles breaking
all these three mandatory conditions:
To build passwords, RSA dongles and
servers must use shared secret keys.
Using imperfect encryption schemes
made it possible to recover, break, or
bypass these keys. For decades.
As similar by-design issues are found in
the PKI used to sign documents and to
authenticate users and hosts, this is a
whole generation of trusted solutions which
needs to be revisited.
Regulators incite users to invest in security
solutions so there's a need for future-proof
technologies invulnerable by-design.
MULTIPASS is a certified FIPS 140-2
authentication solution that takes great
care at not replicating any of the technical
errors made by the prior generation of
authentication systems.
HOW IT WORKS
(1) On TrustLeap servers, mathematically-
proven cryptographic tools process secure
tokens to build personalized OTPs (One
Time Passwords).
(2) Users get secure tokens on-demand via
their preferred OoB (Out-of-Band) channel
(SMS, QKD, mail, fax, etc.).
(3) Users salt tokens with their secret
UserID to access Cloud services which are
using TrustLeap servers for validation.
FEATURES
• only true random data is transmitted
(secret keys are safe by-design);
• tokens are IP-based and time-based
but can be tied to other parameters;
• OoB (Out-of-Band) delivery by SMS,
QKD, mail, fax, etc.
• uncorrelated tokens generated via
mathematically-proven unbreakable
cryptography (an exclusivity);
• safer than RSA dongles that can be
lost, stolen or broken.
BENEFITS
• future-proof: unbreakable by-design;
• no hardware dongles required;
• could be used to secure dongles;
• no infrastructure change required;
• instantly deployable on-demand;
• higher costs/benefits solution;
• safe against loss and robbery.
TRUSTLEAP SERVERS
As all transactions and user activity are
logged, administrators can audit, invoice
and comply with regulatory constraints.
TrustLeap provides by-design unbreakable
security without changing users' habits,
interfaces, or infrastructure. This helps to
reduce your operational costs and your
organization's surface of vulnerability.
© 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 2/4
TrustLeap
ADMINISTRATION
Provisioning users on-demand:
1. user asks help desk to register ID
2. help desk adds user to its database
3. user can reach protected resources.
The whole process can be handled in less
than a minute. De-provisioning users, or
disabling users temporally is even faster.
Help desk administrators can also create
many users at once via import interfaces.
PASSWORD DELIVERY
Users accessing a protected resource:
1. user asks a one-time password (OTP)
2. the OTP is sent if credentials are valid
3. users salt the OTP with their secret
UserID to access protected resources.
OTP and UserID are secret as they don't
travel on the Internet and both are needed
to login successfully. Reply attacks fail as
each OTP is unique. Being uncorrelated
OTPs are also provably unbreakable.
Further, authentication services can be
restricted by group (or by user) hour by
hour, and day by day, all along the week.
ALERTS, AUDITS AND REPORTING
Reports covering all user, help desk and
server activity can be made by using SQL
to query encrypted (read-only) logs:
• geo-localization (users' IP address)
• action time-stamps (vs open-hours)
• user provisioning, granted IDs, etc.
• authentication/delivery failures.
Future-proof solutions protect you against
unknown threats and obsolescence.
© 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 3/4
TrustLeap
OTP 75CF-1A63
TrustLeap
Worldwide Corporate HQ
TrustLeap
Paradiesli 17
CH-8842 Unteriberg SZ
Switzerland
Phone +41 (0)55 414 20 93
Fax +41 (0)55 414 20 67
Email info@trustleap.com
www.trustleap.com
About TrustLeap
TrustLeap, the TWD Industries AG security division, protects digital assets with cryptanalytically
unbreakable technology (safe against unlimited computing power as it is proven mathematically
that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise,
cloud, networking, digital media and financial services in global strategic markets.
TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can
safely trust each-other. Establishing widespread trust enables organizations to secure their
infrastructure, raise the value of their offers and safely market their digital assets.
© 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 4/4
TrustLeap

More Related Content

What's hot

Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
Real-Time Innovations (RTI)
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
Guardicore
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Charalampos Doukas
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
Matthew McCullough
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
Lancope, Inc.
 
HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...
HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...
HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...
Компания УЦСБ
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
Amazon Web Services
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
Peter Waher
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_final
Bryan Fite
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
HP Enterprise Italia
 
The CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionThe CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and Encryption
DATAVERSITY
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFC
Slawomir Jasek
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
Priyanka Aash
 
Encryption Boot Camp at JavaZone 2010
Encryption Boot Camp at JavaZone 2010Encryption Boot Camp at JavaZone 2010
Encryption Boot Camp at JavaZone 2010
Matthew McCullough
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
Ruben Merre
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Positive Hack Days
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
Amazon Web Services
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JSFestUA
 

What's hot (20)

Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...
HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...
HP TippingPoint Решение по предотвращению вторжений критических инфраструктур...
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_final
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
The CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionThe CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and Encryption
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFC
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 
Encryption Boot Camp at JavaZone 2010
Encryption Boot Camp at JavaZone 2010Encryption Boot Camp at JavaZone 2010
Encryption Boot Camp at JavaZone 2010
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 

Similar to TrustLeap Multipass - Unbreakable Passwords For Cloud Services

IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
Hillel Kobrovski
 
The Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL CertificatesThe Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL Certificates
CheapSSLsecurity
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
RapidSSLOnline.com
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
cnnetwork
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
Array Networks
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
Hai Nguyen
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
OKsystem
 
Inro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLInro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSL
Dipankar Achinta
 
Online Authentication
Online AuthenticationOnline Authentication
Online Authentication
Marc-Andre Heroux
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
thinkASG
 
SSLtalk
SSLtalkSSLtalk
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
Zscaler
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
Toni de la Fuente
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
Richard Blech
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
CipherCloud
 

Similar to TrustLeap Multipass - Unbreakable Passwords For Cloud Services (20)

IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
 
The Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL CertificatesThe Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL Certificates
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
 
Inro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLInro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSL
 
Online Authentication
Online AuthenticationOnline Authentication
Online Authentication
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

TrustLeap Multipass - Unbreakable Passwords For Cloud Services

  • 1. TrustLeapAuthentication Platform (One-Time Passwords) MULTIPASS www.trustleap.com Unbreakable Passwords For Cloud Services TODAY'S STATE OF THE ART RSA SecurID and VASCO Digipass dongles make 6-digit OTP (One-Time Passwords) for use in Web applications, VPNs, firewalls, servers or to protect rights (multimedia, patents, contracts, etc.). But just looking at these values sent via public networks (and exposed on people's desks or belts) makes it possible to identify each dongle's secret key. With this information, all the passwords that a dongle will issue in the future can be calculated in advance. SecurID reverse-engineered in 2000 is "easily breakable" claim experts. The newest AES-based SecurID 800 has been cracked in 2012 in... 13 minutes. Some claim that SSL and static PINs make these exposures impossible or harmless. But SSL delegates the security chain, and these broken OTP designs were supposed to be safer than static PIN codes. 2 AND 3-FACTOR DONE PROPERLY Instead of using leaking hashes made by imperfect encryption, TrustLeap tokens are proven as cryptanalytically unbreakable (safe against unlimited computing power). TrusLeap-secured data can't be attacked: it does not expose enough information to make it possible to break the encryption. Intercepting tokens cannot help to guess any future values. And altering, hijacking or replaying sessions will just lead to bad passwords, instantly raising alerts. TrustLeap tokens' lifespan is also limited, but this delay can't be used to predict future passwords: indistinguishable from true random data, there's nothing to break as there's no remaining correlation to spot. The RSA SecurID fiasco illustrates how weak technology can cause undetectable harm: all the RSA dongle fraudsters were properly authenticated – by systems which design was too weak to be trustworthy. © 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 1/4 TrustLeap
  • 2. TrustLeap MULTIPASS MULTIPASS RATIONALE Rightly, the established practice of using static passwords is discouraged: like user names, static passwords can too easily be guessed, stolen, reused, or passed on. But passwords can only be safe when they are (a) confidential, (b) unpredictable and (c) can't be stolen nor replayed. Two-factor authentication vendors have provided banks, critical infrastructure, and governments with OTP dongles breaking all these three mandatory conditions: To build passwords, RSA dongles and servers must use shared secret keys. Using imperfect encryption schemes made it possible to recover, break, or bypass these keys. For decades. As similar by-design issues are found in the PKI used to sign documents and to authenticate users and hosts, this is a whole generation of trusted solutions which needs to be revisited. Regulators incite users to invest in security solutions so there's a need for future-proof technologies invulnerable by-design. MULTIPASS is a certified FIPS 140-2 authentication solution that takes great care at not replicating any of the technical errors made by the prior generation of authentication systems. HOW IT WORKS (1) On TrustLeap servers, mathematically- proven cryptographic tools process secure tokens to build personalized OTPs (One Time Passwords). (2) Users get secure tokens on-demand via their preferred OoB (Out-of-Band) channel (SMS, QKD, mail, fax, etc.). (3) Users salt tokens with their secret UserID to access Cloud services which are using TrustLeap servers for validation. FEATURES • only true random data is transmitted (secret keys are safe by-design); • tokens are IP-based and time-based but can be tied to other parameters; • OoB (Out-of-Band) delivery by SMS, QKD, mail, fax, etc. • uncorrelated tokens generated via mathematically-proven unbreakable cryptography (an exclusivity); • safer than RSA dongles that can be lost, stolen or broken. BENEFITS • future-proof: unbreakable by-design; • no hardware dongles required; • could be used to secure dongles; • no infrastructure change required; • instantly deployable on-demand; • higher costs/benefits solution; • safe against loss and robbery. TRUSTLEAP SERVERS As all transactions and user activity are logged, administrators can audit, invoice and comply with regulatory constraints. TrustLeap provides by-design unbreakable security without changing users' habits, interfaces, or infrastructure. This helps to reduce your operational costs and your organization's surface of vulnerability. © 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 2/4 TrustLeap
  • 3. ADMINISTRATION Provisioning users on-demand: 1. user asks help desk to register ID 2. help desk adds user to its database 3. user can reach protected resources. The whole process can be handled in less than a minute. De-provisioning users, or disabling users temporally is even faster. Help desk administrators can also create many users at once via import interfaces. PASSWORD DELIVERY Users accessing a protected resource: 1. user asks a one-time password (OTP) 2. the OTP is sent if credentials are valid 3. users salt the OTP with their secret UserID to access protected resources. OTP and UserID are secret as they don't travel on the Internet and both are needed to login successfully. Reply attacks fail as each OTP is unique. Being uncorrelated OTPs are also provably unbreakable. Further, authentication services can be restricted by group (or by user) hour by hour, and day by day, all along the week. ALERTS, AUDITS AND REPORTING Reports covering all user, help desk and server activity can be made by using SQL to query encrypted (read-only) logs: • geo-localization (users' IP address) • action time-stamps (vs open-hours) • user provisioning, granted IDs, etc. • authentication/delivery failures. Future-proof solutions protect you against unknown threats and obsolescence. © 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 3/4 TrustLeap OTP 75CF-1A63
  • 4. TrustLeap Worldwide Corporate HQ TrustLeap Paradiesli 17 CH-8842 Unteriberg SZ Switzerland Phone +41 (0)55 414 20 93 Fax +41 (0)55 414 20 67 Email info@trustleap.com www.trustleap.com About TrustLeap TrustLeap, the TWD Industries AG security division, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets. TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets. © 2007 - 2013 TrustLeap® / MULTIPASS® – Unbreakable Passwords For Cloud Services 4/4 TrustLeap