Showing posts with label Encryption. Show all posts
Showing posts with label Encryption. Show all posts

Friday, April 30, 2010

Chinese Government Wants to See Encryption Info

The German Lorenz cipher machine, used in Worl...

THE GERMAN LORENZ CIPHER MACHINE, USED IN WORLD WAR II FOR ENCRYPTION OF VERY HIGH-LEVEl info


Chinese Want to See Encryption Info

The Chinese government is looking to force security vendors to disclose their encryption information based on new regulations that will come into effect on Saturday. The regulations stipulate that companies selling products that fit into one (or more) of six categories must submit their encryption information to a government panel to receive a license to sell to Chinese government agencies, The Register reports.
EU and U.S. authorities are against the new measures, saying that handing over such information is “something companies cannot and will not do,” according to the president of the European Union Chamber of Commerce Jorg Wuttke.
It is still unclear if U.S. and EU companies would be required to reveal encryption techniques, which are available publicly, or cryptographic keys, which generally remain secret.


Reblog this post [with Zemanta]

Chinese Government Wants to See Encryption Info

The German Lorenz cipher machine, used in Worl...

THE GERMAN LORENZ CIPHER MACHINE, USED IN WORLD WAR II FOR ENCRYPTION OF VERY HIGH-LEVEl info


Chinese Want to See Encryption Info

The Chinese government is looking to force security vendors to disclose their encryption information based on new regulations that will come into effect on Saturday. The regulations stipulate that companies selling products that fit into one (or more) of six categories must submit their encryption information to a government panel to receive a license to sell to Chinese government agencies, The Register reports.
EU and U.S. authorities are against the new measures, saying that handing over such information is “something companies cannot and will not do,” according to the president of the European Union Chamber of Commerce Jorg Wuttke.
It is still unclear if U.S. and EU companies would be required to reveal encryption techniques, which are available publicly, or cryptographic keys, which generally remain secret.


Reblog this post [with Zemanta]

Thursday, April 29, 2010

Payment Card Industry Data Security Standards Expected to Evolve Based on Continued Data Breaches



Thales and Ponemon Institute Reveal Research Study Identifying Key Areas and Predictions on Changes to Security Standards Enabling Auditors to Start to Prepare for October 2010 Announcement

InfoSecurity Europe, London UK, Weston, Florida – April 27, 2010 (AllPayNews) –  Thales (Paris: HO), leader in information systems and communications security, today announced the results of a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS). This new set of standards is expected to be released in October 2010 by the PCI Security Standards Council. Based on surveys with 155 Qualified Security Assessors (QSAs), the following trends and key findings were identified:
- Encryption is one of the most effective means for achieving compliance but questions arise on how to treat encrypted data in audits. It is believed that clarifications will be issued on the use of encryption and key management.

- 41% of those surveyed believed tokenization will be included in the update as the technology to use to increase cardholder data security and reduce cost of compliance.

- Tier 1 merchants are paying $122,000 more on average than Tier 2 merchants to do the same QSA assessments.
The Ponemon Institute, an information-management think tank, designed the survey to focus on identifying trends, recommendations and preferences of QSAs involved in PCI DSS compliance. Specifically, the survey questions focused on the background, experience, client observations, expected changes in PCI DSS, preferences on how to achieve compliance, and typical client recommendations. The results are available in this newly released report, sponsored by Thales entitled: PCI DSS Tends 2010: QSA Business Report. The report can be downloaded atwww.thalesgroup.com/iss
“Our research continues to validate that 60 percent of QSAs believe encryption to be the most effective means to protect card data end-to-end, and 41 percent of QSAs said that controlling access to encryption keys is the most difficult key management task faced by clients using encryption. It remains clear that QSAs consider encryption to be one the best techniques merchants can use to keep information safe and comply with PCI requirements. The current version of the standard, however, is ambiguous about how exactly encrypted data should be treated in audits, so QSAs seem to be confident that the October 2010 update to PCI DSS will provide clarity,” says Dr. Larry Ponemon, chairman and founder of The Ponemon Institute.



Our Device 3DES and End to

End DUKPT Encrypts

the Data at the Maghead
In addition to clarification about encryption and key management, the survey revealed that QSAs expect tokenization to be the new technology most likely included in the PCI DSS update. In 2009, The PCI Security Council commissioned a PricewaterhouseCoopers study to examine whether four emerging technologies showed potential to enhance data security and reduce compliance costs: tokenization, end-to-end encryption, virtual terminals and card management solutions. “41 percent of QSAs believe tokenization is the most likely of these technologies to be addressed in the PCI update, while 28 percent said end-to-end encryption is the most likely, 13 percent said virtual terminals and 9 percent said magnetic stripe imaging,” continued Ponemon. “Only 11 percent of QSAs believe that none of the technologies considered will be included in the PCI DSS updates.”
The research also revealed that on average, Tier 1 merchants pay about $122,000 more than Tier 2 merchants for QSA assessments. As uncovered in the previously issued QSA Insights Report, the average cost of an annual QSA audit—the fees paid to QSAs for assessment services—for Tier 1 merchants is about $225,000. The complete research results reveal that an annual assessment for Tier 2 merchants averages $103,000 and for Tier 1 service providers, such as large payment processors, the average cost of an annual on-site QSA assessment is $204,000.
“Complying with PCI DSS requirements is a great first step toward protecting cardholder information, but as new threats emerge and attacks become more sophisticated, it is important that PCI DSS and the technologies used to safeguard data evolve as well,” says Franck Greverie, Vice President for the information technology security activities of Thales. “By offering merchants insight into the new requirements likely to be included in the PCI DSS update and the current solutions in the marketplace to address these risks, this survey enables organizations to deploy the necessary technologies before the update is issued to give them a head start to enhance compliance efforts and, most importantly, better protect sensitive cardholder data.”
Dr Larry Ponemon of the Ponemon Institute, Tim Holman, QSA and Chief Technology Officer at Blackfoot UK, and Bryta Schulz of Thales will discuss the results of this survey at InfoSecurity Europe (27-29 April 2010, Earls Court, London) in a panel discussion entitled “Wrestling with PCI DSS Compliance - A Unique Look at Achieving Compliance From An Auditors' Perspective” (Tuesday, 27 April at 11:00 a.m.). Thales is available at Stand F35 at InfoSecurity Europe to provide additional information about the survey and to discuss other issues relating to your security needs. Attendees can also pickup their free copy of the new book, PCI Cardholder Data Protection for Dummies.
Visit our digital media centres www.keymanagementinsights.com and www.paymentssecurity.com for industry issues and comment.
Notes to editors
The Information Technology Security activities of Thales

Thales e-Security is a leading global provider of data encryption solutions to the financial services, high technology manufacturing, government, and technology sectors. With a 40-year track record of protecting corporate and government information, Thales solutions are used by four of the five largest energy and aerospace companies, 22 NATO countries, and they secure more than 70 percent of worldwide payment transactions. Thales e-Security has offices in France, Hong Kong, Norway, United States and the United Kingdom. For more information, visit www.thalesgroup.com/iss.
About The Ponemon Institute

The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.
About Thales

Thales is a global technology leader for the Aerospace and Space, Defence, Security and Transportation markets. In 2009, the company generated revenues of 12.9 billion euros with 68,000 employees in 50 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers as local partners. www.thalesgroup.com


Reblog this post [with Zemanta]

Payment Card Industry Data Security Standards Expected to Evolve Based on Continued Data Breaches



Thales and Ponemon Institute Reveal Research Study Identifying Key Areas and Predictions on Changes to Security Standards Enabling Auditors to Start to Prepare for October 2010 Announcement

InfoSecurity Europe, London UK, Weston, Florida – April 27, 2010 (AllPayNews) –  Thales (Paris: HO), leader in information systems and communications security, today announced the results of a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS). This new set of standards is expected to be released in October 2010 by the PCI Security Standards Council. Based on surveys with 155 Qualified Security Assessors (QSAs), the following trends and key findings were identified:
- Encryption is one of the most effective means for achieving compliance but questions arise on how to treat encrypted data in audits. It is believed that clarifications will be issued on the use of encryption and key management.

- 41% of those surveyed believed tokenization will be included in the update as the technology to use to increase cardholder data security and reduce cost of compliance.

- Tier 1 merchants are paying $122,000 more on average than Tier 2 merchants to do the same QSA assessments.
The Ponemon Institute, an information-management think tank, designed the survey to focus on identifying trends, recommendations and preferences of QSAs involved in PCI DSS compliance. Specifically, the survey questions focused on the background, experience, client observations, expected changes in PCI DSS, preferences on how to achieve compliance, and typical client recommendations. The results are available in this newly released report, sponsored by Thales entitled: PCI DSS Tends 2010: QSA Business Report. The report can be downloaded atwww.thalesgroup.com/iss
“Our research continues to validate that 60 percent of QSAs believe encryption to be the most effective means to protect card data end-to-end, and 41 percent of QSAs said that controlling access to encryption keys is the most difficult key management task faced by clients using encryption. It remains clear that QSAs consider encryption to be one the best techniques merchants can use to keep information safe and comply with PCI requirements. The current version of the standard, however, is ambiguous about how exactly encrypted data should be treated in audits, so QSAs seem to be confident that the October 2010 update to PCI DSS will provide clarity,” says Dr. Larry Ponemon, chairman and founder of The Ponemon Institute.



Our Device 3DES and End to

End DUKPT Encrypts

the Data at the Maghead
In addition to clarification about encryption and key management, the survey revealed that QSAs expect tokenization to be the new technology most likely included in the PCI DSS update. In 2009, The PCI Security Council commissioned a PricewaterhouseCoopers study to examine whether four emerging technologies showed potential to enhance data security and reduce compliance costs: tokenization, end-to-end encryption, virtual terminals and card management solutions. “41 percent of QSAs believe tokenization is the most likely of these technologies to be addressed in the PCI update, while 28 percent said end-to-end encryption is the most likely, 13 percent said virtual terminals and 9 percent said magnetic stripe imaging,” continued Ponemon. “Only 11 percent of QSAs believe that none of the technologies considered will be included in the PCI DSS updates.”
The research also revealed that on average, Tier 1 merchants pay about $122,000 more than Tier 2 merchants for QSA assessments. As uncovered in the previously issued QSA Insights Report, the average cost of an annual QSA audit—the fees paid to QSAs for assessment services—for Tier 1 merchants is about $225,000. The complete research results reveal that an annual assessment for Tier 2 merchants averages $103,000 and for Tier 1 service providers, such as large payment processors, the average cost of an annual on-site QSA assessment is $204,000.
“Complying with PCI DSS requirements is a great first step toward protecting cardholder information, but as new threats emerge and attacks become more sophisticated, it is important that PCI DSS and the technologies used to safeguard data evolve as well,” says Franck Greverie, Vice President for the information technology security activities of Thales. “By offering merchants insight into the new requirements likely to be included in the PCI DSS update and the current solutions in the marketplace to address these risks, this survey enables organizations to deploy the necessary technologies before the update is issued to give them a head start to enhance compliance efforts and, most importantly, better protect sensitive cardholder data.”
Dr Larry Ponemon of the Ponemon Institute, Tim Holman, QSA and Chief Technology Officer at Blackfoot UK, and Bryta Schulz of Thales will discuss the results of this survey at InfoSecurity Europe (27-29 April 2010, Earls Court, London) in a panel discussion entitled “Wrestling with PCI DSS Compliance - A Unique Look at Achieving Compliance From An Auditors' Perspective” (Tuesday, 27 April at 11:00 a.m.). Thales is available at Stand F35 at InfoSecurity Europe to provide additional information about the survey and to discuss other issues relating to your security needs. Attendees can also pickup their free copy of the new book, PCI Cardholder Data Protection for Dummies.
Visit our digital media centres www.keymanagementinsights.com and www.paymentssecurity.com for industry issues and comment.
Notes to editors
The Information Technology Security activities of Thales

Thales e-Security is a leading global provider of data encryption solutions to the financial services, high technology manufacturing, government, and technology sectors. With a 40-year track record of protecting corporate and government information, Thales solutions are used by four of the five largest energy and aerospace companies, 22 NATO countries, and they secure more than 70 percent of worldwide payment transactions. Thales e-Security has offices in France, Hong Kong, Norway, United States and the United Kingdom. For more information, visit www.thalesgroup.com/iss.
About The Ponemon Institute

The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.
About Thales

Thales is a global technology leader for the Aerospace and Space, Defence, Security and Transportation markets. In 2009, the company generated revenues of 12.9 billion euros with 68,000 employees in 50 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers as local partners. www.thalesgroup.com


Reblog this post [with Zemanta]

Wednesday, April 7, 2010

Interview with Bob Russo, GM PCI Council on End to End Encryption Guidance



The PCI Security Standards Council is studying a number of emerging technologies and plans to issue a guidance document on end-to-end encryption when it releases the next version of the PCI Data Security Standards (PCI DSS), due out in October. Bob Russo, general manager of the PCI Council, said researchers are preparing documentation on what he calls the latest industry "big buzz word." Other technologies being studied include the use of tokenization and chip and PIN technologies to protect credit card data and how virtualization affects data protection technologies. In this interview, conducted at the recent 2010 RSA Security Conference, Russo explains whether the next version of PCI DSS will have any major changes and why the Council takes a cautious approach to adding changes to the standard.



In 2009 there were no changes made to the PCI Data Security Standards. How would you characterize the year for the payment industry, given the massive breach at Heartland Payment Systems Inc. and the down economy?



Bob Russo: In 2009 we were seeing a lot of uptake on the standard. Since it's a global standard, we're seeing it throughout the world. We're doing lots of training and lots of awareness-type seminars for literally every place around the world. All of our training is pretty much sold out. This year we've had to add training sessions so people can understand what the standard is and get better prepared for an assessment. So overall 2009 was a very good year for the Council, but 2010 is a very busy year for us. We're releasing three standards this year in eight different languages, so we're working hard.






Bob Russo
Bob Russo



The PCI Security Standards Council recently undertook a study examining emerging technologies that could be used in future versions of the standard. Can you talk about some of those technologies that we may see in the future?




Russo: We're studying a couple [of technologies] right now to give additional guidance on them hopefully this year when we release the standard. Chip (chip and PIN) [is being studied] as an initial technology, because chip is a mature technology. There's a lot known about the technology. We have a lot of experience with it outside the United States, so we're looking at chip and we're actually mapping how chip would compare with the standard. We certainly don't think that there's a silver bullet in any of these technologies, whether it is chip and PIN, end-to-end encryption as the buzz word goes, tokenization or anything of that nature. The second [technology being studied] will be some form of encryption. I don't like the term end-to-end encryption. Whether it is point-to-point encryption, account data encryption or transaction-based encryption, whatever it ends up being, we will be mapping that as well. Then we'll be moving on to other technologies including tokenization and virtualization.  We're creating a framework right now where we map these technologies out and lay them next to the standards, so if somebody is using one of these technologies, [the framework] will let them know if they would satisfy certain requirements.





The standard is due for a revision in 2010. Can you give merchants an idea of what may be addressed?





Russo: At this point we're going through a ton of feedback. Our feedback analysis closes at the end of April. We're finding this feedback fits into three categories: additional guidance, clarifications and then these emerging trends or emerging requirements. With a couple of thousand pieces of feedback that we're looking through, there's conflicting types of things there. We have conflicting opinions on what certain things should be. … The biggest thing that will affect the standard going forward is: how to best protect the data and then how much will this cost a merchant, the return on investment and whether there's anything that changes fundamentally the way the merchant actually will have to comply with the standard in the way they do business. If there's something that changes fundamentally the way they do business, certainly we can't put that in initially and have people go out of compliance. In some cases that would have to be a best practice for a certain period of time. In the last version of the standard, requirement 6.6 was a best practice for 18 months, so people had the opportunity to back into it because it was a big change in the way they complied. It's still too early to tell if this will be a version 2 or a version 1.3.



After the Heartland breach, there's been a push for end-to-end encryption, not only from Heartland but from other payment processors. Is that something the council will look at?




Russo: With end-to-end encryption one of the questions we have is: From what end to what end? That's an issue. It's a very big buzz word. There are no standards yet for this type of encryption and how the keys are handled. In many cases you can end up making things less secure based on how you do this. You mentioned Heartland's [E3 product], that's one solution. There are probably a dozen solutions out there. Do they talk to each other? Are they interoperable? What if a merchant is using more than one? These are things that will have to be considered when looking at this. What we'll be studying is an encryption solution and the minimum level of things that need to be done with an encryption solution. Once we've got that we'll put out some guidance, probably nothing specific within the standard. The standard won't change, but there will be guidance based on using these things.



Tokenization is also making its way in some encryption products. Can that make its way in the next version of the standard?



Russo: Certainly [tokenization] guidance could make its way in. I don't see us requiring any kind of tokenization, end-to-end encryption or chip technology in this version, but certainly [we will issue] guidance on these things. If a merchant has already started down a path and spent some dollars on one technology, certainly it would not be in our best interest to say "you chose the wrong technology now you need to use this technology." So there will be guidance on each one of these things that we roll out.







Reblog this post [with Zemanta]

Interview with Bob Russo, GM PCI Council on End to End Encryption Guidance



The PCI Security Standards Council is studying a number of emerging technologies and plans to issue a guidance document on end-to-end encryption when it releases the next version of the PCI Data Security Standards (PCI DSS), due out in October. Bob Russo, general manager of the PCI Council, said researchers are preparing documentation on what he calls the latest industry "big buzz word." Other technologies being studied include the use of tokenization and chip and PIN technologies to protect credit card data and how virtualization affects data protection technologies. In this interview, conducted at the recent 2010 RSA Security Conference, Russo explains whether the next version of PCI DSS will have any major changes and why the Council takes a cautious approach to adding changes to the standard.



In 2009 there were no changes made to the PCI Data Security Standards. How would you characterize the year for the payment industry, given the massive breach at Heartland Payment Systems Inc. and the down economy?



Bob Russo: In 2009 we were seeing a lot of uptake on the standard. Since it's a global standard, we're seeing it throughout the world. We're doing lots of training and lots of awareness-type seminars for literally every place around the world. All of our training is pretty much sold out. This year we've had to add training sessions so people can understand what the standard is and get better prepared for an assessment. So overall 2009 was a very good year for the Council, but 2010 is a very busy year for us. We're releasing three standards this year in eight different languages, so we're working hard.






Bob Russo
Bob Russo



The PCI Security Standards Council recently undertook a study examining emerging technologies that could be used in future versions of the standard. Can you talk about some of those technologies that we may see in the future?




Russo: We're studying a couple [of technologies] right now to give additional guidance on them hopefully this year when we release the standard. Chip (chip and PIN) [is being studied] as an initial technology, because chip is a mature technology. There's a lot known about the technology. We have a lot of experience with it outside the United States, so we're looking at chip and we're actually mapping how chip would compare with the standard. We certainly don't think that there's a silver bullet in any of these technologies, whether it is chip and PIN, end-to-end encryption as the buzz word goes, tokenization or anything of that nature. The second [technology being studied] will be some form of encryption. I don't like the term end-to-end encryption. Whether it is point-to-point encryption, account data encryption or transaction-based encryption, whatever it ends up being, we will be mapping that as well. Then we'll be moving on to other technologies including tokenization and virtualization.  We're creating a framework right now where we map these technologies out and lay them next to the standards, so if somebody is using one of these technologies, [the framework] will let them know if they would satisfy certain requirements.





The standard is due for a revision in 2010. Can you give merchants an idea of what may be addressed?





Russo: At this point we're going through a ton of feedback. Our feedback analysis closes at the end of April. We're finding this feedback fits into three categories: additional guidance, clarifications and then these emerging trends or emerging requirements. With a couple of thousand pieces of feedback that we're looking through, there's conflicting types of things there. We have conflicting opinions on what certain things should be. … The biggest thing that will affect the standard going forward is: how to best protect the data and then how much will this cost a merchant, the return on investment and whether there's anything that changes fundamentally the way the merchant actually will have to comply with the standard in the way they do business. If there's something that changes fundamentally the way they do business, certainly we can't put that in initially and have people go out of compliance. In some cases that would have to be a best practice for a certain period of time. In the last version of the standard, requirement 6.6 was a best practice for 18 months, so people had the opportunity to back into it because it was a big change in the way they complied. It's still too early to tell if this will be a version 2 or a version 1.3.



After the Heartland breach, there's been a push for end-to-end encryption, not only from Heartland but from other payment processors. Is that something the council will look at?




Russo: With end-to-end encryption one of the questions we have is: From what end to what end? That's an issue. It's a very big buzz word. There are no standards yet for this type of encryption and how the keys are handled. In many cases you can end up making things less secure based on how you do this. You mentioned Heartland's [E3 product], that's one solution. There are probably a dozen solutions out there. Do they talk to each other? Are they interoperable? What if a merchant is using more than one? These are things that will have to be considered when looking at this. What we'll be studying is an encryption solution and the minimum level of things that need to be done with an encryption solution. Once we've got that we'll put out some guidance, probably nothing specific within the standard. The standard won't change, but there will be guidance based on using these things.



Tokenization is also making its way in some encryption products. Can that make its way in the next version of the standard?



Russo: Certainly [tokenization] guidance could make its way in. I don't see us requiring any kind of tokenization, end-to-end encryption or chip technology in this version, but certainly [we will issue] guidance on these things. If a merchant has already started down a path and spent some dollars on one technology, certainly it would not be in our best interest to say "you chose the wrong technology now you need to use this technology." So there will be guidance on each one of these things that we roll out.







Reblog this post [with Zemanta]

Thursday, March 4, 2010

RSA Authentication Weaknesses Exposed

SSL is flawed. Now, according to a new paper from University of Michigan computer scientists, we can add RSA Authentication to that list.  Help Net Security reports that "The most common digital security technique used to protect both media copyright and Internet communications has a major weakness.

RSA authentication is a popular encryption method used in media players, laptop computers, smartphones, servers and other devices. 



Retailers and banks also depend on it to ensure the safety of their customers' information online.


The paper is called "Fault-based Attack of RSA Authentication", and you can get it here.



Thanks for Visiting - Bookmark us or Add to your Favorites and Find Out What's Going on Tomorrow in the Payments Industry

Disqus for ePayment News