Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
News

Protection technology for cryptographic keys

Arxan Technologies : 05 August, 2008  (New Product)
Anti tampering technology from Arxan has result in TransformIT, a cryptographic key protection system
Arxan Technologies has announced the launch of its new patent-pending cryptographic key protection technology, TransformIT. Today cryptography and PKI form the cornerstones of information security. The effectiveness of these cryptographic routines in turn depends on the secrecy and integrity of keys. TransformIT enhances software security by preventing tampering and hacking attacks that target keys used within software applications – thereby mitigating content, data and revenue loss.

Secret keys are used across many industries for varied purposes, including encryption, authentication and node-locking. In the digital media market, loss of first-level keys allows piracy of software or media titles. As deeper or more system-critical keys are exploited, entire platforms become susceptible to widespread piracy, allowing hackers to instantaneously rip media libraries or unlock subsidised devices. Similarly, public and private key are used to protect enterprise applications and any related data. In addition to unauthorised access, malware insertion and data leakage, system level exploits can result in entire platforms becoming vulnerable – allowing hackers to instantaneously snoop on enterprise-wide systems such as mobile and e-banking transactions or VoIP communications.

Encryption is widely used as a first line of defence to protect authorised access to data and information systems, as well as digital IP, against piracy and theft,” said Diana Kelley, Program Vice President at Security Curve. “However, the single point of failure in such systems is the instance at which the key is revealed and used. This point is easily identifiable through signature patterns and cryptographic routines. Once found, they direct an attacker straight to where the keys will typically be constructed in memory. Subsequently, fatal exploits can be easily created.”

Arxan’s TransformIT product ensures that private keys are never revealed statically or in run-time memory. It also ensures that public keys cannot be tampered with, thereby preventing a wide range of phishing, spoofing and code tampering attacks..

“We’re pleased to bring the latest in key hiding and protection technology to the market with TransformIT, in response to market demand for stronger information security having already been deployed by companies within the remote authentication and digital media industries,” said Mike Dager, CEO of Arxan. “In conjunction with our GuardIT family of products, TransformIT enhances our proven ability to protect and harden applications against the growing range of attack vectors. Arxan security solutions now provide protection against key exploits that can result in system-wide compromise and data leakage. Our proven application hardening technology successfully addresses the costly and growing problems of piracy, tampering and theft which affect an ever-expanding range of digital content providers, from desktop, to embedded, to multi-media software”


Key Features of TransformIT include:.

* White-Box Cryptography Key Representation – Algorithmically strong, this patent-pending approach is fundamentally secure and resistant to break-once-run-everywhere (BORE) attacks.
* Effective Key Hiding – By preventing keys from ever making themselves known, TransformIT thwarts memory dump and memory remnants attacks.
* Tunable – Modifications to the depth and breadth of a key graph allow users to define their level of security. Moreover, a simple API allows TransformIT to easily integrate with other applications.
* Platform Agnostic – TransformIT works on all C/C++ code, irrespective of final platform, and is compatible with any platform using C libraries. It is also extensible to Java, JNI and C#.
* Intricately Hookable – Machine constants, hardware IDs and similar node-locking anchors can be tied into product calculations. The result is that the software cannot be separated from hardware, nor copied.

Arxan’s GuardIT family of software protection products can be seamlessly deployed with TransformIT for comprehensive key transformation and protection. This suite also includes GuardIT for Windows, GuardIT for Linux, and GuardIT for .NET all of which feature automated, easy to use, yet customisable protection across desktop, embedded and server software applications.Now with TransformIT, Arxan offers organizations an additional layer of security for enhanced software protection with key hiding and protection capabilities.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com