Скачать презентацию PACKETLIGHT ENCRYPTION SOLUTION 0 1 0 1 0 Скачать презентацию PACKETLIGHT ENCRYPTION SOLUTION 0 1 0 1 0

fda33ae91f49d308fc98c028f612309e.ppt

  • Количество слайдов: 45

PACKETLIGHT ENCRYPTION SOLUTION 0 1 0 1 0 1 0 0 1 0 0 PACKETLIGHT ENCRYPTION SOLUTION 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 0 0 0 0 1 1 1 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 0 0 0 0 1 1 1 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 1 0 1 0 0 0 0 1 1 1 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 1 0 1 0 0 1 1 1 0 1 0 1 0 PL-1000 TE Crypto Gb. E, 10 G, 40 G Eth, 4 G/8 G/10/16 G FC 0 1 0 1 0 0 1 1 1 0 1 0 1 0

The RAD Group No. of employees = 4, 500 Group sales in 2014= $1. The RAD Group No. of employees = 4, 500 Group sales in 2014= $1. 2 billion The Service Assured Solutions Company Established: 1981 Group Distributor in Israel and Worldwide System Integrator Established: 1975 DDOS Protection Solutions Established: 2012 *Publicly Traded Companies CWDM and DWDM Solutions Established: 2000 Network Test Solutions Established: 1991* Coordinated Strategy Shared Sales Channels Joint Development & Technology Industrial Communication Solutions Established: 2009 Hi-end Adapters for Servers Established: 1987* Wireless Mobile Backhaul Established: 1996* Integrated Application Delivery Established: 1997* Sub-6 GHz Wireless Backhaul Established: 1997

About Packet. Light • Established in year 2000 • Packet. Light develops state of About Packet. Light • Established in year 2000 • Packet. Light develops state of the art CWDM & DWDM and OTN layer products § For transport of data, storage, voice and video applications § All our products are Green technology with low power consumption compliant with international standards • Design & Manufacturing in Israel • Thousands of installations worldwide • Member of the RAD group

The Packet. Light Differentiators 4 The Packet. Light Differentiators 4

Building Agile CWDM, DWDM Infrastructure 5 Building Agile CWDM, DWDM Infrastructure 5

Building WDM + OTN Based Metro/Access networks 3 rd Party OTN Infrastructure OTU 2/OTU Building WDM + OTN Based Metro/Access networks 3 rd Party OTN Infrastructure OTU 2/OTU 4 6

Packet. Light Product Portfolio Infrastructure Muxponders OTN Solutions Transponders PL-1000 TN- 6 x 8 Packet. Light Product Portfolio Infrastructure Muxponders OTN Solutions Transponders PL-1000 TN- 6 x 8 G/10 G OTN Services PL-1000 TE-Crypto: 8 x 1 G-10 G services PL-1000 T: 100 G Transponder PL-1000: 4 x 10 G Services PL-1000 GM/GT- 100 G Muxponder/Transponder PL-400: 8 x Sub 10 G Services PL-2000 - Up to 16 any service Muxponder PL-1000 EM: 10 x Gb. E Muxponder PL-1000 IL: Optical Amplifiers PL-1000 RO: WSS ROADM PL-300: Passive Solutions 7 7

Comprehensive Feature Set 3 R Multi Chassis Scalability Bidirectional 3 R Up to 96 Comprehensive Feature Set 3 R Multi Chassis Scalability Bidirectional 3 R Up to 96 WL Mux/Demux Optical Amplifiers Remote Management Layer 1 Encryption Multiple Topology Support Muxponders Family Protection Single or Dual Fiber Network Diagnostics Firewall NMS SNMP Performance Monitoring CWDM / DWDM & OTN ROADMs Network Protocols 8

Encryption Essential and Awareness Is Growing • It is not so difficult to tap Encryption Essential and Awareness Is Growing • It is not so difficult to tap fiber optics, , many “youtubes” videos show simple it is • Government have initiated new sets of laws and guideline to protect essential and financial infrastructures • Hackers and cyber attacks are posing strategic treats to any enterprise 9

Benefit of Layer-1 Encryption • Encryption on all the data passing over the fiber, Benefit of Layer-1 Encryption • Encryption on all the data passing over the fiber, no room for omissions • Transparent, maintaining full bandwidth of the traffic • Beneficial for low latency applications • Covering the physical fiber tapping detection • Interface to existing DWDM infrastructure and Telco OTN networks • No need to change or upgrade the Layer-2/3 switch/routers 10

Fiber Security Layers Physical Layer § Optical power monitoring per service § Automatic detection Fiber Security Layers Physical Layer § Optical power monitoring per service § Automatic detection of fiber tapping Data Plane § § Layer-1 Transparent full bandwidth Encryption GCM-AES-256 (Advanced Encryption Standard) Diffie Hellman Key exchange Authentication using SHA-256 Management Plane § § § SNMPv 3 Radius Management Firewall HTTPS Secure Shell 11

Encryption throughput 12 Encryption throughput 12

PL-1000 TE-Crypto Features “ 1 U Data and Storage Layer-1 Encryption solution” • • PL-1000 TE-Crypto Features “ 1 U Data and Storage Layer-1 Encryption solution” • • 8 full Bi-Directional 3 R Multi type/rate Transponders 8 independent encryption AES-256 machines and keys exchange per service Fully compliant with FIPS 140 -2 Level 2 and NSA Suite B Flexible, user configurable Multirate Interfaces support for: • • Data: Gb. E, 10 Gb. E, 40 Gb. E LAN Storage: 4 G/8 G/10 G/16 G FC Performance Monitoring on all interfaces Data flow transparent, Ultra Low latency Optional 1+1 optical facility protection using Optical Switch Integrated passive optics (Mux/De. Mux), optical amplifiers (EDFAs) Pay as you grow architecture (Pluggable SFP+s) 13 Dual redundant pluggable AC/DC PSU and FAN unit

PL-1000 TE-Crypto Encryption Solution Description • • • Support 8 independent bi-directional encryption/decryption machines PL-1000 TE-Crypto Encryption Solution Description • • • Support 8 independent bi-directional encryption/decryption machines Each encryption/decryption machine can be configured to a different service rate/type and has its own key exchange and pre shared secret Conforms with known Encryption standards : § § • GCM-AES-256 (Advanced Encryption Standard) Diffie Hellman Key exchange FIPS 140 -2 Security Level 2 Suite B CNSSP-15 Cryptography Encryption Mechanism PL-1000 TE Encryption supports: § Confidentiality § Data integrity § Authentication • Support user configurable services: – 1 G/10 G/40 G Ethernet – 4 G/8 G/10 G/16 G FC • • • Low latency < 20 µsec for encrypted 10 G ETH Support secured key distribution 14 8 optical transponder, optional Mux/De. Mux, optical amp and OSW

PL-1000 TE Encryption Functionality Requirement Function Cryptographic Algorithm Encryption Algorithm Key Management Key Establishment PL-1000 TE Encryption Functionality Requirement Function Cryptographic Algorithm Encryption Algorithm Key Management Key Establishment Algorithm FIPS 140 -2 GCM-AES-256 Suite B FIPS 197 and SP 800 -38 D SP 800 -56 A Key Message digest with Secure Hash Algorithm 2 (SHA-256) Authentication a Pre Shared Key Yes FIPS 180 -4 Elliptic Curve Cryptography Cofactor Diffie. Hellman (ECC CDH) with a Pre-Shared Secret Yes Yes N/A Self Tests Integrity tests On power up check digestion for software encryption modules and run test vectors with known answers (KAT) Random Number Generator Used for keys generation True Random (TRNG) with FDK-100, and Deterministic random bit generator (DRBG) SP 800 -90 N/A Role Based, User/Password authentication Yes N/A Tamper evidence Yes Access Control Authentication Physical security EMI/EMC FCC Part 15 Class A Services Supported Services Yes N/A Gb. E, 10 Gb. E, 40 Gb. E 4 G-FC, 8 G-FC, 10 G-FC, 16 G-FC 15 N/A

Mapping of the Encrypted Services • The mapping of the encrypted services is done Mapping of the Encrypted Services • The mapping of the encrypted services is done according to the following table: Service Client Rate Uplink Rate Encrypted Signal Rate Encrypted 10 Gb. E 10. 3125 G 10 Gb. E Encrypted 1 Gb. E 1. 25 G 2. 125 G 2 GFC Encrypted 4 G FC 4. 25 G 10. 3125 G 10 Gb. E Encrypted 8 G FC 8. 5 G 10. 3125 G 10 Gb. E Encrypted 10 G FC 10. 51875 G 10 GFC Encrypted 16 G FC 14. 025 G 16 GFC Encrypted 40 Gb. E 4 x 10. 3125 G 4 x 10 Gb. E • The bit rate of the encrypted 64 b/66 b service is the same as the client rate • The Diffie-Hellman key exchange is done in-band to the encrypted signal 16

PL-1000 TE-Crypto Applications • Secured fiber network infrastructure for: § § Gov and data PL-1000 TE-Crypto Applications • Secured fiber network infrastructure for: § § Gov and data center connectivity Banks, Credit card companies and other financial institutes Cloud providers and ISP backbone Utilities and essential infrastructure • Feeder of encrypted services to existing Optical Transport Networks (OTN) • Managed encrypted wavelength services offered by service providers • Internal data center secured connectivity 17

8 Encrypted Services Agnostic To Switch Vendor 8 Encrypted Services Agnostic To Switch Vendor

Secured Fiber Network Infrastructure Encrypted Services PL-1000 TE Crypto Encryption Managed by customer Switch/Router Secured Fiber Network Infrastructure Encrypted Services PL-1000 TE Crypto Encryption Managed by customer Switch/Router Vendor agnostic 1 G/10 G/40 G Eth, 4 G/8 G/10 G/16 G FC

Encrypted Services Over OTN Backbone OTU 2/OTU 4 10/100 G OTN Backbone (OTU 2/OTU Encrypted Services Over OTN Backbone OTU 2/OTU 4 10/100 G OTN Backbone (OTU 2/OTU 4) 3 rd Party OTN Infrastructure

10 G Encryption Over Standard 100 G OTU 4 Uplink Dark Fiber/OTU 4 10 10 G Encryption Over Standard 100 G OTU 4 Uplink Dark Fiber/OTU 4 10 G LAN 8 G FC Using 10 G Encrypted uplinks in to 100 G OTU 4 uplink 21

10 G Encryption Over Standard 10 G OTU 2 Uplink Dark Fiber/OTU 2 10 10 G Encryption Over Standard 10 G OTU 2 Uplink Dark Fiber/OTU 2 10 G LAN 8 G FC Using 10 G Encrypted uplinks in to 10 G OTU 2 uplink 22

23 23

Service Type Selection Service Type Selection

Encryption Configuration 25 Encryption Configuration 25

Crypto Officer Functionality • • The Crypto Officer is a single built-in user 'crypto' Crypto Officer Functionality • • The Crypto Officer is a single built-in user 'crypto' that is not manageable by the Admin user. Only the Crypto Officer is allowed to change its own password (default: 'crypto') Only the Crypto Officer has an access to the Encryption tab with the pre-shared-secret information, and the Key Exchange Period. In all other terms the behavior of the Crypto Officer user is like a Read-Only user for the GUI and CLI purposes. The Crypto Officer user can logged in to the device remotely via the Web-GUI over HTTP/HTTPS. The Crypto Officer user is not available via SNMPv 3 To prevent Admin changing the service type from encrypted to non-encrypted, the Crypto Officer has the option to lock the encrypted service. For locked encrypted service, the admin user can not change the service type. In addition, if there is at least one locked service, the admin is not allowed to: restore-tofactory-defaults, load a previously saved configuration file, switch 26 between SW loads

Firewall • Built-in Firewall allows blocking of any selected IP address or protocol/s. 27 Firewall • Built-in Firewall allows blocking of any selected IP address or protocol/s. 27

PL-1000 TE Management Security • • • HTTPS – Secured HTTP Support SNMPv 3 PL-1000 TE Management Security • • • HTTPS – Secured HTTP Support SNMPv 3 SSH - Secured Shell (telnet) 28

RADIUS • PL-1000 TE supports RADIUS for centralized user management • Up to two RADIUS • PL-1000 TE supports RADIUS for centralized user management • Up to two RADIUS servers are supported for protection 29

Thank you! www. packetlight. com Thank you! www. packetlight. com

MORE TECHNICAL SLIDES MORE TECHNICAL SLIDES

AES Background • AES- Advances Encryption Standard • Asymmetric Encryption- for Key Exchange, protocols AES Background • AES- Advances Encryption Standard • Asymmetric Encryption- for Key Exchange, protocols SSH, VPN, Web • Symmetric Encryption- for Data • FIPS 197 -Federal Information Processing Standard • Testing protocol to make sure implementation is correct • AES-256 the strongest encryption Random Number Generator RNG 32

Advanced Encryption Standard (AES) • • • 33 The Advanced Encryption Standard (AES) is Advanced Encryption Standard (AES) • • • 33 The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U. S. National Institute of Standards and Technology (NIST) in 2001. AES has been adopted by the U. S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES), which was published in 1977. For AES, NIST selected three members of the family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. PL-1000 TE is using the stronger version AES with key of 256 bits.

PL-1000 TE Security Features • Data Plane § Encryption § Key Exchange § Power-up PL-1000 TE Security Features • Data Plane § Encryption § Key Exchange § Power-up tests § Optical Power Drop detection § Crypto Officer § Optical Power Monitoring for tap detection • Management Plane § Role based User/Password Authentication § Protocols: HTTPS/SHA/SNMPv 3 § Firewall § RADIUS 34

NIST FIPS 140 -2 Security Level 2 35 © 2015 Coriant. All rights reserved. NIST FIPS 140 -2 Security Level 2 35 © 2015 Coriant. All rights reserved.

Galois Counter Mode (GCM) • Galois/Counter Mode (GCM) is a mode of operation for Galois Counter Mode (GCM) • Galois/Counter Mode (GCM) is a mode of operation for symmetric key cryptographic block ciphers. • It is an authenticated encryption algorithm designed to provide both data authenticity (integrity) and confidentiality. • GCM is defined for block ciphers with a block size of 128 bits. • PL-1000 TEis using GCM with message integrity code (MIC) of 128 bits. 36

Diffie-Hellman Key Exchange • • • 37 DH ECDH protocol compliant with SP 800 Diffie-Hellman Key Exchange • • • 37 DH ECDH protocol compliant with SP 800 -56 A Secure Hash Algorithm 2 (SHA-256) message digest Protection for a Man-In-The-Middle attack with 256 bits (64 bytes) Pre-Shared. Secret Configurable Key-Exchange period with granularity of 1 minute. The pre-shared secret consists of hexadecimal numbers

DH Algorithm 1. Alice and Bob agree to use a prime number p = DH Algorithm 1. Alice and Bob agree to use a prime number p = 23 and base g = 5 (which is a primitive root modulo 23). 2. Alice chooses a secret integer a = 6, then sends Bob A = g^a mod p § A = 5⁶ mod 23 = 8 3. Bob chooses a secret integer b = 15, then sends Alice B = g^b mod p § B = 5¹⁵ mod 23 = 19 4. Alice computes s = B^a mod p § s = 19⁶ mod 23 = 2 5. Bob computes s = A^b mod p § s = 8¹⁵ mod 23 = 2 6. Alice and Bob now share a secret (the number 2) 38

Cryptographic Hash Function • A cryptographic hash function is a hash function which is Cryptographic Hash Function • A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. • The input data is often called the message, and the hash value is often called the message digest or simply the digest. • The ideal cryptographic hash function has four main properties: 1. it is easy to compute the hash value for any given message 2. it is infeasible to generate a message from its hash 3. it is infeasible to modify a message without changing the hash 4. it is infeasible to find two different messages with the same hash. The PL-1000 TE is using the SHA-256 hash function to authenticate the DH messages, and to compute the digest of the cryptographic modules for the power up tests The SHA function takes the pre-shared secret to digest the Diffie-Hellman protocol messages. This way the peer side can ensure that the Diffie. Hellman message was not sent by someone else and prevent the Man-In-The-Middle attack. • • • 39

Self Tests • • • A cryptographic module perform power-up self-tests and conditional self-tests Self Tests • • • A cryptographic module perform power-up self-tests and conditional self-tests to ensure that the module is functioning properly. Power-up self-tests are performed when the cryptographic module is powered up (including integrity tests, KAT, etc). Conditional self-tests are performed when an applicable security function or operation is invoked. If a cryptographic module fails a self-test, the module must enter an error state and output an error indicator via the status output interface. The cryptographic module shall not perform any cryptographic operations while in an error state. All data output via the data output interface shall be inhibited when an error state exists. 40

Crypto Officer • • The Crypto-Officer is a single built-in user crypto that is Crypto Officer • • The Crypto-Officer is a single built-in user crypto that is not manageable by the Admin user. Only the Crypto Officer is allowed to change its own password (default: crypto) The Crypto Officer has an access to the Encryption tab with the pre-shared-secret information, and the Key Exchange Period. In all other terms the behavior of the Crypto Officer user is like a Read-Only user for the GUI and CLI purposes. The Crypto Officer user is not available via SNMPv 3. The Crypto Officer user can reach a box remotely via the Web-GUI over HTTP/HTTPS only To prevent Admin changing the service type from encrypted to non-encrypted, the Crypto Officer has the option to lock the encrypted service. For locked encrypted service, the admin user can not change the service type. In addition, if there is at least one locked service, the admin is not allowed to: restoreto-factory-defaults, load a previously saved configuration file, switch between SW loads 41

Management Interfaces and Protocols • Interfaces § OSC – 2 x 100 M/1000 M Management Interfaces and Protocols • Interfaces § OSC – 2 x 100 M/1000 M optical interface § LAN – RJ 45 § Serial – RS 232 • Protocols § § § HTTP/HTTPS Telnet/SSH SNMPv 1/SNMPv 2 c/SNMPv 3 Syslog RADIUS TFTP/FTP /*/ secured protocols 42

Hardware Security • Conformance to EMI/EMC requirements § EMI: Electromagnetic Interference • Does the Hardware Security • Conformance to EMI/EMC requirements § EMI: Electromagnetic Interference • Does the module interfere with other equipment? • EMI is caused by undesirable radiated electromagnetic fields or conducted voltages and currents. § EMC: Electromagnetic Compatibility • Does other equipment interfere with the module? • EMC is the ability of electrical or electronic equipment/systems to function in the intended operating environment without causing or experiencing performance degradation due to unintentional EMI. • • For Levels 1 and 2, an FCC part 15 class A certification is required Tamper Evidence – required for Security Level 2 • • PL-1000 TE has FCC part 15 class A certification PL-1000 TE is using special labels on the box screws for tamper evidence 43

Optical Power Drop Detection • An event is created if the optical power is Optical Power Drop Detection • An event is created if the optical power is dropped by more than 2 d. B • The event can be used to detect tapping attempts to the fiber 44 © 2015 Coriant. All rights reserved.

Additional Cryptography Terms • • • • • NIST - USA National Institute of Additional Cryptography Terms • • • • • NIST - USA National Institute of Standards and Technology NSA – USA National Security Agency FIPS 140 -2 – NIST Federal Information Processing Standards security requirements for cryptography modules rev. 2 Suite B – a subset of the cryptographic algorithms covered by FIPS 140 -2, recommended by the NSA Encryption - the process of encoding messages or information in such a way that only authorized parties can read Data Authentication - provides a way to check that the message has not been altered Peer Authentication - provides a way to make sure that you are talking to a trusted other side, not an adversary Symmetric Key - the same key is used for encryption and decryption Key stream – Key + IV IV - Initialization vector (also called “salt”, “nonce”) used to ensure uniqueness of the key stream CTR – a block cipher mode of operation that uses incrementing IV counter for the key stream source GCM - Galois Counter Mode uses CTR mode for encryption, and Galois multiplication for data authentication MIC - Message Integrity Code used for authentication KAT - Known Answer Test self-tests that are performed during power up self tests DRBG - Deterministic Random Bit Generator used to generate a sequence of random numbers based on a TRNG – True Random Number Generator based on a pure source of entropy (“noise”) DES - Data Encryption Standard AES - Advanced Encryption Standard (also referenced as Rijndael) 45