Complete E-Business Security for Your Applications
Total Page:16
File Type:pdf, Size:1020Kb
Complete e-Business Security for Your Applications ® ® More than 450 million copies of RSA BSAFE technology are embedded in today’s most popular software applications and hardware devices worldwide. Encompassing the most widely-used, richest set of cryptographic algorithms and secure communications protocols, RSA BSAFE is the most relied-upon set of complementary security products by developers and manufacturers worldwide. As your company accelerates its e-business initiatives, your future depends on security you can trust. For that, RSA Security should be your partner of choice. For nearly two decades, RSA Security has focused on the innovation, productization, enhancement and ongoing support of security products. It’s all we do, and people tell us we’re the best in the business. Just ask our more than 500 partners. You wouldn’t build a CPU — you’d buy one from a company who is known and respected in the industry. And why build a database engine from scratch when you can choose among a number of tested and proven core database products? So why would you build an application using anything other than tried and true RSA BSAFE security software? RSA Security is the most experienced and trusted provider of encryption, security protocols and PKI compo- nents for electronic business applications. You can depend on us. Unmatched security protection in the Internet Age. Technology reaches every corner of your business. With the rise of the Internet economy, organizations 1 worldwide rely on the Internet for interacting with RSA Security is the most trusted source of e-security each of their customer touch points, including enabling technology. We were the first company to internal resources as well as partners, resellers and concentrate solely on security systems as the net- distributors. In addition, networked information working and Internet industry began to proliferate. and applications are more important — and more As pioneers in public key encryption technology, distributed throughout the organization — than RSA Security recognized early that strong, stable ever before. security components are part of the arsenal of tech- nology needed in interactive software applications. That means that the security and e-business readi- The world’s most successful software companies have ness of your systems is more important than ever selected RSA Security precisely because they trust us before. While e-business has allowed companies to to provide them with the most advanced security streamline processes and controls and achieve higher tools in the world. customer satisfaction and increased revenues, it’s also caused great concern over the protection of Backed by a renowned team of security experts, company assets. And consumers are wary too. That’s RSA Security continues to enhance its technology. why security should be at the top of your list when And the RSA BSAFE product line provides you with developing or deploying any business application. the most trusted set of products providing complete And why RSA Security can put your mind at ease — coverage for all of your networked, Internet, whether your application allows e-commerce trans- intranet and extranet applications and services, actions, involves e-mail, enterprise access or down- ultimately helping you achieve faster time-to-market, loading files to a hand-held device or pager. greater interoperability with other standards-based applications, and greater reliability of your applica- tions’ security. What is cryptography? Over the past several years, the field of cryptography has advanced in step with the overall advance- ment of technology. To most people, cryptography involves keeping communications private. However, this is only one part of today’s cryptography. Encryption is the transformation of data into a form that is virtually impossible to read without the appropriate knowledge (a key). Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended; even those who have access to the encrypted data. Decryption is the reverse of encryption; it is the transformation of encrypted data back into an intelligible form. Encryption and decryption generally require the use of some secret information, referred to as a key. For some encryption mechanisms, the same key is used for both encryption and decryption; for other mechanisms, the keys used for encryption and decryption are different. Today’s cryptography is more than encryption and decryption. Public key cryptography in particular is also used for digital authentication — providing assurance that communication is from a particular person. Authentication is as fundamental a part of our lives as is privacy. Authentication is used throughout one’s day, especially as we move to a world where decisions and agreements are commu- nicated electronically. Cryptography provides mechanisms for such procedures. A digital signature binds a document to the possessor of a particular key, while a digital time stamp binds a document to its creation at a particu- lar time. These cryptographic mechanisms can be used to control access to a shared disk drive, a high security installation, or a pay-per-view TV channel. The field of cryptography encompasses other uses as well. With just a few basic cryptographic tools, it is possible to build elaborate schemes and protocols that allow paying for goods and services using electronic money, prove we know certain information without revealing the infor- mation itself, and to divide and share a secret quantity in such a way that a subset of the shared keys can reconstruct the secret. Complete e-Security Components for Developers Building RSA BSAFE Into an Application BSAFE® SECURED SAMPLE CODE UNSECURED SECURITY LIBRARIES SECURITY LIBRARIES APPLICATION AND COMPONENTS AND COMPONENTS APPLICATION More than cryptography — complete application security control. RSA Security products are based on state-of-the-art encryption and authentication algorithms. Simply put, cryptography is the “art and science of using out-of-the-box security protocol software compo- mathematics to secure information and create a high nents like RSA BSAFE SSL and RSA BSAFE S/MIME to degree of trust in the electronic realm” RSA Security ensure complete security at the protocol level for has the richest set of algorithms in the marketplace Internet and messaging applications. And to help 3 — both proprietary and in the public domain — and build applications that take advantage of a PKI, RSA the RSA Public Key Cryptosystem is recognized Security has developed an RSA BSAFE Cert product worldwide as the fundamental technology enabling line, which contains all the tools needed to develop e-business on the Web. These algorithms are made applications that use digital certificates. RSA BSAFE available in easily integrated software libraries — Cert SDKs provide software libraries, sample code libraries that have withstood use by millions for over and documentation that significantly reduce the a decade on the Internet. In fact, many of the amount of work and expertise required to perform world’s leading high-tech manufacturers, including cryptographic security procedures with certificates. @Home, Cisco, Compaq, IBM, Microsoft, Oracle — and more than 500 other licensees — already embed Each RSA BSAFE developer’s kit is a complete soft- RSA BSAFE technology into their applications. ware development environment providing compre- hensive building-block security components for However, cryptography, including all popular secret- creating fail-safe software applications. RSA BSAFE and public-key encryption algorithms, is just the technologies are used in e-business applications, foundation of what RSA Security has to offer with enterprise software, cellular phones, Web browsers, the RSA BSAFE product line. complex networking equipment, cable TV boxes and in the majority of PCs on the market in order The RSA BSAFE line not only provides core crypto to provide built-in security for customers. products for those organizations needing basic secu- rity embedded in their applications. It also provides Beyond that, RSA BSAFE products provide PKI-inte- gration, so that “RSA Secured” applications can be managed along with your other mission-critical networked applications. The RSA BSAFE Integrated Security System SECURITY PROTOCOLS RSA BSAFE SSL PKI SERVICES RSA BSAFE S/MIME RSA BSAFE CERT CORE CRYPTO RSA BSAFE CRYPTO RSA BSAFE total security solutions: reduce development time, speed time to market. Whether you need core cryptography routines for your application or a fully implemented protocol, the RSA BSAFE line of SDKs provides you with all of the components you need to make your applications absolutely safe and secure. By using RSA BSAFE products, your staff can save months of development time, enabling you to roll out mission-critical systems earlier and with more confidence. In addition, RSA BSAFE products allow easy and fool-proof integration with other RSA-enabled software and hardware, including networked and enterprise applications, Internet applications including most popular browsers, as well as pagers, cell phones and hand-held devices. Core-Crypto — the foundation of secure applications. The RSA BSAFE Crypto products are at the heart of the product line. RSA BSAFE Crypto is the world’s most popular cryptography component with the complete standards-based implementation enables widest range of data encryption and signing algo- near-universal interoperability for your networked rithms available. It includes