- Cryptographic Key Management for the Cloud
- Encryption Solutions for the Cloud
- Virtual Network Encryption
SafeNet Assured Technologies’ sKey3250 is a high assurance certificate-based USB authenticator. Supporting numerous algorithms and X.509 digital certificates, the sKey3250 enables strong two-factor authentication and proof-positive user identification in all Public Key Infrastructure (PKI) environments.
sKey3250 contains a custom smart card ASIC, the SCC650, developed on-shore by SafeNet Assured Technologies (SafeNet AT). This SCC650 ASIC designed to the highest security principles, implements a security architecture found in other SafeNet AT certified ASICs, and is fabricated at a trusted foundry.
sKey3250’s operating system supports the Java Card platform specification v2.2.2 and GlobalPlatform card specification version 2.1.1. This operating system incorporates SafeNet AT’s well-established High Assurance Suite B cryptographic extension (CGX) library to perform all cryptographic operations necessary for the smart card. Together, the hardware and firmware provide the user with features to facilitate and manage combined logical and physical access, while also enabling services to off-load cryptographic algorithm implementation and provide object access control.
On-board cryptographic processing including Suite B Operations
sKey3250 securely stores the user’s credentials, such as digitally-signed certificates, private keys, and network login credentials while also seamlessly supporting secure key generation, secure key storage, encryption/decryption, and digital signature processing (sign and verify). sKey3250 is capable of performing all private and public key cryptographic functions directly on the token, thus eliminating potential threats resulting from private key exposure. In authentication scenarios where cryptographic keys are stored locally on a computer and protected only by software, the keys are vulnerable to accidental loss and malicious acts that could greatly compromise network security and result in unfortunate economic consequences.
Additionally, the on-chip cryptographic functions enable users to perform Suite B and other approved cryptographic operations on the card. This allows the user to carry out ECDSA, RSA (PKCS #1), or DSS (FIPS 186) digital signatures with confidence because the signing key cannot be tampered with by any software that could be running on the host computer. Similarly, security for the exchange of session encryption keys is supported by the on-board cryptographic functions, such as ECDH key agreement and key exchange.
sKey3250, combined with the SafeNet AT High Assurance Client (SHAC) middleware, is designed to support multi-domain usage by allowing the user’s credentials and certificates to be stored in logically separated containers when using 3rd party applets, and cryptographically-separated key containers when using the SafeNet AT applets. This capability grants users more flexible and simplified access to sensitive networks and workstations because a user can use a single authentication device, sKey3250, to securely authenticate to multiple independent networks (i.e., domains), each requiring its own set of unique private keys, credentials and certificates. The combination of sKey3250 and SHAC middleware enables secure separation of all keys and certificates per network so appropriate access levels and network policies are enforced.
Easy to Integrate and Deploy
sKey3250 has been designed to provide built-in cryptographic and data container management for all private and sensitive functions, while giving enterprises the ability to add new applications/applets to address future requirements. sKey3250 may be used with SafeNet AT-developed applets and middleware (SHAC). Custom application integration is facilitated by the cryptographic API support provided by the SHAC middleware and includes PKCS #11, Microsoft CAPI, and Microsoft and Apple PC/SC. The sKey3250 also accepts third-party applets to allow integration of the token into existing enterprise infrastructures. In addition, sKey3250 interoperates with management systems including Red Hat Certificate System, Intercede MyID and Entrust Security Manager.
Token Operating System:
|sKey3250 Product Brief
Product overview with technical features and specifications.