際際滷

際際滷Share a Scribd company logo
Dr. V. Kumar Murty 
CTO, Perfect Cloud Corp. 
www.perfectcloud.io
BIOGRAPHY: 
DR. V. KUMAR MURTY ! 
 CTO, PerfectCloud.io 
 Professor and Chair, Department of 
Mathematics, University of Toronto 
 Director, GANITA Labs, University of 
Toronto 
 Ph.D. Harvard University 
 Fellow of the Royal Society of Canada 
 Foreign Fellow of the National Academy 
of Sciences (India) 
 100+ papers, 5 books and 2 patents in 
Information Security 
CTO, 
PerfectCloud.io 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
SOME ATTRIBUTES 
OF DATA 
 
Confiden;ality 
 
Privacy 
 
Iden;ty 
 
Reliability 
(Data 
Integrity) 
 
Trust 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
FOUR OVERLAPPING THEMES 
INFORMATION MANAGEMENT 
Security 
Trust 
Privacy 
Identity 
CONFIDENTIALITY 
SELF-DETERMINATION 
ASSURANCE 
ATTRIBUTES 
GOOD IDENTITY MANAGEMENT STRENGTHENS 
SECURITY, PRIVACY AND TRUST! 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
PROVISIONING 
TOOLS 
 Confiden;ality: 
Encryp;on 
 Privacy: 
Access 
Control 
 Iden;ty: 
IDM 
 Reliability: 
Digital 
fingerprints 
 Trust: 
Digital 
signatures 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
ENCRYPTION 
 Secret 
wri;ng 
 Symmetric 
and 
Asymmetric 
 Plaintext 
+ 
Secret 
Key 
is 
transformed 
to 
Ciphertext 
 Decryp;on: 
Ciphertext 
+ 
Secret 
Key 
is 
transformed 
to 
Plaintext 
 Our 
confidence 
in 
the 
security 
is 
based 
on 
the 
key 
being 
secret 
 Transforma;on 
= 
Algorithm: 
many 
kinds 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
SOME 
ALGORITHMS 
 Symmetric: 
 AES 
 Blowfish 
 Asymmetric: 
 RSA 
 ECC 
 HEC 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
SYMMETRIC 
ENCRYPTION 
 Used 
for 
bulk 
encryp;on 
 High 
speed 
algorithms 
 Requires 
a 
shared 
secret 
(key) 
 Challenge 
is 
in 
key 
management 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
AES 
 Government 
grade 
encryp;on 
is 
a 
meaningless 
term 
 Research 
labs 
around 
the 
world 
are 
chipping 
away 
at 
this 
standard 
 Security 
and 
speed 
depend 
on 
the 
mode 
in 
which 
it 
is 
used. 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
ASYMMETRIC 
ENCRYPTION 
 Does 
not 
require 
a 
shared 
secret 
(key) 
 Encryp;on 
and 
Decryp;on 
keys 
are 
(in 
general) 
different 
 Methods 
are 
mathema;cally 
sophis;cated 
 Not 
suitable 
for 
bulk 
encryp;on 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
RSA  Security 
depends 
on 
the 
difficulty 
of 
factoring 
large 
numbers 
 Advances 
are 
constantly 
being 
made 
on 
this, 
requiring 
larger 
and 
larger 
key 
sizes 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
conten 
tc 
oisn 
ctoennfit 
dise 
cno;nafil 
den;al
ECC 
 Ellip;c 
curve 
cryptography 
 Considered 
to 
be 
more 
secure 
and 
for 
comparable 
size 
of 
key: 
there 
is 
no 
index 
calculus 
known 
for 
ellip;c 
curves 
 Included 
now 
in 
NIST 
standards 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
THE KEY 
IS THE KEY 
Strength (security) usually depends on several factors including: 
 Size of the key 
 Key management: key under the doormat 
 Security architecture is only as strong as the weakest link. 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
TYPICAL 
DEPLOYMENT 
 A 
combina;on 
of 
both 
symmetric 
and 
asymmetric 
methods 
 Security 
analysis 
will 
determine 
the 
size 
of 
keys 
needed 
in 
each 
part 
to 
make 
it 
equally 
strong 
throughout 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
THREAT MODEL 
 What 
are 
we 
trying 
to 
protect 
against? 
 System 
architecture 
diagram 
has 
to 
be 
analyzed 
for 
points 
of 
weakness 
 Those 
points 
have 
to 
be 
for;fied 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
TECHNOLOGY 
IS NOT ENOUGH 
 Most 
compromises 
are 
not 
of 
algorithms 
but 
social 
engineering 
 Security 
policy 
is 
at 
least 
as 
important 
as 
security 
technology: 
Target 
 Also 
electro-足magne;c 
a[acks 
(more 
difficult 
to 
protect 
against). 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
PROTECTING 
DATA 
 Data has two stages: 
 At rest 
 In transit 
 It has to be secured throughout its 
 lifecycle (ILM) 
 Security architecture depends on 
 Who is managing the data? 
 Where does the data reside? 
 Who has access to the data? 
 Who has access to the keys to the data? 
 What sort of encryption is being used? 
 How is the key being managed/stored? 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
ENCRYPTION IN 
PRACTICE 
 Keeping data safe is more complex 
in practice 
 Data at rest 
 Encrypted hard drives or directories 
 Data in transit 
 Encrypted data is usually decrypted 
and re-encrypted at each hop 
 MITM attacks 
 Security of the end devices critical 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
SOCIAL 
NETWORKS 
 Leaks 
through 
informa;on 
voluntarily 
exposed 
on 
social 
networks 
 Using 
Twi[er 
to 
authen;cate 
 Depends 
on 
cloud-足based 
servers 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
COMMON 
ATTACKS 
 SQL 
Injec;on 
 Malware 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
IDENTITY 
STORES 
 Ac;ve 
Directory 
is 
encrypted: 
but 
key 
is 
stored 
in 
the 
same 
place 
 No 
one 
can 
read 
your 
encrypted 
content: 
some 
devices 
that 
read 
EM 
can 
penetrate 
it 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
PERFECT CLOUD 
SOLUTION 
 
True 
zero 
knowledge 
 
Distributed 
key 
management 
 
User 
is 
in 
control 
 
Seamless 
and 
transparent 
provisioning 
and 
de-足provisioning 
PerfectCloud.io 
This 
document 
is 
the 
property 
of 
PerfectCloud 
Corp. 
Canada. 
Its 
content 
is 
confiden;al
THANK YOU! 
www.perfectcloud.io
Ad

Recommended

Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactory
Christopher Grayson
Corporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing Felonies
John Bambenek
Cloud storage security
Cloud storage security
Pankaj Watekar
White-box Cryptography -BayThreat 2013
White-box Cryptography -BayThreat 2013
Nick Sullivan
Owasp joy of proactive security
Owasp joy of proactive security
Scott Behrens
Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016
Gareth Davies
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
Identity theft- Horowitz Law
Identity theft- Horowitz Law
Sanford Horowitz
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
IRJET Journal
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
IJMER
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
Cloud Cryptography
Cloud Cryptography
ijtsrd
U04503119122
U04503119122
IJERA Editor
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
CLOUD SECURITY.pptx
CLOUD SECURITY.pptx
MrPrathapG
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Kp3419221926
Kp3419221926
IJERA Editor
Cloud Security 2014 AASNET
Cloud Security 2014 AASNET
Farrukh Shahzad
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals
lecture8 Securing Distributed Data Storage.ppt
lecture8 Securing Distributed Data Storage.ppt
kong100
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
deep dive down on how NCLA works in IOTs
deep dive down on how NCLA works in IOTs
gavrielsembiring
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu

More Related Content

Similar to Encryption: Fact and Fiction (20)

Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
IRJET Journal
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
IJMER
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
Cloud Cryptography
Cloud Cryptography
ijtsrd
U04503119122
U04503119122
IJERA Editor
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
CLOUD SECURITY.pptx
CLOUD SECURITY.pptx
MrPrathapG
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Kp3419221926
Kp3419221926
IJERA Editor
Cloud Security 2014 AASNET
Cloud Security 2014 AASNET
Farrukh Shahzad
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals
lecture8 Securing Distributed Data Storage.ppt
lecture8 Securing Distributed Data Storage.ppt
kong100
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
deep dive down on how NCLA works in IOTs
deep dive down on how NCLA works in IOTs
gavrielsembiring
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
IRJET Journal
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
IJMER
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
Cloud Cryptography
Cloud Cryptography
ijtsrd
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
CLOUD SECURITY.pptx
CLOUD SECURITY.pptx
MrPrathapG
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Cloud Security 2014 AASNET
Cloud Security 2014 AASNET
Farrukh Shahzad
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals
lecture8 Securing Distributed Data Storage.ppt
lecture8 Securing Distributed Data Storage.ppt
kong100
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
deep dive down on how NCLA works in IOTs
deep dive down on how NCLA works in IOTs
gavrielsembiring
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal

Recently uploaded (20)

Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
Ad

Encryption: Fact and Fiction

  • 1. Dr. V. Kumar Murty CTO, Perfect Cloud Corp. www.perfectcloud.io
  • 2. BIOGRAPHY: DR. V. KUMAR MURTY ! CTO, PerfectCloud.io Professor and Chair, Department of Mathematics, University of Toronto Director, GANITA Labs, University of Toronto Ph.D. Harvard University Fellow of the Royal Society of Canada Foreign Fellow of the National Academy of Sciences (India) 100+ papers, 5 books and 2 patents in Information Security CTO, PerfectCloud.io PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 3. SOME ATTRIBUTES OF DATA Confiden;ality Privacy Iden;ty Reliability (Data Integrity) Trust PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 4. FOUR OVERLAPPING THEMES INFORMATION MANAGEMENT Security Trust Privacy Identity CONFIDENTIALITY SELF-DETERMINATION ASSURANCE ATTRIBUTES GOOD IDENTITY MANAGEMENT STRENGTHENS SECURITY, PRIVACY AND TRUST! PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 5. PROVISIONING TOOLS Confiden;ality: Encryp;on Privacy: Access Control Iden;ty: IDM Reliability: Digital fingerprints Trust: Digital signatures PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 6. ENCRYPTION Secret wri;ng Symmetric and Asymmetric Plaintext + Secret Key is transformed to Ciphertext Decryp;on: Ciphertext + Secret Key is transformed to Plaintext Our confidence in the security is based on the key being secret Transforma;on = Algorithm: many kinds PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 7. SOME ALGORITHMS Symmetric: AES Blowfish Asymmetric: RSA ECC HEC PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 8. SYMMETRIC ENCRYPTION Used for bulk encryp;on High speed algorithms Requires a shared secret (key) Challenge is in key management PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 9. AES Government grade encryp;on is a meaningless term Research labs around the world are chipping away at this standard Security and speed depend on the mode in which it is used. PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 10. ASYMMETRIC ENCRYPTION Does not require a shared secret (key) Encryp;on and Decryp;on keys are (in general) different Methods are mathema;cally sophis;cated Not suitable for bulk encryp;on PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 11. RSA Security depends on the difficulty of factoring large numbers Advances are constantly being made on this, requiring larger and larger key sizes PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its This document is the property of PerfectCloud Corp. Canada. Its conten tc oisn ctoennfit dise cno;nafil den;al
  • 12. ECC Ellip;c curve cryptography Considered to be more secure and for comparable size of key: there is no index calculus known for ellip;c curves Included now in NIST standards PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 13. THE KEY IS THE KEY Strength (security) usually depends on several factors including: Size of the key Key management: key under the doormat Security architecture is only as strong as the weakest link. PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 14. TYPICAL DEPLOYMENT A combina;on of both symmetric and asymmetric methods Security analysis will determine the size of keys needed in each part to make it equally strong throughout PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 15. THREAT MODEL What are we trying to protect against? System architecture diagram has to be analyzed for points of weakness Those points have to be for;fied PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 16. TECHNOLOGY IS NOT ENOUGH Most compromises are not of algorithms but social engineering Security policy is at least as important as security technology: Target Also electro-足magne;c a[acks (more difficult to protect against). PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 17. PROTECTING DATA Data has two stages: At rest In transit It has to be secured throughout its lifecycle (ILM) Security architecture depends on Who is managing the data? Where does the data reside? Who has access to the data? Who has access to the keys to the data? What sort of encryption is being used? How is the key being managed/stored? PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 18. ENCRYPTION IN PRACTICE Keeping data safe is more complex in practice Data at rest Encrypted hard drives or directories Data in transit Encrypted data is usually decrypted and re-encrypted at each hop MITM attacks Security of the end devices critical PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 19. SOCIAL NETWORKS Leaks through informa;on voluntarily exposed on social networks Using Twi[er to authen;cate Depends on cloud-足based servers PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 20. COMMON ATTACKS SQL Injec;on Malware PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 21. IDENTITY STORES Ac;ve Directory is encrypted: but key is stored in the same place No one can read your encrypted content: some devices that read EM can penetrate it PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al
  • 22. PERFECT CLOUD SOLUTION True zero knowledge Distributed key management User is in control Seamless and transparent provisioning and de-足provisioning PerfectCloud.io This document is the property of PerfectCloud Corp. Canada. Its content is confiden;al