SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
0 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001
101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001
1100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 0110
01010011 01111001 01101101 01100001 01101110 01110100 01100101 01100011
01 01101101 01100001 01101110 01110100 01100101 01100011
01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 0101001
01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110
01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 0
01010011 01111001 01101101 01100001 01101110 01110100 01100101 01
01010011 01111001 01101101 01100001 01101110 01110100 01100101 01100011
10111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001
1101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001
01 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001
1 01101101 01100001 01101110 01110100 01100101 01100011
1101110 01110100 01100101 01100011
01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 011
01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 0
01010110 01100001 01101100 01110101 01100101 00100000 011011
01010011 01111001 01101101 01100001 0110111
01010011 01111001 01101101 01100001 01101110 01110100 01100101 01
Take one look at the numbers, and you’ll see why
it’s worth getting to know Perfect Forward Secrecy
When it comes to security, IT professionals need to think ahead: An eavesdropper
who records traffic today may successfully decrypt it in the future. A solution is to
employ Perfect Forward Secrecy, in which unrecoverable temporary session keys
are generated, used and discarded. When implemented correctly with Elliptic
Curve Cryptography (ECC), Perfect Forward Secrecy is more secure than RSA
algorithms and performs better.
The world isn’t safe, and security risks to
businesses and consumers are growing.
PRISM PROGRAM
Program of the National
Security Administration (NSA)
Revealed by Edward
Snowden in spring 2013
Attempt to gain access to
the private communications
of users of:
Microsoft Yahoo! Google Facebook3
ADOBEZAPPOS.COM LIVINGSOCIAL
24 50 38
million customers
affected5
million customers
affected6,7
million accounts
hacked4
JAN 2012 APR 2013 SEP 2013
RSA
RSA generates a public and
private key to encrypt and decode
messages.
Continued use of recoverable
keys makes stored data
accessible if keys are
compromised in the future
PERFECT
FORWARD SECRECY
With Perfect Forward Secrecy,
keys are randomly generated,
exchanged, and discarded.
Methods include ECDHE (Elliptical
Curve DHE) & DHE (Diffie-Helman,
allows shared secret key exchange).
Past messages are protected
from future attack
Potential performance improvement,
if implemented correctly
All ECDHE servers have ciphers at
least as strong as RSA signatures
Perfect Forward Secrecy can be
cracked if ciphers are weak or
stored incorrectly
4 out of 5 DHE-enabled servers allow
ciphers weaker than RSA signatures12
60%
18%
of hosts10
ECDHE supported by
of hosts11
DHE supported by
Currently the dominant system,
supported by
99.9%
of sites8
CHARACTERISTICS CHARACTERISTICS
Will move from 2048-bit to
4096-bit key size, supported in
2014 by 2% of sites9
2%
2048-bit 4096-bit
SECURITY BENEFITS
256-bit ECC is estimated to be
10,000 times
as tough to crack as RSA.
When ECC is applied to DSA
(called ECDSA), level of
security climbs
160-bit public ECDSA key as
secure as 1024-bit DSA key
By default, ECDHE is properly
configured for security with
efficient 256-bit key size
Requires periodic or
upon-connection new random
key generation
Ephemeral keys cannot be
revealed, so even recorded traffic
is safe
PERFORMANCE BENEFITS
Tests were conducted using Elliptic Curve and RSA for key
exchange and digital signature.
The results?13
For complex page server
requests per second:
For multi-domain page server
requests per second:
with
ECDHE-ECDSA
with
RSA-RSA
with
ECDHE-ECDSA
with
RSA-RSA
Performance improvement of
27%
52%
CPU usage cut about
60% with Elliptic Curve
Perfect Forward Secrecy
better than free in terms
of performance
Done properly, Perfect Forward Secrecy
protects sensitive information yesterday, today,
and tomorrow. What’s more, it does so while
improving performance and user experience.
For more information visit www.symantec.com/SSL or call 1-866-893-6565 or
1-520-477-3111 to speak with a security specialist and find out how certificates
with ECC can offer improved performance and protection for your business.
© 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the
Checkmark Logo, and the Norton Secured Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.
Other names may be trademarks of their respective owners.
TO
360265 338265
01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001
0 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001
10101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 011110
1001 01101101 01100001 01101110 01110100 01100101 01100011
1 01101110 01110100 01100101 01100011
THE VALUE OF
Perfect Forward Secrecy
RSA vs. Perfect Forward Secrecy:
Which provides greater security?
Perfect Forward Secrecy, when implemented with ECC,
offers significant performance and security benefits.
Conclusion
Sources
TIMELINE OF ADDITIONAL DATA BREACHES
Names, encrypted passwords, and encrypted credit and
debit card numbers were among the types of data stolen in
these high-profile breaches.
More than 35% increase Nearly 28% increase
1
Finkle, Jim and Egan, Louise. "'Heartbleed' blamed in attack on Canada tax agency, more expected," Reuters.
2
Yadron, Danny. "Massive OpenSSL Bug 'Heartbleed' Threatens Sensitive Data," Wall Street Journal.
3
Lee, Timothy B. “Here’s everything we know about PRISM to date,” Wonkblog, WashingtonPost.com.
4
Hsieh, Tony. “Security Email.”
5
Swisher, Kara. “LivingSocial Hacked — More Than 50 Million Customer Names, Emails, Birthdates and Encrypted Passwords
Accessed (Internal Memo),” AllThingsD.com.
6
“Adobe Breach Impacted At Least 38 Million Users,” KrebsOnSecurity.com.
7
Arkin, Brad. “Important Customer Security Announcement,” Adobe Featured Blogs.
8
Huang, Lin-Shung, Adhikarla, Shrikant, Boneh, Dan, and Jackson, Collin. “An Experimental Study of TLS Forward Secrecy
Deployment,” September 2013.
9
Ibid.
10
Ibid.
11
Ibid.
12
Ibid.
13
Ibid.
HEARTBLEED BUG
Online traffic on over half a
million trusted websites
vulnerable starting June 2012
2013
2014
Estimated costs to eCommerce
and online business in the 100s
of millions
Data stolen from the
Canadian Tax Agency1
Names, passwords and other private
information vulnerable to theft
OpenSSL estimated to
encrypt ~2/3 of active
websites across the Internet2
RSARSA PERFECT
FORWARD SECRECY
PERFECT
FORWARD SECRECY

Mais conteúdo relacionado

Mais de RapidSSLOnline.com

How to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows ServerHow to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows ServerRapidSSLOnline.com
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
SSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonlineSSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonlineRapidSSLOnline.com
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationRapidSSLOnline.com
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateRapidSSLOnline.com
 
Google Chrome 56 What You Need to Know?
Google Chrome 56   What You Need to Know?Google Chrome 56   What You Need to Know?
Google Chrome 56 What You Need to Know?RapidSSLOnline.com
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates RapidSSLOnline.com
 
5 Steps for Preventing Ransomware
5 Steps for Preventing Ransomware5 Steps for Preventing Ransomware
5 Steps for Preventing RansomwareRapidSSLOnline.com
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat ReportRapidSSLOnline.com
 
How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?RapidSSLOnline.com
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organizationRapidSSLOnline.com
 
A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015RapidSSLOnline.com
 
Symantec 2016 Security Predictions - Looking ahead
Symantec 2016 Security Predictions - Looking aheadSymantec 2016 Security Predictions - Looking ahead
Symantec 2016 Security Predictions - Looking aheadRapidSSLOnline.com
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSRapidSSLOnline.com
 
Attacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonlineAttacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonlineRapidSSLOnline.com
 
Obtain SAN SSL or Multi Domain SSL Process | RapidSSLonline
Obtain SAN SSL or Multi Domain SSL Process | RapidSSLonlineObtain SAN SSL or Multi Domain SSL Process | RapidSSLonline
Obtain SAN SSL or Multi Domain SSL Process | RapidSSLonlineRapidSSLOnline.com
 
GeoTrust True BusinessID - Learn About It
GeoTrust True BusinessID - Learn About ItGeoTrust True BusinessID - Learn About It
GeoTrust True BusinessID - Learn About ItRapidSSLOnline.com
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyRapidSSLOnline.com
 

Mais de RapidSSLOnline.com (20)

How to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows ServerHow to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows Server
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
SSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonlineSSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonline
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
 
All About SSL/TLS
All About SSL/TLSAll About SSL/TLS
All About SSL/TLS
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
 
Google Chrome 56 What You Need to Know?
Google Chrome 56   What You Need to Know?Google Chrome 56   What You Need to Know?
Google Chrome 56 What You Need to Know?
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
 
5 Steps for Preventing Ransomware
5 Steps for Preventing Ransomware5 Steps for Preventing Ransomware
5 Steps for Preventing Ransomware
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organization
 
A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015
 
Symantec 2016 Security Predictions - Looking ahead
Symantec 2016 Security Predictions - Looking aheadSymantec 2016 Security Predictions - Looking ahead
Symantec 2016 Security Predictions - Looking ahead
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
 
Attacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonlineAttacks on Point-of-Sales Systems | RapidSSLonline
Attacks on Point-of-Sales Systems | RapidSSLonline
 
Obtain SAN SSL or Multi Domain SSL Process | RapidSSLonline
Obtain SAN SSL or Multi Domain SSL Process | RapidSSLonlineObtain SAN SSL or Multi Domain SSL Process | RapidSSLonline
Obtain SAN SSL or Multi Domain SSL Process | RapidSSLonline
 
GeoTrust True BusinessID - Learn About It
GeoTrust True BusinessID - Learn About ItGeoTrust True BusinessID - Learn About It
GeoTrust True BusinessID - Learn About It
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 

Último

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Último (9)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

Symantec™ Perfect Forward Secrecy in Info-Graphic

  • 1. 0 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001 101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001 1100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 0110 01010011 01111001 01101101 01100001 01101110 01110100 01100101 01100011 01 01101101 01100001 01101110 01110100 01100101 01100011 01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 0101001 01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110 01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 0 01010011 01111001 01101101 01100001 01101110 01110100 01100101 01 01010011 01111001 01101101 01100001 01101110 01110100 01100101 01100011 10111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001 1101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001 01 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001 1 01101101 01100001 01101110 01110100 01100101 01100011 1101110 01110100 01100101 01100011 01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 011 01010110 01100001 01101100 01110101 01100101 00100000 01101111 01100110 00100000 0 01010110 01100001 01101100 01110101 01100101 00100000 011011 01010011 01111001 01101101 01100001 0110111 01010011 01111001 01101101 01100001 01101110 01110100 01100101 01 Take one look at the numbers, and you’ll see why it’s worth getting to know Perfect Forward Secrecy When it comes to security, IT professionals need to think ahead: An eavesdropper who records traffic today may successfully decrypt it in the future. A solution is to employ Perfect Forward Secrecy, in which unrecoverable temporary session keys are generated, used and discarded. When implemented correctly with Elliptic Curve Cryptography (ECC), Perfect Forward Secrecy is more secure than RSA algorithms and performs better. The world isn’t safe, and security risks to businesses and consumers are growing. PRISM PROGRAM Program of the National Security Administration (NSA) Revealed by Edward Snowden in spring 2013 Attempt to gain access to the private communications of users of: Microsoft Yahoo! Google Facebook3 ADOBEZAPPOS.COM LIVINGSOCIAL 24 50 38 million customers affected5 million customers affected6,7 million accounts hacked4 JAN 2012 APR 2013 SEP 2013 RSA RSA generates a public and private key to encrypt and decode messages. Continued use of recoverable keys makes stored data accessible if keys are compromised in the future PERFECT FORWARD SECRECY With Perfect Forward Secrecy, keys are randomly generated, exchanged, and discarded. Methods include ECDHE (Elliptical Curve DHE) & DHE (Diffie-Helman, allows shared secret key exchange). Past messages are protected from future attack Potential performance improvement, if implemented correctly All ECDHE servers have ciphers at least as strong as RSA signatures Perfect Forward Secrecy can be cracked if ciphers are weak or stored incorrectly 4 out of 5 DHE-enabled servers allow ciphers weaker than RSA signatures12 60% 18% of hosts10 ECDHE supported by of hosts11 DHE supported by Currently the dominant system, supported by 99.9% of sites8 CHARACTERISTICS CHARACTERISTICS Will move from 2048-bit to 4096-bit key size, supported in 2014 by 2% of sites9 2% 2048-bit 4096-bit SECURITY BENEFITS 256-bit ECC is estimated to be 10,000 times as tough to crack as RSA. When ECC is applied to DSA (called ECDSA), level of security climbs 160-bit public ECDSA key as secure as 1024-bit DSA key By default, ECDHE is properly configured for security with efficient 256-bit key size Requires periodic or upon-connection new random key generation Ephemeral keys cannot be revealed, so even recorded traffic is safe PERFORMANCE BENEFITS Tests were conducted using Elliptic Curve and RSA for key exchange and digital signature. The results?13 For complex page server requests per second: For multi-domain page server requests per second: with ECDHE-ECDSA with RSA-RSA with ECDHE-ECDSA with RSA-RSA Performance improvement of 27% 52% CPU usage cut about 60% with Elliptic Curve Perfect Forward Secrecy better than free in terms of performance Done properly, Perfect Forward Secrecy protects sensitive information yesterday, today, and tomorrow. What’s more, it does so while improving performance and user experience. For more information visit www.symantec.com/SSL or call 1-866-893-6565 or 1-520-477-3111 to speak with a security specialist and find out how certificates with ECC can offer improved performance and protection for your business. © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, and the Norton Secured Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. TO 360265 338265 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001 0 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 01111001 10101 01100101 00100000 01101111 01100110 00100000 01000110 01101111 01110010 01110111 01100001 01110010 01100100 00100000 01010011 01100101 01100011 01110010 01100101 01100011 011110 1001 01101101 01100001 01101110 01110100 01100101 01100011 1 01101110 01110100 01100101 01100011 THE VALUE OF Perfect Forward Secrecy RSA vs. Perfect Forward Secrecy: Which provides greater security? Perfect Forward Secrecy, when implemented with ECC, offers significant performance and security benefits. Conclusion Sources TIMELINE OF ADDITIONAL DATA BREACHES Names, encrypted passwords, and encrypted credit and debit card numbers were among the types of data stolen in these high-profile breaches. More than 35% increase Nearly 28% increase 1 Finkle, Jim and Egan, Louise. "'Heartbleed' blamed in attack on Canada tax agency, more expected," Reuters. 2 Yadron, Danny. "Massive OpenSSL Bug 'Heartbleed' Threatens Sensitive Data," Wall Street Journal. 3 Lee, Timothy B. “Here’s everything we know about PRISM to date,” Wonkblog, WashingtonPost.com. 4 Hsieh, Tony. “Security Email.” 5 Swisher, Kara. “LivingSocial Hacked — More Than 50 Million Customer Names, Emails, Birthdates and Encrypted Passwords Accessed (Internal Memo),” AllThingsD.com. 6 “Adobe Breach Impacted At Least 38 Million Users,” KrebsOnSecurity.com. 7 Arkin, Brad. “Important Customer Security Announcement,” Adobe Featured Blogs. 8 Huang, Lin-Shung, Adhikarla, Shrikant, Boneh, Dan, and Jackson, Collin. “An Experimental Study of TLS Forward Secrecy Deployment,” September 2013. 9 Ibid. 10 Ibid. 11 Ibid. 12 Ibid. 13 Ibid. HEARTBLEED BUG Online traffic on over half a million trusted websites vulnerable starting June 2012 2013 2014 Estimated costs to eCommerce and online business in the 100s of millions Data stolen from the Canadian Tax Agency1 Names, passwords and other private information vulnerable to theft OpenSSL estimated to encrypt ~2/3 of active websites across the Internet2 RSARSA PERFECT FORWARD SECRECY PERFECT FORWARD SECRECY