1 / 14

Cyber Security and Key Management Models

Cyber Security and Key Management Models. Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security. Christopher Gorog, PMP chris.gorog@atmel.com February 2, 2011. Typical Advanced Metering Infrastructure (AMI) Network of microsystems interconnected

easter
Download Presentation

Cyber Security and Key Management Models

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security and Key Management Models • Smart Grid Networks • The Network System • Key Management and Utilization • Why Hardware Security Christopher Gorog, PMP chris.gorog@atmel.com February 2, 2011

  2. Typical Advanced Metering Infrastructure (AMI) Network of microsystems interconnected Entire network acts as a single system Smart Grid Networks

  3. The network system • Key Management needs to be a model • Entire network becomes one system • System attributes • Load keys securely • Provide uniqueness • Enable Authenticate (non - repudiation) • Operate uniformity (synchronize with network) • Refresh implementation (key rolling) • Prevent tamper (software / key extraction) • Etc.

  4. Key Management • Modularity – all systems need a common root organization which enforces uniformity and diversity • Core security uniformity • Address all required attributes • PKI, certificates, CA • Node integrity • Recover from compromise • Each cryptographic algorithms which need root secrets and keys use

  5. Authentication and Key Setup

  6. Key Rotation

  7. Working Key Generation Hash & Secret Hash & Secret

  8. Key Utilization

  9. Key Detection on Hard Drive Disk Why Hardware Security is Better • ICs architected from ground up for security • No exposed regular structures, no exposed test capability • Internal clock generation, power regulation, environmental tamper detection • Keys stored in memories have additional layers of protection • Security procedures and protocols are hard coded, not subject to attack • Only well protected information crosses the security perimeter Tamper-resistant shielding Regular chip design

  10. Questions?

  11. Optional Material

  12. Additional Product Uses • Battery authentication • Networked device security • Peer-to-peer systems • Key Management (but used in many apps) • Protecting communication • Signatures and Certificates • Verifying and encrypting • Wireless network systems security • Removable component authentication • Consumable, peripheral, daughter card, etc… • Mutual authentication • Firmware and software protection • Firmware root of trust • Firmware download protections • Confidential file protection • Media download • Facilitating key exchange • Encrypting memory contents • User authentication • Tokens, dongles and two factor logon • Call center support

  13. Network Key Management Encrypted PII PII AES Key Verify Key Key Key Key Key Key Key MAC • Every node produces unique and one-time use session keys • Session keys can encrypt Personally Identifying Information (PII) • Any node can be authenticated uniquely on network • Each node can produce the same key anywhere on the network • Create cryptographic communication keys on the fly • Verify communication transmission

More Related