SlideShare ist ein Scribd-Unternehmen logo
1 von 10
SecurityOverview BunkerMail encryption and key exchange October 7, 2010	GlobalCrypto.com
Todd Merrill, CEO GlobalCrypto	 @ToddMerrill info@globalcrypto.com
Challenges with PCI-DSS  Requirement 3: (Encrypt at Rest) “Protect stored cardholder data” Crypto-key distribution Requirement 4: (Encrypt in Motion) “Encrypt transmission of cardholder data across open, public networks” Requirement 8: (Strong Authentication) “Assign a unique ID to each person with computer access”
We distribute Crypto keys to web users We hide crypto in digital pictures  Steganography! User credential contains (AES encrypted): RSA-1024 user key pair (public-private) RSA-2048 public key for BunkerMail application Dual digital signatures for Authentication
Authentication Strong, Multi-Factor Authentication  Picture = Virtual Smartcard Password is never transmitted or stored Bi-directional Authentication  Sessions are encrypted using unique AES key exchanged upon Authentication (via our PKI) HTTPS used in addition, (redundant) globalcrypto.com/knowledge-center-overview
Authentication
Encryption—end-to-end Private Note and Attachments are encrypted with unique AES keys. AES keys are encrypted with BunkerMail public key (RSA-2048). BunkerMail decrypts the AES keys and re-encrypts them with the public key(s) of recipients AES keys are escrowed if a user is not in the system (no public key yet)
Ideal technical solution Encrypts at rest  Encrypts in motion, end-to-end Provides audit logging, robust audit trail Housed in a secure data center Provides encrypted, automated archival Enforces strong, unique access controls Simple to use

Weitere ähnliche Inhalte

Was ist angesagt?

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
ray0510711s
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
Saa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadeskSaa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadesk
Nico Bosschaert
 

Was ist angesagt? (20)

EthCC 2018 - Decentralized Digital Identity on Ethereum
EthCC 2018 - Decentralized Digital Identity on EthereumEthCC 2018 - Decentralized Digital Identity on Ethereum
EthCC 2018 - Decentralized Digital Identity on Ethereum
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 
ViaSip beta
ViaSip betaViaSip beta
ViaSip beta
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
 
Week11
Week11Week11
Week11
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Is your distributed system secure?
Is your distributed system secure?Is your distributed system secure?
Is your distributed system secure?
 
Blockchain - Navigating this Game-Changing Technology
Blockchain - Navigating this Game-Changing TechnologyBlockchain - Navigating this Game-Changing Technology
Blockchain - Navigating this Game-Changing Technology
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
Saa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadeskSaa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadesk
 

Andere mochten auch

Tax resources 2014 update
Tax resources  2014 updateTax resources  2014 update
Tax resources 2014 update
Katie Brown
 
Las emociones karla y cristina
Las emociones karla y cristinaLas emociones karla y cristina
Las emociones karla y cristina
tallerempleomf
 
Presentation of various B2B Business models case study
Presentation of various B2B Business models case studyPresentation of various B2B Business models case study
Presentation of various B2B Business models case study
Philippe Deschenes
 
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIASCALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
MD Asesores Valladolid
 

Andere mochten auch (20)

Notichanel Jun - Jul
Notichanel Jun - JulNotichanel Jun - Jul
Notichanel Jun - Jul
 
CEMflex VB engl.
CEMflex VB engl.CEMflex VB engl.
CEMflex VB engl.
 
Tax resources 2014 update
Tax resources  2014 updateTax resources  2014 update
Tax resources 2014 update
 
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
 
Article Calzado Barato (13)
Article   Calzado Barato (13)Article   Calzado Barato (13)
Article Calzado Barato (13)
 
Las emociones karla y cristina
Las emociones karla y cristinaLas emociones karla y cristina
Las emociones karla y cristina
 
Caso de éxito, Bioconservación Dynamics CRM Online
Caso de éxito, Bioconservación Dynamics CRM OnlineCaso de éxito, Bioconservación Dynamics CRM Online
Caso de éxito, Bioconservación Dynamics CRM Online
 
Presentation of various B2B Business models case study
Presentation of various B2B Business models case studyPresentation of various B2B Business models case study
Presentation of various B2B Business models case study
 
Datasheet EnGenius EZ Hotspot Extender
Datasheet EnGenius EZ Hotspot ExtenderDatasheet EnGenius EZ Hotspot Extender
Datasheet EnGenius EZ Hotspot Extender
 
Aves magacinedicion8
Aves magacinedicion8Aves magacinedicion8
Aves magacinedicion8
 
Etapasdelavida
EtapasdelavidaEtapasdelavida
Etapasdelavida
 
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIASCALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
 
Pkv
PkvPkv
Pkv
 
Buoni+ Giugno 2015 GameStop Italia
Buoni+ Giugno 2015 GameStop ItaliaBuoni+ Giugno 2015 GameStop Italia
Buoni+ Giugno 2015 GameStop Italia
 
Guia CH3
Guia CH3Guia CH3
Guia CH3
 
Life Resoance Cosmetics Insert E
Life Resoance Cosmetics  Insert ELife Resoance Cosmetics  Insert E
Life Resoance Cosmetics Insert E
 
Catalog panasonic 824
Catalog panasonic 824Catalog panasonic 824
Catalog panasonic 824
 
ICI FINAL REPORT
ICI FINAL REPORTICI FINAL REPORT
ICI FINAL REPORT
 
Nutrición deportiva 2 0 juny_xir
Nutrición deportiva 2 0 juny_xirNutrición deportiva 2 0 juny_xir
Nutrición deportiva 2 0 juny_xir
 
Gualano hnos
Gualano hnosGualano hnos
Gualano hnos
 

Ähnlich wie Bunker mail security

Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfDefine PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
xlynettalampleyxc
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
Hai Nguyen
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 

Ähnlich wie Bunker mail security (20)

cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfDefine PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Biometric electronic wallet for digital currency
Biometric electronic wallet for digital currencyBiometric electronic wallet for digital currency
Biometric electronic wallet for digital currency
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 

Mehr von Todd Merrill (7)

Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
Bunker mail group features
Bunker mail group featuresBunker mail group features
Bunker mail group features
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
Astronomy Belt Loop
Astronomy Belt LoopAstronomy Belt Loop
Astronomy Belt Loop
 
Hipaa Secure File Transfer
Hipaa Secure File TransferHipaa Secure File Transfer
Hipaa Secure File Transfer
 
GlobalCrypto's Real Me Authentication
GlobalCrypto's Real Me AuthenticationGlobalCrypto's Real Me Authentication
GlobalCrypto's Real Me Authentication
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Bunker mail security

  • 1. SecurityOverview BunkerMail encryption and key exchange October 7, 2010 GlobalCrypto.com
  • 2. Todd Merrill, CEO GlobalCrypto @ToddMerrill info@globalcrypto.com
  • 3. Challenges with PCI-DSS Requirement 3: (Encrypt at Rest) “Protect stored cardholder data” Crypto-key distribution Requirement 4: (Encrypt in Motion) “Encrypt transmission of cardholder data across open, public networks” Requirement 8: (Strong Authentication) “Assign a unique ID to each person with computer access”
  • 4.
  • 5. We distribute Crypto keys to web users We hide crypto in digital pictures  Steganography! User credential contains (AES encrypted): RSA-1024 user key pair (public-private) RSA-2048 public key for BunkerMail application Dual digital signatures for Authentication
  • 6. Authentication Strong, Multi-Factor Authentication Picture = Virtual Smartcard Password is never transmitted or stored Bi-directional Authentication Sessions are encrypted using unique AES key exchanged upon Authentication (via our PKI) HTTPS used in addition, (redundant) globalcrypto.com/knowledge-center-overview
  • 8. Encryption—end-to-end Private Note and Attachments are encrypted with unique AES keys. AES keys are encrypted with BunkerMail public key (RSA-2048). BunkerMail decrypts the AES keys and re-encrypts them with the public key(s) of recipients AES keys are escrowed if a user is not in the system (no public key yet)
  • 9.
  • 10. Ideal technical solution Encrypts at rest Encrypts in motion, end-to-end Provides audit logging, robust audit trail Housed in a secure data center Provides encrypted, automated archival Enforces strong, unique access controls Simple to use

Hinweis der Redaktion

  1. PCI-DSS places many requirements on companies that handle Payment Card Information.BunkerMail addresses three main requirements with one technical solution for sending messages and files across company boundaries.Requirement 3 deals with Encryption at Rest. When you email or FTP a file to a business partner the file may be encrypted by HTTPS or SSL during transmission, but when the file is uploaded to a server often it is stored in an unencrypted state. End-to-End Encryption is an answer for this problem, but you have to distribute cryptographic keys to each user. BunkerMail makes this simple.Requirement 4 deals with Encryption in Motion. Most secure applications use HTTPS or SSL encrypted email sessions and cover encryption in motion. BunkerMail takes this a step further and authenticates the channel to thwart phishing and man-in-the-middle attacks.Requirement 8 deals with Strong Authentication. Users should be uniquely credentialed and multi-factor authentication should be used where possible. BunkerMail employs a strong, bi-directional multi-factor authentication that is simple to use.
  2. GlobalCrypto recognizes that cryptographic key distribution is a hard. Certificates and key files are alien to end users and complex to set up.BunkerMail distributes crypto keys to end users by hiding them inside of digital images. Web technologies such as .NET and Flash are used to seamlessly store these images on the end user’s machine. End users hold these credentials on their computers which contain:-An RSA-1024 bit key pair (public and private keys) for the end user.-An RSA-2048 bit public key for the BunkerMail web application.-Partial digital signatures for the user and the web application for Authentication purposes.All of this cryptographic materiel is stored encrypted with AES where the key is a password. Note that the password is never transmitted or stored.
  3. BunkerMail’s image-key is essentially a Virtual Smartcard with a password.The web application stores the image on the user’s machine for later use and recalls the image for authentication.Users only have to type in their password on an enrolled machine.The password is used to decrypt the partial digital signatures as well as the cryptographic keys.Authentication takes place over a secure channel via a session AES key that is exchanged using BunkerMail’s keys. This thwarts phishing and man-in-the-middle attacks that may plague HTTPS. HTTPS is used as a redundant protocol, but is not necessary.See our knowledge center at www.globalcrypto.com for a more in depth study of our authentication.
  4. Here is what the user sees at authentication time. The web server retains a copy of the right-hand side of the image with partial digital signatures.When the user enters a password, the left-hand side is unlocked and transmitted to the server over a secure channel. If authenticated, the web server sends down an unlocked right-hand side of the image and the user is authenticated.The user sees both sides of the image come together and is logged in.
  5. All information is sent as XML through previously authenticated and encrypted sessions. Encryption in motion is always maintained.However, some information is encrypted end-to-end:--The Private note is a message field for Rich Text and is encrypted end-to-end.--Any attachments are end-to-end encrypted.Each attachment and the private note are encrypted with a unique AES key.The AES keys are transmitted to the BunkerMail server using the Server’s public key. BunkerMail re-encrypts the AES keys using the recipient’s public keys.BunkerMail will escrow any AES keys that are bound for users who have not previously established an account and therefore don’t have a public key yet. Upon registration, the AES keys are re-encrypted using the new user’s public key.
  6. We have a great technical solution to solve file transfer and sending of messages in a PCI regulated environment.We have solid cryptographic security and provide a simple user experience.Try us out at www.bunkermail.com