A Computational Package for Working with Elliptic Curve Groups by Sulman Liaquat a Thesis Submitted in Partial Fulfillment for the Degree of Master of Philosphy

Total Page:16

File Type:pdf, Size:1020Kb

A Computational Package for Working with Elliptic Curve Groups by Sulman Liaquat a Thesis Submitted in Partial Fulfillment for the Degree of Master of Philosphy CAPITAL UNIVERSITY OF SCIENCE AND TECHNOLOGY, ISLAMABAD A Computational Package for Working with Elliptic Curve Groups by Sulman Liaquat A thesis submitted in partial fulfillment for the degree of Master of Philosphy in the Faculty of Computing Department of Mathematics 2020 i Copyright c 2020 by Sulman Liaquat All rights reserved. No part of this thesis may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, by any information storage and retrieval system without the prior written permission of the author. ii To my Mother, late Father, Brothers, Sisters and Someone very special for their support and love. CERTIFICATE OF APPROVAL A Computational Package for Working with Elliptic Curve Groups by Sulman Liaquat (MMT161012) THESIS EXAMINING COMMITTEE S. No. Examiner Name Organization (a) External Examiner Dr. Waqas Mehmood QAU, Islamabad (b) Internal Examiner Dr. Qamar MEhmood CUST, Islamabad (c) Supervisor Dr. Rashid Ali CUST, Islamabad Dr. Rashid Ali Thesis Supervisor June, 2020 Dr. Muhammad Sagheer Dr. Muhammad Abdul Qadir Head Dean Dept. of Mathematics Faculty of Computing June, 2020 June, 2020 iv Author's Declaration I, Sulman Liaquat hereby state that my M. Phil thesis titled \A Computa- tional Package for Working with Elliptic Curve Groups" is my own work and has not been submitted previously by me for taking any degree from Capital University of Science and Technology, Islamabad or anywhere else in the coun- try/abroad. At any time if my statement is found to be incorrect even after my graduation, the University has the right to withdraw my M. Phil Degree. (Sulman Liaquat) Registration No: MMT161012 v Plagiarism Undertaking I solemnly declare that research work presented in this thesis titled \A Com- putational Package for Working with Elliptic Curve Groups" is solely my research work with no significant contribution from any other person. Small contribution/help wherever taken has been duly acknowledged and that complete thesis has been written by me. I understand the zero tolerance policy of the HEC and Capital University of Science and Technology towards plagiarism. Therefore, I as an author of the above titled thesis declare that no portion of my thesis has been plagiarized and any material used as reference is properly referred/cited. I undertake that if I am found guilty of any formal plagiarism in the above titled thesis even after award of M. Phil Degree, the University reserves the right to withdraw/revoke my M. Phil degree and that HEC and the University have the right to publish my name on the HEC/University website on which names of students are placed who submitted plagiarized work. (Sulman Liaquat) Registration No: MMT161012 vi Acknowledgements All praise to Almighty Allah, the most Benevolent and Merciful, the Creator of Universe and man, who gave me the vision and courage to accomplish this work successfully. A research project at any level is very difficult to be accomplished alone. The contributions of many people have made it possible for me to complete this work. I would like to extend my appreciation especially to the following. First and foremost I extend my sincerest gratitude to my thesis supervisor Dr. Rashid Ali who has supported me throughout my thesis work in every possible way. He presented the things in simplest way. His efforts and encouragement is really appreciable. He gave me self-belief, and confidence and provided me his support and guidance all way along. Under the supervision of him I never felt anything difficult in my thesis. Dr. Rashid Ali provided me the friendly and comfortable environment to work in, without his guidance and support I would never be able to put this topic together. I am also thankful to all the faculty of CUST in particular the faculty of Mathe- matics department. Their ability to simplify the most difficult things helped me to understand the things that I would never be able to understand. The research oriented environment provided to students by Mian Amer Mehmood, Chancellor at CUST, Prof. Dr. Muhammad Mansoor Ahmed, Vice Chan- cellor at CUST and Dr. Muhammad Sagheer, Head of Department of Math- ematics made the research work easier and more pleasant. It is their positive attitude that enables such excellent research work from staff and students. My friends, class mates and fellow research workers Tahir Bhai, Syed Burhan , M.Usman Farooqi , Mujtaba Azim, Sohail Abid, Bilal Ahmed and Sultan Mehmood also helped me a lot and guided me whenever I needed it. Last but not least, I would like to pay high regards to my parents and all family members for their sincere encouragement and inspiration throughout my research work and lifting me uphill this phase of life. I owe everything to them. (Sulman Liaquat) Registration No: MMT161012 vii Abstract In modern world, security of confidential information has become one of the fun- damental requirement. Elliptic curve turn out to be an important tool for secure communication in cryptography it provides the same level of security with smaller key as compare to RSA. For working with the elliptic curves over the finite fields of very large orders we need a mathematical tool like Matlab, ApCoCoA, Mathemat- ica etc. Matlab and Mathematica are not freely available softwares. In this thesis we have developed a package in ApCoCoA, which is a freely available mathemat- ical software for computation in Algebra, that helps us to perform some complex computations in an easy and efficient way. We used CoCoL programming language of ApCoCoA to make a computational package for working with the elliptic curve groups. This package is made to perform different operations on elliptic curve that are necessary to run schemes based on ECC. Also, use of ApCoCoA is secure as compared to other online available softwares as it needs not to be connected with a third party like desmos, over a public network. Using online available softwares can compromise the security because one must share the EC points over internet to perform different calculations. As the security of many schemes are based on EC points, therefore, if a hacker, pretending to be the third party, can take EC points from the user, can weaken the security. Our package works off line and hence it is better for security perspective. Once the message is encrypted it can be sent to the receiver over a public network without compromising the security because it can only be understandable to a authorized receiver as it is in encrypted form. We also efficiently executed using the package made in ApCoCoA. Contents Author's Declarationv Plagiarism Undertaking vi Acknowledgements vii Abstract viii List of Figures xi List of Tables xii Abbreviations xiii Symbols xiv 1 Introduction1 1.1 Background...............................2 1.2 Role of Elliptic Curve..........................2 1.3 Tools for Elliptic Curve.........................3 1.4 Summary................................3 1.5 Distribution of Thesis..........................4 2 Preliminaries5 2.1 Mathematical Background.......................5 2.2 Cryptographic Background....................... 11 2.2.1 Applications/Objectives of Cryptography........... 15 2.2.2 Symmetric Key Cryptography................. 17 2.2.3 Asymmetric Key Cryptography................ 18 2.3 Cryptanalysis.............................. 19 2.4 Popular Asymmteric Techniques.................... 21 2.4.1 RSA............................... 21 2.4.2 Discrete Logarithm Problem.................. 24 2.5 Cryptography and Elliptic Curves................... 25 2.6 Summary................................ 26 viii ix 3 Elliptic Curve Cryptography 27 3.1 Elliptic Curve Cryptography...................... 28 3.1.1 Elliptic Curves Over R ..................... 29 3.1.1.1 Mathemtical Formulas for Point Addition on El- liptic Curve...................... 32 3.1.2 Elliptic Curve over Finite Fields................ 36 3.1.3 Elliptic Curve Discrete Logarithm Problem (ECDLP).... 39 3.1.4 Elliptic Curve Diffie-Hellman Key Exchange Protocol............................. 40 3.2 Summary................................ 40 4 The Package Elliptic Curve 42 4.1 Mathematical Functionality...................... 43 4.2 How to use ApCoCoA?......................... 44 4.2.1 Requirements.......................... 45 4.2.2 Installation........................... 45 4.2.3 How to Save and Run a Programe in ApCoCoA....... 47 4.3 Computations on Elliptic Curve Groups............... 48 4.3.1 Modulo Inverse......................... 48 4.3.2 EC Addition........................... 50 4.3.3 Order of the Point of Elliptic Curve.............. 52 4.3.4 Adding a Point to itself Multiple Times............ 53 4.4 CoCoA Command References..................... 55 4.4.1 Inverse.............................. 55 4.4.2 Point addition.......................... 56 4.4.3 Adding Point to itself N Number of Time........... 57 4.4.4 Point Order........................... 57 4.5 Implementation of ECDH Key Exchange Protocol using ApCoCoA Package................................. 58 4.5.1 Key Agreemenet Algorithm Example............. 58 4.6 Message Encryption/Dycryption using the Scheme of Omar Reyad. 59 4.6.1 Toy Example.......................... 60 5 Conclusion 63 Bibliography 65 Appendix 69 List of Figures 2.1 Trapdoor Funtion[12].......................... 11 2.2 Cryptology............................... 12 2.3 Block Diagram............................. 13 2.4 Cryptographic protocols [16]...................... 17 2.5 Symmetric key protocol [17].....................
Recommended publications
  • Cryptomathic EMV CA
    Cryptomathic EMV CA EMV AND PKI A Regional EMV Solution The EMV standard is designed to provide an interoperability frame- work for payment cards. This covers many transaction types including credit, debit, contactless and mobile. Payment cards have been around for many years in various forms. The latest cards have become more sophisticated and now contain a microchip, which can store a wealth of information, including security information used for authentication and encryption. EMV card authentication is based on PKI (Public Key Infrastructure) but unlike traditional PKI, which is based on a standard called X.509, EMV EMV CA is a standard of its own. Even though EMV is a proprietary standard it The Cryptomathic EMV CA professionally manages all the Issuer's and is widely used across the globe, with billions of EMV smart cards issued Certification Authority’s tasks including: since its initial roll-out. • Lifecycle management of EMV Issuer CA (scheme issuers’) certificates • Issue certificates EMV Certification Authorities are central to the payment card framework, • Export certificates under which issuers and acquirers are certified by the payment schemes, • Revoke certificates acting as a trusted third party. A payment scheme can be a major • Certification authority CRL (Certificate Revocation List) international player such as MasterCard and Visa or it can be regional • Issuer CRL (Certificate Revocation List) or country wide, such as national debit schemes, which are found in many countries all over the world. Each payment scheme requires an Benefits EMV Certification Authority and the Cryptomathic EMV CA provides that Cryptomathic EMV CA offers all the features expected from professional exact functionality.
    [Show full text]
  • Cryptographic Algorithm Analysis and Implementation
    EasyChair Preprint № 3210 Cryptographic Algorithm Analysis and Implementation Nandkumar Niture EasyChair preprints are intended for rapid dissemination of research results and are integrated with the rest of EasyChair. April 20, 2020 Cryptographic Algorithm Analysis and Implementation By: - Nandkumar A Niture 1 Abstract The impact and necessity of information security has increased exponentially over the last f ew decades as the denial-of-service attacks are increasing, information is being stolen, hackers are using more sophisticated and smart methods with help of agile tools for stealing sensitive information. Do small/mid-size/large corporate organizations need the security of their system? Yes. They have sensitive user data, employee data, trading data, customer data and other sensitive confidential information stored in office systems. Do common people need the security of their systems at home? Yes. They may have their taxes files, social security card information, bank account details, private pictures, marketing strategy for their small business and many more private things. Computer cryptography was the exclusive domain for long period of time since World War II but now is practiced outside of military agencies. Cryptography is both science and art, it uses known obscurity and mathematical formulae. Cryptographic systems should have ability to assure the authenticity of source from where message gets originated and proof of complete message delivery. It is sometimes insufficient to protect ourselves from the rules and laws, but we need to protect ourselves with applying sufficient mathematical equations. So, it is individuals and legal organizations responsibility to protect their own data. By combining the digital signature with public-key cryptography, we can develop a protocol that combines the security of encryption with the authenticity of digital signatures.
    [Show full text]
  • Cryptomathic Signer V 1.0
    Signer Case Study – LuxTrust CENTRAL SIGNING SERVICE Residents in Luxembourg are now able to securely access a variety of web applications such as eBanking and public services, as well as digitally sign legally binding transactions and official documents from an online PC or mobile device, anywhere in the world. With just one LuxTrust certificate, users can remotely access and sign multiple online forms from any organisation connected to the service, whether they are registering their new home or applying for a loan. This highly innovative and flexible authentication and digital signature service has been imple- mented by LuxTrust, using Cryptomathic’s solutions. LUXTRUST LuxTrust approached Cryptomathic to solve the challenging issue of establishing legal value by way of high security (using PKI and 2FA) As Luxembourg’s primary provider of digital identity and electronic without costs escalating and destroying the business case. Today, most data security services, LuxTrust provides various IT services, aimed at Luxembourg based institutions, including eGovernment and eBanking, delivering and enforcing digital trust between parties, including certifi- utilise the benefits delivered by LuxTrust’s SSC – a mutual security infra- cate issuance, strong authentication, digital signatures, time stamping, structure service. The SSC combines this high level of security in the and long term storage to enable secure electronic commerce and most convenient and portable service, allowing users to authenticate to meet the future security requirements
    [Show full text]
  • Cryptomathic Signer SAM V. 5.0 Security Target for Utimaco Cryptoserver CP5
    Cryptomathic Signer SAM v. 5.0 Security Target for Utimaco Cryptoserver CP5 Document Version: 5.0 Document ID: ASE_ST_UTIMACO Date: September 19, 2019 Cryptomathic Signer Security Target for Utimaco Cryptoserver CP5 ASE_ST_UTIMACO 5.0 September 19, 2019Error! Unknown document property name. Document Identification Document Title: Cryptomathic Signer Security Target for Utimaco Cryptoserver CP5 Document ID: ASE_ST_UTIMACO Document Version: 5.0 Date of version: September 19, 2019 Origin: Cryptomathic Author: Lone Asferg Laursen, Thomas Brochmann Pedersen TOE Reference: Cryptomathic Signer SAM v 5.0 for Utimaco Cryptoserver CP5 Product Type: QSCD 2 Cryptomathic Signer Security Target for Utimaco Cryptoserver CP5 ASE_ST_UTIMACO 5.0 September 19, 2019Error! Unknown document property name. Terms Term Meaning CA Certification Authority. CM Cryptographic Module. Recides within the HSM. Cryptographic Module Cryptographic Module certified according to [EN 419 221-5]. Utimaco CryptoServer Se-Series Gen2 CP5, version 5.1.0.0. DTBS/R Data To Be Signed Representation. A hash value of the document to be signed. HSM Hardware Security Module. IdP Identity Provider. Privileged User The users who administrate the TOE and the signer users. This is the Common Criteria term for administrator users. Administrator The Signer SAM term for a privileged user. QSCD Qualified Electronic Signature (or Electronic Seal) Creation Device as defined in [eIDAS]. RA Registration Authority. SAD Signature Activation Data SAM Signature Activation Module SAP Signature Activation Protocol. Protocol use to perform the signature operation. SCA Signature Creation Application. Application responsible for creating the document to be signed. SIC Signer Interaction Component. Signer User End user who can sign documents. Signing key A cryptographic key used for signing under the sole control of a signer.
    [Show full text]
  • University of Cape Town
    UNIVERSITY OF CAPE TOWN DEPARTMENT OF ELECTRICAL ENGINEERING DATA STORAGE SECURITY FOR CLOUD COMPUTING USING ELLIPTIC CURVE CRYPTOGRAPHY. GEORGE ONYANGO BUOP Supervisor: DR. ALEXANDRU MURGU A thesis Presented for the Degree of UniversityMaster of Engineering of in Telecommunication Cape Town The copyright of this thesis vests in the author. No quotation from it or information derived fromTown it is to be published without full acknowledgement of the source. The thesis is to be used for private study or non- commercial research purposes only.Cape Published by the University of Cape Town (UCT) in terms of the non-exclusive licenseof granted to UCT by the author. University Declaration I declare that all the work in the document, save for that which is properly acknowledged, is my own. I hereby declare that I have not submitted this material, either in whole or in part, for a degree at this or any other institution. Signature ……………………………………… Cape Town Acknowledgement First and foremost, my appreciation goes to the Almighty God who sustained me throughout the period of this program. I also want to acknowledge the contributions of my supervisor, Dr Alexandru Murgu, for the comments, corrections, suggestions and all other forms of support I have received towards the completion of this research work. My sincere appreciation is extended to colleagues who have been of great encouragement through their technical skills and suggestions while going through this path. I also would like to appreciate the friends who made the foreign land a home away from home, through their company, their support and continuous encouragement. Finally, my special appreciation goes to my parents and my family for being an inspiration, for the sacrifices they made to ensure I was able to go through this program to completion and for being there for me throughout this period.
    [Show full text]
  • A Personal Perspective Peter Landrock, Founder of Cryptomathic
    Isaac Newton Institute for Mathematical Sciences The Isaac Newton Institute: A Personal Perspective Peter Landrock, Founder of Cryptomathic Peter Landrock grew up in Denmark and obtained his PhD in mathematics in 1974 from the University of Chicago. He began working on data security in 1984 whilst at Aarhus University, and built up one of the leading data security research teams within Europe. He founded Cryptomathic in 1986, one of the first companies to commercialise cryptographic algorithms, but it was his participation in the 1996 Isaac Newton Institute programme on Cryptology and Coding Theory that inspired him to leave academia and focus on the company. Always emphasising the importance of the underpinning mathematics, During the first 6 months of 1996 I was invited Cryptomathic went from strength to strength to be one of the organisers of the Isaac Newton and is now one of the world’s leading providers Institute programme on Computer Security, of security solutions to businesses across a wide Cryptology and Coding Theory . My co-organisers range of industry sectors, including banking, “were Roger Needham, then Departmental government, technology, cloud and mobile. Chairman of Cambridge University’s Computer In 2003, Cryptomathic was recognized by the Laboratory and subsequently Director of World Economic Forum as a Technology Pioneer Microsoft’s Cambridge Research Laboratory, and, in 2004, it received the VISA Smart Star and Ross Anderson, now a Professor in Cambridge Award for its work on Chip and PIN. University’s Computer Laboratory. In 2010, Peter Landrock was named by the European Patent Office as a Finalist for European Attending the Newton Institute Inventor in the “Lifetime Achievement” category.
    [Show full text]
  • Digital Signatures for Dummies®, Cryptomathic Special Edition
    These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Digital Signatures Cryptomathic Special Edition by Chris Allen and Steve Marshall These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Digital Signatures For Dummies®, Cryptomathic Special Edition Published by: John Wiley & Sons, Ltd., The Atrium, Southern Gate Chichester, West Sussex, www.wiley.com © 2017 by John Wiley & Sons, Ltd., Chichester, West Sussex Registered Office John Wiley & Sons, Ltd., The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior written permission of the Publisher. For information about how to apply for permission to use the copyright material in this book, please see our website at http://www. wiley.com/go/permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Ltd., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHOR HAVE USED THEIR BEST EFFORTS IN PREPARING THIS BOOK, THEY MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS BOOK AND SPECIFICALLY DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Cryptomathic Signer
    White Paper Cryptomathic Signer Enabling a Unique Digital Signing Experience 1 Introduction This paper presents the business case for centralised digital signatures and explores how a business can: Being able to provide trust and convenience is critical for any organisation or business offering its services online. This applies • Offer a unique signing experience for all digital channels incl. web portals, desktop applications and mobile in particular to the crucial step of the customer journey, where the customer commits to a transaction or a document. Electronic • Issue advanced or qualified electronic signatures in compliance transactions, such as online shopping or personal e-banking, are with European ETSI and CEN technical standards and the commonplace. Nevertheless, many other transactions or agreements, eIDAS regulation such as high value transactions or sensitive documents need higher security assurances and must be legally binding. In the • Make PKI transparent for the end-user and implement policies for different assurance standards. physical world, such transactions can typically be settled by shaking hands and applying your handwritten signature to a document/ • Leverage existing 2-Factor Authentication deployment contract. In the digital world, a digital signature can carry the same non-repudiable weight. • Achieve non-repudiation • Reduce operational costs Digital signatures can enable: • The end-to-end digital customer journey 2 Signing in the cloud - the drivers • Non-repudiation • Enhanced security and legal value What is driving successful Electronic Commerce and e-Government • End-user convenience and mobility solutions? The answer is simple: Useful applications with superior user • Cost efficiency for all stakeholders experience that provide operational cost savings and enhanced security • What You See Is What You Sign functionality (WYSIWYS) and control.
    [Show full text]
  • KMS Case Study – Mastercard
    KMS Case Study – MasterCard CENTRALIZED KEY MANAGEMENT Today MasterCard Europe benefits from a fully automated and central- ized key management system developed by Cryptomathic. Every mem- ber bank has a number of hardware security modules that are now fully managed and handled centrally from Brussels. KEY MANAGEMENT CENTRE TO MASTERCARD EUROPE unique administrative role and credentials. From here the operators can update and configure the cryptographic keys on each individual Network Security Platform (NSP) as well as enter new, shared network keys into all boxes with just a click on a button. Updating the Keys When using cryptographic keys for high volumes of sensitive data, it is important to change the encryption keys at regular intervals. These network keys are used by all NSPs to communicate within their own virtual network. When the keys are updated, it is of utmost importance that they are updated on as many NSPs as possible and in as short time as possible. At the same time, it is important that all events are logged securely and that the Key Management Centre (KMC) allows the admin- istrators to communicate with each NSP individually to ensure that all communication to and from the NSPs and the KMC is non-repudiable. MasterCard Europe Jean Paul Boly MasterCard Europe is a European banking organization which owns and MasterCard Europe manages many of the most commonly used payment systems, includ- With the Key Management Centre we are able to reduce costs ing Maestro, EC (EuroCheque), Cirrus, CLIP and Eurocard. MasterCard while increasing both network security and performance. We chose to Europe is a subsidiary of Mastercard Corp.
    [Show full text]
  • Cryptomathic Signer SAM V. 5.1 Security Target for Utimaco Cryptoserver CP5
    Cryptomathic Signer SAM v. 5.1 Security Target for Utimaco Cryptoserver CP5 Document Version: 5.5 Document ID: ASE_ST_UTIMACO Date: March 12, 2020 Cryptomathic Signer Security Target for Utimaco Cryptoserver CP5 ASE_ST_UTIMACO 5.5 March 12, 2020 Document Identification Document Title: Cryptomathic Signer Security Target for Utimaco Cryptoserver CP5 Document ID: ASE_ST_UTIMACO Document Version: 5.5 Date of version: March 12, 2020 Origin: Cryptomathic Author: Lone Asferg Laursen, Thomas Brochmann Pedersen TOE Reference: Cryptomathic Signer SAM v 5.1 for Utimaco Cryptoserver CP5 Product Type: QSCD 2 Cryptomathic Signer Security Target for Utimaco Cryptoserver CP5 ASE_ST_UTIMACO 5.5 March 12, 2020 Terms Term Meaning CA Certification Authority. CM Cryptographic Module. Recides within the HSM. Cryptographic Module Cryptographic Module certified according to [EN 419 221-5]. Utimaco CryptoServer Se-Series Gen2 CP5, version 5.1.0.0. DTBS/R Data To Be Signed Representation. A hash value of the document to be signed. HSM Hardware Security Module. IdP Identity Provider. Privileged User The users who administrate the TOE and the signer users. This is the Common Criteria term for administrator users. Administrator The Signer SAM term for a privileged user. QSCD Qualified Electronic Signature (or Electronic Seal) Creation Device as defined in [eIDAS]. RA Registration Authority. SAD Signature Activation Data SAM Signature Activation Module SAP Signature Activation Protocol. Protocol use to perform the signature operation. SCA Signature Creation Application. Application responsible for creating the document to be signed. SIC Signer Interaction Component. Signer User End user who can sign documents. Signing key A cryptographic key used for signing under the sole control of a signer.
    [Show full text]
  • Download Datasheet
    CON SU LT I CTS N U G D O R P S E R V S I C E www.EncryptionConsulting.com Encryption Consulting is a customer-focused cybersecurity firm that provides a multitude of services in all aspects of Encryption for our clients. Our expertise ranges from Public Key Infrastructure, Enterprise Key Management, Tokenization, Transparent Data Encryption, Cloud Key Management, Code Signing, Hardware Security Modules, and Element Level Format Preserving Encryption, Our knowledge and experience puts experts on your team to deploy the industry’s best and proven encryption technologies. Our solutions will secure your sensitive data throughout its entire lifecycle. At Encryption Consulting, our people and services enable organizations to successfully achieve their data security goals in Confidentiality, Integrity, and Availability. Encryption Consulting in Brief Experts in Encryption and Data Security Space. - 30+ years of combined experience in Cyber-Security. - 70% of firm holding CISSP, CCSP, CIPP/US Certified Information Security Professional. Strategic Partners with leading Encryption technology providers. 20+ clients including some in the Fortune 100 and Fortune 500. Most of our consultants have BIG 4 (Deloitte, PWC, EY, KPMG) consulting background. focus areas Our specialty is delivering Assessments, Strategies and Implementations for organizations who either lack the specialized resources or who simply value having a trusted advisor to assist them upgrade their their data security posture. At Encryption Consulting, we have created a custom framework based on NIST 800-57, NIST 800-53 standards, FIPS and industry best practices to accelerate our client’s data protection projects. In summary, we enable organizations to identify areas in their current encryption environment needing improvement by conducting an assessment, creating a roadmap and implementing an encryption plan end-to-end.
    [Show full text]
  • Barclays Crypto Service Gateway Event
    Welcome | Hot Beverages | Breakfast | Lunch | Afternoon Tea | Canapés | Wine List | Key Contacts 1 Churchill Place – Hospitality Menu 24 May XX May 2013 1 Churchill place Canary Wharf London BArCLAyS CryPTo SErviCE GATEWAy EvEnT CryPToGrAPHy AS A SErviCE A strategic solution for the f inancial sector keynOte By: key themes: Whitf ield diff ie 1 Support the growing use of cryptography The Evolution of Cryptography while minimising direct and indirect costs. and Security Trends Whitf ield Diff ie is a world- 2 Ensure compliance while managing a renowed cryptographer, large and organically grown cryptographic security expert, and one infrastructure. of the pioneers behind the invention of public-key cryptography. 3 The eff icient use of cryptographic resources in f inancial services – avoid unnecessary complexity and improve speakers: workf lows. Mike Bond How Barclays delivered cryptography as technical Director, Cryptomathic 4 an integrated service platform – from George French concept to delivery. senior security engineer, Barclays Karen Jordan head of IIp service management, Barclays Peter Landrock executive Chairman & Founder, Cryptomathic Steve Marshall technical advisor, Cryptomathic Andrew Moore head of IIp, Barclays Peter Troy head of security Operations, Barclays cryptomathic.com/barclays-csg BArCLAyS CryPTo SErviCE GATEWAy EvEnT cryptomathic.com/barclays-csg reasOns tO attenD Understand the business and technical challenges of effectively managing cryptography in f inancial services organisations. Meet with industry peers that experience the same management diff iculties, and gain insights from security experts on how to provide a centralised and proactive cryptographic service for straightforward crypto, compliance and consistency across projects. Explore how to keep your crypto costs under control by utilising common resources to deliver secure projects, shorten the time to market for applications in need of cryptography, and reduce your hsm estate by up to 50%.
    [Show full text]