Box hands cloud encryption keys over to its customers

Box has been talking for more than year about letting its customers manage their own encryption keys, allowingthem to store data in the cloud while maintaining control over who gets to access it.

This isnt a straightforward problem to solve, because Boxs whole business is built on making it easier to share data and collaborate. The strictest security controls could eliminate the reason 44,000 companies are paying Box.

Today, Box says it has a new product that gets the job done. Called Enterprise Key Management (EKM), the service puts encryption keys inside a customers own data center and in a special security module stored in an Amazon data center. The Box service still must access customers data in order to enable sharing and collaboration, but EKM makes sure that only happens when the customer wants it to, Box says.

When asked if the service would prevent Box from handing data over to the government, acompany spokesperson said, Unless the customer provides authorization to Box to provide the content thats asked for, Box is prevented from sharing the content. When customers use Box EKM we are not able to provide decrypted content because we dont have the encryption keys protecting the customers content.

Without EKM, Box could be forced to hand data over to the government without notifying the customer if the government request is valid and requires Box to keep it secret.

As Box describes it, EKM would make it a lot harder to hide government requests. The service is being used in beta by about 10 businesses, including Toyota and World Bank Group, and will be generally available to Box enterprise customers in the spring for an added fee.

Box has 48 percent of the Fortune 500 as customers, with millions of individual users, but there are still some customers that cant adopt the cloud, super regulated businesses in financial services, some very large energy companies, some major insurance companies, obviously government agencies and departments, Box cofounder and CEO Aaron Levie told Ars.

These customers want more control over file encryption, but "the challenge is a bunch of these solutions essentially break what we're really good at, which is our end user experience," Levie said. "A lot of our in-line security capabilities like virus scanning, content previewing, and information rights management, all the capabilities where we add on top of your content, tend to break down in a world where we're not helping you manage that encryption."

EKM relies on a Hardware Security Module (HSM) made by SafeNet, which is placed inside Amazon's CloudHSM service. Unlike most Amazon cloud services, this one gives each customer dedicated hardware.

CloudHSM "allows you to protect your encryption keys within HSMs designed and validated to government standards for secure key management," Amazon says. "You can securely generate, store, and manage the cryptographic keys used for data encryption such that they are accessible only by you."

Read more:
Box hands cloud encryption keys over to its customers

Encryption Software (Disk Encryption, File/Folder Encryption, Database Encryption, Communication Encryption, Cloud …

DUBLIN, Feb .10, 2015 /PRNewswire/ --Research and Markets

(http://www.researchandmarkets.com/research/6376kr/encryption) has announced the addition of the "Encryption Software Market by Applications, by Deployment Type & by Regions - Global Forecast and Analysis 2014 - 2019" report to their offering.

The global Encryption Software Market is expected to grow from $1.85 billion in 2014 to $4.82 billion by 2019, at a Compound Annual Growth Rate (CAGR) of 21.1% during the forecast period 2014-2019.

The encryption software market is fast gaining traction mainly due to the introduction and reception of the Bring Your Own Device (BYOD) trend, the growing demand among organizations for augmenting efficiency through safeguarding data transfer with the help of emails across mobile devices. Additionally, the rising data security apprehensions involved in business information access and transfer across these devices further demands security solutions.

Today, organizations are quickly embracing data security solutions to supplement flexible work culture among workforce in a secure manner as it delivers the employees with flexibility in work patterns, and thereby augments the productivity of the companies. Further, the growing volume and strength of cyber-attacks and commercial espionage along with rising proclivity of mobile devices loss and theft is further empowering the adoption of encryption solutions for enabling secure transmission of data across these devices and abstaining commercial espionage and cyber-attacks. Furthermore, the adoption of encryption software is fortified due to the evolution of mandate regulatory standards related to data transfer and its security, that needs to be complied with, across diverse industry verticals such as PCI DSS for BFSI and HIPPA for healthcare, as these solutions adhere with certain specific regulatory norms and enable secured access to data and its transmission across diverse devices including PCs, and mobile devices. Hence, the emergence of these solutions is further adding to the demand of encryption software across the world.

Key Topics Covered:

1 Introduction

2 Research Methodology

3 Executive Summary

4 Premium Insights

Follow this link:
Encryption Software (Disk Encryption, File/Folder Encryption, Database Encryption, Communication Encryption, Cloud ...

Box Offers Extra Encryption in Bid for Additional Trust

Box wants customers to trust it with their most sensitive data. So the cloud-storage and -management company Tuesday said it will soon offer extra encryption that Box says will keep everyone out even Box.

For an undisclosed fee, Box customers will manage the encryption keys used to scramble their data housed on Box servers. In theory, that means only the customer, or people authorized by the customer, will have access to the files.

The new offering checks three strategic boxes for Box.

- It could help win confidence among companies with highly sensitive information, in industries such as banking, specialized manufacturing or health care.

- It could make overseas customers more comfortable handing data to an American company. The Edward Snowden leaks showed international customers that the U.S. government uses court orders to obtain data on the users of Silicon Valley companies. In theory, the new services would prevent Box from handing over user content.

- Its a new source of revenue for Box, which started trading shares publicly last month amid promises from Chief Executive Aaron Levie to boost revenue.

Files stored on Box are routinely encrypted. When a customer logs in, the password tells Box to decrypt the file with a special key for that file. Box keeps that key on its servers.

The new offering will add a second layer of encryption that requires a key stored elsewhere.

Box customers will rent space on encryption-key storage devices managed by Amazon Web Services. Made by SafeNet, the device is allegedly tamper-proof and logs all requests for the keys it holds. Amazon rents use of them to its customers.

Amazon and Box maintain they cant access user data, because they have no access to the SafeNet device.

Excerpt from:
Box Offers Extra Encryption in Bid for Additional Trust

Portable Flash Drives Benefit From Encryption

USB drives that are fast and mobile clearly have uses for certain customers, especially those requiring security. Ultimately, these devices and their encryption features need to be managed by IT to truly keep sensitive data safe.

TORONTO More than a year ago I wrote about how little use I had for a box of USB thumb drives Id collected over the years, but not all readers agreed with me, pointing out the various benefits of having one handy.

Since then, Ive pulled out a thumb drive once to re-flash some firmware on a media streamer. The fact that I work from home means I dont have much need to transport data, and if need be, most of my important documents can be grabbed from the cloud when Im on the go using any device.

But I can see why some users or organizations might need to a portable drive sometimes you just cant connect to the cloud securely enough or at all, or the file you need is so large, downloading it is inconvenient. Or you dont really trust cloud services at all.

Portable drives can pose a security risk as well. Next to hacked databases, often most of the high-profile data-theft stories we hear about are due to lost or stolen USB drives that were not secure and were holding data that should never have left the corporate firewall in the first place.

Thats why Kingston still sees a market for portable USB flash drives. In fact, its growing, according to Ken Campbell, the companys encrypted USB business manager. Specifically, the opportunity is in encrypted drives, a product area that grew 19% in 2014 over the 2013, he said.

Security is still high on peoples minds, Campbell said in a telephone interview, and they always need to transfer data. There are times where there is no Internet and you have to carry data around somewhere.

WiFi is perceived to be more ubiquitous than it really is. I make sure all of my critical documents are available offline on all my computers in case I lose connectivity on long train rides, for example, so I can be productive while travelling.

But its security where Kingston sees the opportunity. The company is targeting corporate customers and government organizations that are intentionally moving data on portable USB flash drives with encryption and management tools. The company recently announced two versions of the DataTraveler 4000 Gen. 2, including one that Kingston calls Management Ready. Both are FIPS 140-2 Level 3 certified with data protected by hardware-based 256-bit AES encryption in XTS mode.

The Management Ready version can be managed centrally, letting the IT department control drives when plugged into a device with Internet connectivity. Campbell said the DataTraveler also doesnt allow data to be put on a public partition; Kingston wants organizations to know they have a secure option for taking data outside the network. Encryption, combined with the speed of USB 3.0, is what customers are ultimately looking for in a portable flash drive, he said.

See more here:
Portable Flash Drives Benefit From Encryption

Embedded Engineers: 10 Skills You Need Now

From getting familiar with open source software to developing apps, industry professionals are urging embedded engineers to get out of their comfort zone and acquire new skills to stay relevant.

Back in the early days of embedded in the 1980s, the guy (and it was mostly guys then) who designed the mixed signal circuits, the guy who connected the microcontroller, the guy who wrote a bunch of low-level assembly code, and the guy who got the prototype out the doorwell, it was all the same guy.

One engineer pretty much did it all.

Then, as embedded systems became bigger and more complexmillions of lines of code now ship with devices--embedded skill sets became partitioned by discipline: hardware developer, firmware developer, software developer.

In many big companies that is still the case. But the pendulum appears to be swinging back, as more and more companies are consolidating engineering roles, looking for developers who are fluent in both hardware and software, and trying to accomplish more with less. Certainly a bigger percent of engineers say they work on both hardware software, as compared to the group that only does one or the other.

Given that its not possible to keep up with everything embedded, how do you make sure that the new skills you acquire are the most relevant?

EE Times turned to nine embedded professionals and a recruiter and asked them to tell us what they think are the most important things engineers should learn now.

Though opinions differed on the specific skills that are most important, they all agreed on one thing all engineers should do: Never stop learning.

Go to next page.

Read more from the original source:
Embedded Engineers: 10 Skills You Need Now

Proofs in Cryptography: Lecture 10 Hybrid Proof Example – PRG Output Expansion – Video


Proofs in Cryptography: Lecture 10 Hybrid Proof Example - PRG Output Expansion
Proofs in Cryptography Lecture 10 Hybrid Proof Example - PRG Output Expansion ALPTEKN KP Assistant Professor of Computer Science and Engineering Ko Univ...

By: Kolt KU

See the rest here:
Proofs in Cryptography: Lecture 10 Hybrid Proof Example - PRG Output Expansion - Video

Public-key cryptography – Wikipedia, the free encyclopedia

Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other as contrasted with conventional ("symmetric") cryptography which relies on the same key to perform both.

Public-key algorithms are based on mathematical problems which currently admit no efficient solution that are inherent in certain integer factorization, discrete logarithm, and elliptic curve relationships. It is computationally easy for a user to generate their own public and private key-pair and to use them for encryption and decryption. The strength lies in the fact that it is "impossible" (computationally infeasible) for a properly generated private key to be determined from its corresponding public key. Thus the public key may be published without compromising security, whereas the private key must not be revealed to anyone not authorized to read messages or perform digital signatures. Public key algorithms, unlike symmetric key algorithms, do not require a secure initial exchange of one (or more) secret keys between the parties.

Message authentication involves processing a message with a private key to produce a digital signature. Thereafter anyone can verify this signature by processing the signature value with the signer's corresponding public key and comparing that result with the message. Success confirms the message is unmodified since it was signed, and presuming the signer's private key has remained secret to the signer that the signer, and no one else, intentionally performed the signature operation. In practice, typically only a hash or digest of the message, and not the message itself, is encrypted as the signature.

Public-key algorithms are fundamental security ingredients in cryptosystems, applications and protocols. They underpin various Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some public key algorithms provide key distribution and secrecy (e.g., DiffieHellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both (e.g., RSA).

Public-key cryptography finds application in, amongst others, the IT security discipline information security. Information security (IS) is concerned with all aspects of protecting electronic information assets against security threats.[1] Public-key cryptography is used as a method of assuring the confidentiality, authenticity and non-repudiability of electronic communications and data storage.

Public-key cryptography is often used to secure electronic communication over an open networked environment such as the internet. Open networked environments are susceptible to a variety of communication security problems such as man-in-the-middle attacks and other security threats. Sending a secure communication means that the communication being sent must not be readable during transit (preserving confidentiality), the communication must not be modified during transit (preserving the integrity of the communication) and to enforce non-repudiation or non-denial of the sending of the communication. Combining public-key cryptography with an Enveloped Public Key Encryption (EPKE)[2] method, allows for the secure sending of a communication over an open networked environment.

The distinguishing technique used in public-key cryptography is the use of asymmetric key algorithms, where the key used to encrypt a message is not the same as the key used to decrypt it. Each user has a pair of cryptographic keys a public encryption key and a private decryption key. Similarly, a key pair used for digital signatures consists of a private signing key and a public verification key. The public key is widely distributed, while the private key is known only to its proprietor. The keys are related mathematically, but the parameters are chosen so that calculating the private key from the public key is either impossible or prohibitively expensive.

In contrast, symmetric-key algorithms variations of which have been used for thousands of years use a single secret key, which must be shared and kept private by both the sender and the receiver, for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.

Because symmetric key algorithms are nearly always much less computationally intensive than asymmetric ones, it is common to exchange a key using a key-exchange algorithm, then transmit data using that key and a symmetric key algorithm. PGP and the SSL/TLS family of schemes use this procedure, and are thus called hybrid cryptosystems.

There are two main uses for public-key cryptography:

View original post here:
Public-key cryptography - Wikipedia, the free encyclopedia

Assange ‘frustrating’ for UK and Sweden officials

Police monitor Assange's supporters at a rally in June 2014. Photo: TT

Julian Assange's residence in London's Ecuadorian embassy is 'frustrating', the UK's Deputy Prime Minister has said, after figures emerged that the Wikileaks founder's security has cost around 125 million kronor ($15 million) as he fights extradition to Sweden.

Police in London have confirmed that the Australian cost UK taxpayers 113 million kronor between June 2012 and October 2014, with current daily costs of around 13,000 kronor expected to have pushed up the total spending to 125 million kronor.

The figures were obtained by London radio station LBC under the UK's Freedom of Information Act.

In response, the UK's Deputy Prime Minister Nick Clegg said Assange should "face justice" and spoke of a "frustrating situation" for both the British taxpayer and the Swedish government, during his weekly radio phone-in on LBC.

Julian Assange is wanted over rape and sexual assault claims made by two women in Sweden in 2010.

Continue reading here:
Assange 'frustrating' for UK and Sweden officials