Security Innovation | Date: 2015-01-05
A method for signing and subsequently verifying a digital message, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q and a relatively smaller integer p that is coprime with q; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a message digest by applying a hash function to the digital message; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key to determine whether the signature is valid.
Security Innovation | Date: 2014-07-22
A method for signing a digital message, including the following steps: selecting parameters that include first and second primes, a ring of polynomials related to the primes, and at least one range-defining integer; deriving private and public keys respectively related to a random polynomial private key of the ring of polynomials, and to evaluations of roots of unity of the random polynomial to obtain a public key set of integers; storing the private key and publishing the public key; signing the digital message by: (A) generating a noise polynomial, (B) deriving a candidate signature by obtaining a hash of the digital message and the public key evaluated at the noise polynomial, and determining the candidate signature using the private key, a polynomial derived from the hash, and the noise polynomial, (C) determining whether the coefficients of the candidate signature are in a predetermined range dependent on the at least one range-defining integer, and (D) repeating steps (A) through (C) until the criterion of step (C) is satisfied, and outputting the resultant candidate signature as an encoded signed message.
News Article | October 28, 2015
Companies to Integrate Products for Highly Secure, New IP Network Solutions Designed to Combat Threats Faced by Today's Enterprises SAN JOSE, CA--(Marketwired - Oct 28, 2015) - Brocade ( : BRCD) today announced that it has joined the Intel Security Innovation Alliance program™. Under the program, Brocade® intends to integrate Intel Security products and technologies with Brocade solutions, enabling enterprises to deploy more secure New IP networking solutions that leverage Intel's industry-leading security technologies. As part of the Intel Security Innovation Alliance program, the Brocade SDN Controller, Brocade Network Advisor, and Brocade analytics and security applications will gain additional layers of security as they are integrated with Intel® Security's Data Exchange Layer, Enterprise Security Manager, and ePolicy Orchestrator®. "The need for better and more pervasive security is one of the biggest drivers behind customers upgrading their networks to New IP architectures. By joining forces with the Intel Security Innovation Alliance program, Brocade intends to offer an enhanced and fully integrated security layer to Brocade data center solutions," said Ken Cheng, CTO, Brocade. "We're pleased to collaborate closely with Intel Security, as it addresses an industry need for more secure, agile and scalable networks." "A key goal of the Intel Security Innovation Alliance program is to accelerate the development of interoperable security products and simplify the integration of those products within complex customer environments," said D.J. Long, Head of the Security Innovation Alliance at Intel Security. "The Innovation Alliance will aim to enable Brocade and Intel Security customers with advanced levels of network security. We're thrilled to see Brocade leverage Intel Security's investment in its security risk management platform and extend this value to customers." About Brocade Brocade ( : BRCD) networking solutions help the world's leading organizations transition smoothly to a world where applications and information reside anywhere. (www.brocade.com) © 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, The Effortless Network, VCS, VDX, Vplane, and Vyatta are registered trademarks, and Fabric Vision and vADX are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of others. Intel, the Intel logo, ePolicy Orchestrator and Intel Security Innovation Alliance are trademarks of Intel Corporation in the U.S. and/or other countries.
News Article | November 3, 2015
News Article | October 26, 2015
SAN MATEO, CA--(Marketwired - Oct 26, 2015) - TrapX, a global leader in advanced cyber security defense, today announced that it has successfully completed integration with the McAfee® Data Exchange Layer (DXL) communication platform. DXL enables the TrapX DeceptionGrid to integrate directly with the McAfee Threat Intelligence Exchange (TIE). DeceptionGrid can now provide actionable intelligence and initiate activity throughout the line of Intel Security products and other Intel Security Innovation Alliance partner's products on TIE. This allows direct remediation actions to be taken, such as shutting down an attack in-flight and quarantining compromised assets in real-time. This enhances customers' ability to identify and defeat many advanced threats such as the APT, zero-day events and other sophisticated malware attacks. DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with real information technology resources. These traps appear identical in every way to real IT assets. Once sophisticated malware has slipped past other primary cyber defenses and penetrated the enterprise, it continues to move laterally to find high-value targets. Just one touch of DeceptionGrid sets off a high-confidence alert. Through the use of the DXL fabric, this alert can drive actions to mitigate the attack rapidly and resume normal operations. "Dynamic Deception Operations (DDO) gives our customers the strongest set of options available to find and defeat attackers that have already breached the perimeter. We've automated everything and integrated DDO tightly with Intel® Security's threat intelligence sharing ecosystem," said Carl Wright, executive vice president and general manager at TrapX Security. "Now we can move with speed and in concert with other Intel Security partner capabilities and products to shut the attack down before the attacker can achieve their objectives or spread." "By implementing products that are integrated with Intel Security solutions, we believe our customers will experience faster deployment times, and with faster deployment times come reduced costs," said D.J. Long, senior director, head of the Security Innovation Alliance at Intel Security. "TrapX's integration with TIE over the DXL platform provides customers with actionable intelligence to manage their multi-vendor security environments." TrapX will also be demonstrating DeceptionGrid at this year's RSA conference taking place in San Francisco February 29 through March 4, 2016. TrapX is a member of the Intel Security Innovation Alliance: http://www.mcafee.com/us/partners/security-innovation-alliance/index.aspx. The Intel Security Innovation Alliance is a technology partner program that facilities interoperability and streamlines the integration of security products in complex customer environments. By working together, Intel Security and its partners aim to deliver more complete security solutions designed to safeguard systems more effectively than solutions available from any single vendor. TrapX Security™ and DeceptionGrid™ are trademarks licensed by TrapX Security, Inc. Visit the TrapX Website: www.trapx.com Watch a 60 Second Introduction to Deception Technology: http://trapx.com/whitehat-versus-blackhat/ Learn more about DeceptionGrid: http://trapx.com/products/deceptiongrid/ Visit the TrapX blog: http://www.trapx.com/blog/ Follow TrapX on Twitter: @trapxsecurity Follow TrapX on LinkedIn: https://www.linkedin.com/company/trapx Like TrapX on Facebook: https://www.facebook.com/pages/TrapX/258804147648401 About TrapX TrapX Security is a leader in the delivery of advanced threat cyber security defense. Our deception-based solutions rapidly detect, analyze and defend against new zero day and APT attacks in real-time. DeceptionGrid provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a pro-active security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries. Learn more at www.trapx.com. Intel, the Intel logo, McAfee, and the McAfee logo are trademarks of Intel Corporation in the U.S. and/or other countries. No computer system can be absolutely secure. Cost reduction scenarios described are intended as examples of how a given Intel Security product, in the specified circumstances and configurations, may affect future costs and provide cost savings. Circumstances will vary. Intel Security does not guarantee any costs or cost reduction.