Microservices Expo Authors: Liz McMillan, Kareen Kircher, Andreas Grabner, Roger Strukhoff, Carmen Gonzalez

Related Topics: Cloud Security, Java IoT, Microservices Expo, Containers Expo Blog, Agile Computing, SDN Journal

Cloud Security: Article

Time to Ditch Cryptographic Keys?

Will keyless signatures overtake PKI as the wave of the future? Governments, flying drones, and big telecom all say so

What is the most secure way to authenticate electronic data? Until recently, many technical people would have answered ‘cryptographic keys' without blinking. But recent headline events - and a ‘biggie' last year - have raised serious doubts about the ability of cryptographic keys to protect vital government and corporate data.

Here are two examples from February that should make CIOs, CTOs and CSOs tremble in their boardrooms: McAfee revoking keys for signing apps on the Apple store; and stolen keys from Bit9 being used to sign malware.

In the McAfee case, a McAfee administrator revoked (by mistake) the digital key for certifying desktop apps that run on Apple's OS X, thereby creating serious problems for customers who wanted to install or upgrade Mac antivirus products.

The original Arstechnica article (McAfee revoking keys) noted that the administrator intended to revoke his individual user key, but "instead revoked the code-signing keys Apple uses to help keep the Mac ecosystem free of malware."

The bottom line: the mistake left customers with no safe options to install or upgrade their programs. The big takeaway: this episode paints a graphic picture of the challenges of administering the digital certificates at the heart of public key infrastructures (PKI) - certificates used to validate software and websites, and to encrypt email and other forms of Internet communication.

Also in February, a private key that security firm Bit9 uses to certify software was stolen by crooks and used to put a trusted seal of approval on malware that infected a few Bit9 customers.

However, those sorry episodes pale in comparison to a massive security breach last year when hackers used a stolen master private key from RSA to attack Lockheed Martin (RSA/EMC losing its master private key.) Lockheed, a major defense contractor to the U.S. government, makes the F-16, F-22 and F-35 fighter aircraft, the Aegis naval combat system, and the THAAD missile defense.

Sources close to Lockheed said compromised RSA SecurID tokens - USB keychain dongles that generate strings of numbers for cryptography purposes - played a pivotal role in the Lockheed Martin hack.

Hackers apparently entered Lockheed Martin's servers and accessed the company's virtual private network (VPN). The VPN allows employees to connect over virtually any public network to the company's primary servers, using information streams secured by cryptography.

With the RSA tokens hacked, those supposedly secure VPN connections were compromised.

Predictably, Lockheed said it detected the attack almost immediately, repulsed it quickly, and that the risk was minimal. The company also claimed that no customer, program or personal employee data was compromised.

All of the above examples not only undermine the security of using cryptographic keys but leave people wondering whether there is a better way to authenticate.

The better way - Keyless Signature Infrastructure (KSI) - has been around since 2007, when it was invented by scientists in Estonia. KSI generates digital signatures for electronic data on a massive scale but uses only cryptographic hash functions, meaning there are no keys to be compromised or trusted humans in sight.

Some six years ago, Estonian scientists at Tallinn Technical University posed the question: How can you rely on electronic data if you assume that your entire network has been compromised and nobody - not even the system administrators within your own organization - can be trusted?

KSI, the fruit of those scientists' work, is used by governments and companies around the world. It helps them to authenticate electronic data generated from the Smart Grid, the Connected Car, and networked routers and machines (either virtual or physical) - basically any type of electronic data. In November, China Telecom, the largest fixed line telecommunications service provider in China, became a keyless signature service provider via its Tianyi 3G platform. Most recently Japan Drones, a developer of custom software for miniature Unmanned Aerial Vehicles (UAVs) announced it was using keyless signatures for its drone security. The U.S. military could use the good PR, given publicity over a white hat hacking scheme done by University of Texas students as reported in June by The Huffington Post, which went as far as to say, "Turns out it's not too difficult to hack a drone."

Chaozong Chen, general manager of Ningbo CA, the Certificate Authority for the city of Ningbo in Zhejiang province in China, said, "KSI's unique features such as independency of verification, intrinsic time binding for data, universal accessibility cross platforms and lack of keys allow us to provide functions and values where traditional public key infrastructure (PKI) is limited. The future proof from quantum computing is of course a major benefit."

Here's another example of KSI in action: every payment within the Estonian banking system comes with a keyless signature, ensuring that insiders cannot modify transactions intent on fraud.

In addition, the Estonian government has embarked on a huge project to integrate KSI technology into the rsyslog utility - a project that will enable every system event across all government networks to be authenticated by time, data integrity and server identity. (Note: rsylog is an open source utility used on Unix and Unix-like computers for forwarding log messages in an IP network.)

Further demonstrating Estonia's confidence in KSI, the Estonian Government's Centre of Registers and Information Systems (RIK) recently embraced the technology.

RIK is using keyless signature technology for validating the authenticity of documents that it is digitizing from the archives of the Succession Register and Chamber of Notaries.

Using keyless signature infrastructure, the authenticity of all the records is periodically verified, the re-verification happens automatically, meaning that the information about the integrity of the stored records is always up to date and any breaches create an alert immediately.

As KSI has proven itself for years in various government and commercial entities, the time is ripe to consider it the logical successor to cryptographic keys, which are starting to look outdated and very vulnerable.

"While our PKI based solutions have been widely adopted, we see a growing need to prove data integrity and time on a massive scale, with cases where customer identification registration is unpractical and less important, such as electronic receipts for cash based transactions," said Chaozong Chen. "These are where KSI can help. It is strategically important for us to start integrating KSI with our successful PKI solutions and this will help us maintain our leadership in the field."

More Stories By Herman Mehling

Herman Mehling has been an IT writer and consultant for more than 25 years. He has written thousands of articles for leading trade magazines and websites. His work has appeared in such publications as Computer Reseller News, eWeek, Forbes, Network World and InformationWeek. In the ’80s and ’90s, he worked as a PR executive at many San Francisco Bay Area high-tech agencies, including Niehaus Ryan Haller, which helped to launch Yahoo! and to re-cast the image of Apple as an Internet player. He was a staff editor and reporter at Computer Reseller News for many years.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@MicroservicesExpo Stories
DevOps is a term that comes full of controversy. A lot of people are on the bandwagon, while others are waiting for the term to jump the shark, and eventually go back to business as usual. Regardless of where you are along the specturm of loving or hating the term DevOps, one thing is certain. More and more people are using it to describe a system administrator who uses scripts, or tools like, Chef, Puppet or Ansible, in order to provision infrastructure. There is also usually an expectation of...
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
As we enter the final week before the 19th International Cloud Expo | @ThingsExpo in Santa Clara, CA, it's time for me to reflect on six big topics that will be important during the show. Hybrid Cloud This general-purpose term seems to provide a comfort zone for many enterprise IT managers. It sounds reassuring to be able to work with one of the major public-cloud providers like AWS or Microsoft Azure while still maintaining an on-site presence.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
This is a no-hype, pragmatic post about why I think you should consider architecting your next project the way SOA and/or microservices suggest. No matter if it’s a greenfield approach or if you’re in dire need of refactoring. Please note: considering still keeps open the option of not taking that approach. After reading this, you will have a better idea about whether building multiple small components instead of a single, large component makes sense for your project. This post assumes that you...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his session at @DevOpsSummit 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will show how customers are able to achieve a level of transparency that enables everyon...
At its core DevOps is all about collaboration. The lines of communication must be opened and it takes some effort to ensure that they stay that way. It’s easy to pay lip service to trends and talk about implementing new methodologies, but without action, real benefits cannot be realized. Success requires planning, advocates empowered to effect change, and, of course, the right tooling. To bring about a cultural shift it’s important to share challenges. In simple terms, ensuring that everyone k...
What do dependency resolution, situational awareness, and superheroes have in common? Meet Chris Corriere, a DevOps/Software Engineer at Autotrader, speaking on creative ways to maximize usage of all of the above. Mark Miller, Community Advocate and senior storyteller at Sonatype, caught up with Chris to learn more about what his team is up to.
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and ...
JetBlue Airways uses virtual environments to reduce software development costs, centralize performance testing, and create a climate for continuous integration and real-time monitoring of mobile applications. The next BriefingsDirect Voice of the Customer performance engineering case study discussion examines how JetBlue Airways in New York uses virtual environments to reduce software development costs, centralize performance testing, and create a climate for continuous integration and real-tim...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
“Being able to take needless work out of the system is more important than being able to put more work into the system.” This is one of my favorite quotes from Gene Kim’s book, The Phoenix Project, and it plays directly into why we're announcing the DevOps Express initiative today. Tracing the Steps. For years now, I have witnessed needless work being performed across the DevOps industry. No, not within our clients DevOps and continuous delivery practices. I have seen it in the buyer’s journe...