101010101100100101101001101110010101011010101010 ·...

16
10101010110010010110100110111001010101101010101

Transcript of 101010101100100101101001101110010101011010101010 ·...

Page 1: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

Page 2: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

CRYPTSOFT is a privately held Australian company that operates worldwide in the enterprise key management security market. Cryptsoft’s Key Management Interoperability Protocol (KMIP) software development kits (SDKs) are the market’s preferred OEM solutions. Cryptsoft’s solutions have been selected by prominent global companies for interoperable enterprise key management and encryption technology in their storage, security and cloud products. Cryptsoft is an OASIS Sponsor, SNIA and SSIF Voting Member. http://www.cryptsoft.com/

CRYPTSOFT’S valued customers include:

Page 3: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

Key Management SDKsComplete vendor-independent key management solution

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

All trademarks, service marks, trade names, product names and logos are property of their respective owners.

Cryptsoft’s Key Management SDKs enable rapid addition of interoperable key management functionality to your existing products.

Providing both Client and Server SDKs, Cryptsoft KMIP SDKs have been integrated into the majority of all KMIP products on the market today, eliminating the need for rework to interact with another vendor’s endpoint.

As the security market’s preferred KMIP vendor, Cryptsoft has the technology and the relationships to ensure your product delivers its maximum potential.

Using the Cryptsoft SDKs in ANSI C you can support existing non-KMIP key management protocols with a single, consistent interface and provide your customers with a complete vendor-independent key management solution, often without replacing existing end points.

Key Features•  Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)•  Guaranteed interoperability With all released KMIP products•  Cross-Language Support Clients in C, Java, C-Sharp, and Python

Servers in C and Java

KEY

MAN

AGEM

ENT

KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL

Clients

Servers

Page 4: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

KMIP Interoperability Test SuiteComplete vendor-independent key management solution

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT

101010101100100101101001101110010101011010101010

Key Management SDKsComplete vendor-independent key management solution

Client SDK Products Server SDK Products•  KMIP C Client SDK•  KMIP Java Client SDK•  KMIP C-Sharp Client SDK•  KMIP Python Client SDK•  KMIP C Client Layered Protocol SDKs for Proprietary Protocols•  KMIP Adapters (Oracle TDE & Microsoft BitLocker)•  KXUC C Interoperability Test Suite•  KXUC Java Interoperability Test Suite•  KXUC Web Interoperability Test Suite•  KXUC Cloud Online Test Service

Features•  Comprehensive example code•  Source licence option•  Supports KMIP v1.0, v1.1, v1.2, and v1.3 (committee draft)

•   Supports proprietary key management protocols (optional plugins to C SDK)

Supported Databases•  Oracle MySQL•  Oracle Database•  Microsoft SQL Server•  SQLite

•   IBM DB2•  PostgreSQL•  Embedded (lightweight)

Supported Hardware Security Modules and Random Number Generators

•  Android [OATH-TOTP] [Soft Token]•  Cryptsoft [OATH-TOTP]•  Feitian [OATH-HOTP/TOTP] •  Apple [OATH-TOTP] [Soft Token]

•  SafeNet - Luna CA (RNG/HSM) [PKCS#11]•  SafeNet - Luna PCI (RNG/HSM) [PKCS#11]•  SafeNet - Protect Server (RNG/HSM) [PKCS#11]•  Thales e-Security - nShield Connect (RNG/HSM) [PKCS#11]•  Thales e-Security - nShield Edge (RNG/HSM) [PKCS#11]•  Thales e-Security - nShield Solo (RNG/HSM) [PKCS#11]

Supported One Time Password Devices

•  ID Quantique - Quantis USB (RNG) [Vendor]•  ID Quantique - Quantis PCI (RNG) [Vendor]•  ID Quantique - Quantis PCIe (RNG) [Vendor]•  Feitian - ePass [PKCS#11]•  Oracle - SCA6000 [PKCS#11]•  SafeNet - Luna SA4/SA5 (RNG/HSM) [PKCS#11]

•  Mi-Token [OATH-TOTP] [Soft Token]•  RSA Security SecurID [SecurID]•  Litheware Tombé [OATH-HOTP] [YubiKey]•  Yubico [OATH-HOTP/TOTP] [YubiKey]

•  KMIP C Server SDK•  KMIP Java Server SDK•  KMIP Alert Server SDK•  KMIP Server VM Subscription (Annual)•  KMIP Server Administration Interface•  KMIP C Proxy Servers for Proprietary Protocols•  KMIP C Server Integration Modules (PKCS#11, HSM, RNG)•  KMIP C Server OTP Server Modules

Page 5: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

All trademarks, service marks, trade names, product names and logos are property of their respective owners.

Complete vendor-independent key management solutionKMIP C Client SDK

Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.

Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.

From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.

Key Features•  Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)•  Guaranteed interoperability With all released KMIP server products•  Extensive range of supported platforms Custom platform ports on request•  Available as a binary SDK Source license option•  Comprehensive example code Custom examples available - rapid integration•  Supported on over 35 different platforms Including Linux, Windows, Embedded http://www.cryptsoft.com/platforms/

KEY

MAN

AGEM

ENT

KMIP Client SDK KMIP Server SDK

KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL

Page 6: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT

Complete vendor-independent key management solutionKMIP C Client SDK

KMIP C Client Examples

Supported KMIP Profiles

Supported KMIP Operations

Supported KMIP Servers

KMIP Object Types Supported Cryptographic Providers

•  Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML•  Simple Servers Query, Notify, Put•  Simple Clients Locate Objects, Create and Return Objects •  Locating Managed Objects Simple, Extended, IBM TKLM/SKLM•  KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key Key Pair1.1, Archive, Recover, Activate•  Creating Keys Simple, Advanced, Extensions

•  Advanced Cryptographic Client1.2

•  Advanced Symmetric Key Foundry Client •  Asymmetric Key Lifecycle Client•  Baseline Client Basic•  Baseline Client TLS v1.2•  Basic Cryptographic Client1.2

•  Activate•  Add Attribute•  Archive•  Cancel•  Certify•  Check•  Create

•  Certificate•  Opaque Object•  PGP Key

•  OpenSSL 1.0.x•  OpenSSL FIPS 2.0

•  RSA BSAFE MES 3.x, 4.x (option)•  RSA BSAFE Share-C (option)•  OpenSSL 0.9.8 (option)

•  Private Key•  Public Key •  Secret Key

•  Split Key •  Symmetric Key•  Template

•  Create Key Pair•  Create Split Key1.2

•  Decrypt1.2

•  Delete Attribute•  Derive Key•  Destroy•  Discover Versions1.1

•  Encrypt1.2

•  Get•  Get Attribute List•  Get Attributes•  Get Usage Allocation•  Hash1.2

•  Join Split Key1.2

•  Locate•  MAC1.2

•  MAC Verify1.2

•  Modify Attribute•  Notify•  Obtain Lease•  Poll

•  Put •  Register•  Register Query•  Re-certify•  Recover•  Re-key•  Re-key Key Pair1.1

•  Revoke •  RNG Retrieve1.2

•  RNG Seed1.2

•  Sign1.2

•  Signature Verify1.2

•  Validate

•  Managing Attributes Add, Modify, Delete Attribute•  Linear Tape Open (LTO) LTO-4 Key Management, LTO-5/6 Key Management, KAD, AKAD, UKAD naming, Generic LTO-4•  Random Number Generator (RNG)1.2

Retrieve Server RNG, Seed Server RNG•  Server Cryptographic Operations1.2

Encrypt, Decrypt, Sign, Signature Verify MAC, MAC Verify, Hash•  Determine Capabilities Client SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3

•  Basic Symmetric Key Foundry Client•  HTTPS Client•  Intermediate Symmetric Key Foundry Client•  JSON Client•  Opaque Managed Object Store Client•  RNG Cryptographic Client1.2

•  Split Key (Multi-Party Controls)1.2

Create Split Key, Join Split Key•  Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete•  Generic Multi-protocol Key Handling Get Key, Put Key, Del Key Request/Response Handling Recording, Replaying, Batching•  Client Credential Handling Password-protected TLS Credentials Device Credentials, IBM TKLM/SKLM

•  Storage Array With SED Client•  Suite-B MinLOS_128 Client•  Suite-B MinLOS_192 Client•  Symmetric Key Lifecycle Client•  Tape Library Client•  XML Client

Page 7: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

Complete vendor-independent key management solution

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

All trademarks, service marks, trade names, product names and logos are property of their respective owners.

KMIP Java Client SDK

Key Features•  Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)•  Guaranteed interoperability With all released KMIP server products•  Available as a binary SDK Source license option•  Comprehensive example code Custom examples available - rapid integration

KEY

MAN

AGEM

ENT

Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.

Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.

From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.

KMIP Client SDK KMIP Server SDK

KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL

Page 8: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

Complete vendor-independent key management solution

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT

KMIP Java Client SDK

KMIP Java Client Examples• KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key KeyPair 1.1, Archive, Recover, Activate, Derive Key•  Determine Capabilities Client SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3 •  Creating Keys Simple, Advanced, Extensions

KMIP Object Types Cryptographic Providers Encodings•  Certificate•  Opaque Object•  PGP Key

•  Sun/Oracle JCE•  IBM JCE•  RSA BSAFE Crypto-J•  Bouncy Castle JCE

•  Private Key•  Public Key •  Secret Key

•  Split Key •  Symmetric Key•  Template

•  TTLV•  HTTPS/TTLV•  HTTPS/JSON•  HTTPS/XML

Supported KMIP Operations•  Activate•  Add Attribute•  Archive•  Cancel•  Certify•  Check•  Create

•  Create Key Pair•  Create Split Key1.2

•  Decrypt1.2

•  Delete Attribute•  Derive Key•  Destroy•  Discover Versions1.1

•  Encrypt1.2

•  Get•  Get Attribute List•  Get Attributes•  Get Usage Allocation•  Hash1.2

•  Join Split Key1.2

•  Locate•  MAC1.2

•  MAC Verify1.2

•  Modify Attribute•  Notify•  Obtain Lease•  Poll

•  Put •  Register•  Register Query•  Re-certify•  Recover•  Re-key•  Re-key Key Pair1.1

•  Revoke •  RNG Retrieve1.2

•  RNG Seed1.2

•  Sign1.2

•  Signature Verify1.2

•  Validate

•  Managing Attributes Add, Modify, Delete Attribute•  Random Number Generator (RNG)1.2

Retrieve Server RNG, Seed Server RNG•  Server Cryptographic Operations1.2

Encrypt, Decrypt, MAC, MAC Verify, Hash•  Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML•  Simple Servers Query, Notify, Put•  Locating Managed Objects Simple, Extended, XML

•  Simple Clients Locate Objects, Create and Return •  Objects Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete•  Request/Response Handling Replay, Batching•  JCE Examples Key Store Provider

Supported KMIP Profiles•  Advanced Cryptographic Client1.2

•  Advanced Symmetric Key Foundry Client •  Asymmetric Key Lifecycle Client•  Baseline Client Basic•  Baseline Client TLS v1.2•  Basic Cryptographic Client1.2

•  Basic Symmetric Key Foundry Client•  HTTPS Client•  Intermediate Symmetric Key Foundry Client•  JSON Client•  Opaque Managed Object Store Client•  RNG Cryptographic Client1.2

•  Storage Array With SED Client•  Suite-B MinLOS_128 Client•  Suite-B MinLOS_192 Client•  Symmetric Key Lifecycle Client•  Tape Library Client•  XML Client

Supported KMIP Servers

Page 9: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

Complete vendor-independent key management solution

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

All trademarks, service marks, trade names, product names and logos are property of their respective owners.

KMIP C Server SDK

KEY

MAN

AGEM

ENT

Key Features•  Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)•  Guaranteed interoperability With all released KMIP server products•  Extensive range of supported platforms Custom platform ports on request•  Available as a binary SDK Source license option•  Comprehensive example code Custom examples available - rapid integration•  Supported on over 35 different platforms Including Linux, Windows, Embedded http://www.cryptsoft.com/platforms/

Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.

Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.

From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.

KMIP Client SDK KMIP Server SDK

KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL

Page 10: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT

Complete vendor-independent key management solution`

KMIP C Server SDK

KMIP C Server Examples

Supported KMIP Profiles

Supported KMIP Clients

Supported Databases Cryptographic Providers Supported Encodings

•  Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML•  Simple Clients Operations Locate Objects, Create and Return Objects •  Locating Managed Objects Simple, Extended, IBM TKLM/SKLM•  KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key Key Pair 1.1, Archive, Recover, Activate•  Server Cryptographic Operations1.2

Encrypt, Decrypt, Sign, Signature Verify MAC, MAC Verify, Hash

•  Advanced Cryptographic Server1.2

•  Advanced Symmetric Key Foundry Server •  Asymmetric Key Lifecycle Server•  Baseline Server Basic•  Baseline Server TLS v1.2•  Basic Cryptographic Server1.2

•  SQLite3•  MySQL 5.x•  Oracle 11.x, 12.x

•  OpenSSL 1.0.x•  OpenSSL 0.9.8 (option)•  OpenSSL FIPS 2.0

•  SQL Server 2003+•  IBM DB2 9 & 10•  PostgreSQL 8 & 9

•  TTLV•  HTTPS/TTLV

•  HTTPS/JSON•  HTTPS/XML

Supported KMIP Operations•  Activate•  Add Attribute•  Archive•  Cancel•  Certify•  Check•  Create

•  Create Key Pair•  Create Split Key1.2

•  Decrypt1.2

•  Delete Attribute•  Destroy•  Discover Versions1.1

•  Encrypt1.2

•  Get•  Get Attribute List•  Get Attributes•  Get Usage Allocation•  Hash1.2

•  Join Split Key1.2

•  Locate

•  MAC1.2

•  MAC Verify1.2

•  Modify Attribute•  Notify•  Obtain Lease•  Poll•  Put

•  Register•  Register Query•  Re-certify•  Recover•  Re-Key•  Re-key Key Pair1.1

•  Revoke

•  RNG Retrieve1.2

•  RNG Seed1.2

•  Sign1.2

•  Signature Verify1.2

•  Validate

•  Managing Attributes Add, Modify, Delete Attribute•  Random Number Generator (RNG)1.2

Retrieve Server RNG, Seed Server RNG•  Split Key (Multi-Party Controls)1.2

Create Split Key, Join Split Key•  Creating Keys Simple, Advanced, Extensions•  Determine Capabilities Server SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3

•  Basic Symmetric Key Foundry Server•  HTTPS Server•  Intermediate Symmetric Key Foundry Server•  JSON Server•  Opaque Managed Object Store Server•  RNG Cryptographic Server1.2

•  Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete•  Request/Response Handling Recording, Replaying, Batching, Bulk Data Loading•  Administration Create, Modify, Delete Users, Partitions, Groups Manage Group Privileges Serialise, Deserialise Managed Objects•  Database Schema Management and Migration Fixture Loading, SQL Replay

•  Storage Array With SED Server•  Suite-B MinLOS_128 Server•  Suite-B MinLOS_192 Server•  Symmetric Key Lifecycle Server•  Tape Library Server•  XML Server

Page 11: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

Complete vendor-independent key management solution

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

All trademarks, service marks, trade names, product names and logos are property of their respective owners.

KMIP Java Server SDK

Key Features•  Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)•  Guaranteed interoperability With all released KMIP server products•  Extensive range of supported platforms Custom platform ports on request•  Available as a binary SDK Source license option•  Comprehensive example code Custom examples available - rapid integration

KEY

MAN

AGEM

ENT

Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.

Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.

From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.

KMIP Client SDK KMIP Server SDK

KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL

Page 12: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT

Complete vendor-independent key management solutionKMIP Java Server SDK

KMIP Java Server Examples

Supported KMIP Profiles

Supported KMIP Clients

Supported Databases Cryptographic Providers Supported Encodings

•  Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML•  KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key Key Pair 1.1, Archive, Recover, Activate, Derive Key•  Administration Create, Modify, Delete Users, Partitions, Groups Manage Group Privileges Serialise, Deserialise Managed Objects•  Server Cryptographic Operations1.2

Encrypt, Decrypt, MAC, MAC Verify, Hash

•  Advanced Cryptographic Server1.2

•  Advanced Symmetric Key Foundry Server •  Asymmetric Key Lifecycle Server•  Baseline Server Basic•  Baseline Server TLS v1.2•  Basic Cryptographic Server1.2

•  HSQLDB•  SQLite3•  MySQL 5.x•  Oracle 11.x, 12.x

•  Sun/Oracle JCE•  IBM JCE•  RSA BSAFE Crypto-J•  Bouncy Castle JCE

•  SQL Server 2003+•  IBM DB2 9 & 10•  PostgreSQL 8 & 9

•  TTLV•  HTTPS/TTLV

•  HTTPS/JSON•  HTTPS/XML

Supported KMIP Operations•  Activate•  Add Attribute•  Archive•  Cancel•  Certify•  Check•  Create

•  Create Key Pair•  Decrypt1.2

•  Delete Attribute•  Derive Key•  Destroy•  Discover Versions1.1

•  Encrypt1.2

•  Get•  Get Attribute List•  Get Attributes•  Get Usage Allocation•  Hash1.2

•  Locate•  MAC1.2

•  MAC Verify1.2

•  Modify Attribute•  Notify•  Obtain Lease•  Poll•  Put •  Register

•  Register Query•  Re-certify•  Recover•  Re-key•  Re-key Key Pair1.1

•  Revoke •  RNG Retrieve1.2

•  RNG Seed1.2

•  Validate

•  Creating Keys Simple, Advanced, Extensions•  Managing Attributes Add, Modify, Delete Attribute•  Random Number Generator (RNG)1.2

Retrieve Server RNG, Seed Server RNG•  Determine Capabilities Client SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3 •  Request/Response Handling Replay, Batching

•  Basic Symmetric Key Foundry Server•  HTTPS Server•  Intermediate Symmetric Key Foundry Server•  JSON Server•  Opaque Managed Object Store Server•  RNG Cryptographic Server1.2

•  JCE Examples Key Store Provider•  Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete•  Database Schema Management and Migration Fixture Loading•  Simple Servers Query, Notify, Put•  Simple Clients Locate Objects, Create and Return Objects •  Locating Managed Objects Simple, Extended, XML

•  Storage Array With SED Server•  Suite-B MinLOS_128 Server•  Suite-B MinLOS_192 Server•  Symmetric Key Lifecycle Server•  Tape Library Server•  XML Server

Page 13: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

All trademarks, service marks, trade names, product names and logos are property of their respective owners.

Complete verification solutionKMIP Interoperability Test Suite

Cryptsoft’s Key Management Interoperability Protocol Test Suites (KXUC) let you rapidly confirm the interoperability status of your product.

Reduce time to market and release with the confidence provided by data driven testing.

Backed by a global support network, Cryptsoft’s KMIP SDKs offer a total key management solution.

Key Features•  Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)•  Available as a binary SDK or as a service Source license option•  Comprehensive test cases KMIP Test Cases and KMIP Profile Test Cases

DefineTransform

ExecuteAnalyse

KXUC C

KXUC Java

KXUC Web

KXUC Cloud

Test Report

SKFF-M-1-101

SKFF-M-2-10

SKFF-M-3-10

SKFF-M-4-10

SKFF-M-5-10

SKFF-M-6-10

SKFF-M-7-10

SKFF-M-8-10

SKFF-M-9-10

SKFF-M-10-10

2

3

4

5

6

7

8

9

10

15%

25%

5%

12%

15%

20%

18%

5%

20%

10%

--

--

--

--

--

--

--

--

--

--

Test ID % &#

KMIP TEST CASES KMIP PROFILES

KEY

MAN

AGEM

ENT

Page 14: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

101010101100100101101001101110010101011010101010

KMIP Interoperability Test SuiteComplete verification solution

sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362

@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT

• TC-311-11• TC-312-11• TC-313-11• TC-314-11• TC-315-11• TC-32-11• TC-41-11• TC-51-11• TC-61-11• TC-71-11• TC-72-11• TC-81-11• TC-82-11• TC-91-11• TC-92-11• TC-93-11

• TC-94-11• TC-95-11• TC-101-11• TC-111-11• TC-112-11• TC-121-11• TC-122-11• TC-131-11• TC-132-11• TC-133-11• TC-134-11• TC-141-11• TC-142-11• TC-151-11• TC-152-11• TC-161-11

• TC-171-11• TC-181-11• TC-182-11• TC-NP-1-11• TC-NP-2-11• TC-ECC-1-11• TC-ECC-2-11• TC-ECC-3-11• SKFF-M-1-11• SKFF-M-2-11• SKFF-M-3-11• SKFF-M-4-11• SKFF-M-5-11• SKFF-M-6-11• SKFF-M-7-11• SKFF-M-8-11

• SKFF-M-9-11• SKFF-M-10-11• SKFF-M-11-11• SKFF-M-12-11• SKFF-O-1-11• SKFF-O-2-11• SKFF-O-3-11• SKFF-O-4-11• SKFF-O-5-11• SKFF-O-6-11• SKLC-M-1-11• SKLC-M-2-11• SKLC-M-3-11• SKLC-O-1-11• AKLC-M-1-11• AKLC-M-2-11

• AKLC-M-3-11• AKLC-O-1-11• OMOS-M-1-11• OMOS-O-1-11• SASED-M-1-11• SASED-M-2-11• SASED-M-3-11• TL-M-1-11• TL-M-2-11• TL-M-3-11• MSGENC-HTTPS-M-1-11• MSGENC-JSON-M-1-11• MSGENC-XML-M-1-11• SUITEB-128-M-1-11• SUITEB-192-M-1-11

• TC-311-12• TC-312-12• TC-313-12• TC-314-12• TC-315-12• TC-32-12• TC-41-12• TC-51-12• TC-61-12• TC-71-12• TC-72-12• TC-81-12• TC-82-12• TC-91-12• TC-92-12• TC-93-12• TC-94-12• TC-95-12• TC-101-12• TC-111-12• TC-112-12• TC-121-12• TC-122-12

• TC-131-12• TC-132-12• TC-133-12• TC-134-12• TC-141-12• TC-142-12• TC-151-12• TC-152-12• TC-161-12• TC-171-12• TC-181-12• TC-182-12• TC-NP-1-12• TC-NP-2-12• TC-ECC-1-12• TC-ECC-2-12• TC-ECC-3-12• TC-PGP-1-12• TC-MDO-1-12• TC-MDO-2-12• TC-MDO-3-12• TC-SJ-1-12• TC-SJ-2-12

• TC-SJ-3-12• TC-SJ-4-12• SKFF-M-1-12• SKFF-M-2-12• SKFF-M-3-12• SKFF-M-4-12• SKFF-M-5-12• SKFF-M-6-12• SKFF-M-7-12• SKFF-M-8-12• SKFF-M-9-12• SKFF-M-10-12• SKFF-M-11-12• SKFF-M-12-12• SKFF-O-1-12• SKFF-O-2-12• SKFF-O-3-12• SKFF-O-4-12• SKFF-O-5-12• SKFF-O-6-12• SKLC-M-1-12• SKLC-M-2-12• SKLC-M-3-12

• SKLC-O-1-12• AKLC-M-1-12• AKLC-M-2-12• AKLC-M-3-12• AKLC-O-1-12• OMOS-M-1-12• OMOS-O-1-12• SASED-M-1-12• SASED-M-2-12• SASED-M-3-12• TL-M-1-12• TL-M-2-12• TL-M-3-12• MSGENC-HTTPS-M-1-12• MSGENC-JSON-M-1-12• MSGENC-XML-M-1-12• SUITEB-128-M-1-12• SUITEB-192-M-1-12• CS-BC-M-1-12• CS-BC-M-2-12• CS-BC-M-3-12• CS-BC-M-4-12• CS-BC-M-5-12

• CS-BC-M-7-12• CS-BC-M-8-12• CS-BC-M-9-12• CS-BC-M-10-12• CS-BC-M-11-12• CS-BC-M-12-12• CS-BC-M-13-12• CS-BC-M-14-12• CS-RNG-M-1-12• CS-RNG-O-1-12• CS-RNG-O-2-12• CS-RNG-O-3-12• CS-RNG-O-4-12• CS-AC-M-1-12• CS-AC-M-2-12• CS-AC-M-3-12• CS-AC-M-4-12• CS-AC-M-5-12• CS-AC-M-6-12• CS-AC-M-7-12• CS-AC-M-8-12

• TC-CREG-2-13• TC-OFFSET-1-13• TC-OFFSET-2-13• TC-OTP-1-13• TC-OTP-2-13

• TC-OTP-3-13• TC-Q-CAP-2-13• TC-Q-CREG-1-13• TC-Q-PROF-2-13• TC-Q-RNGS-2-13

• TC-Q-VAL-1-13• TC-Q-S2C-1-13• TC-Q-S2C-2-13• TC-Q-S2C-PROF-2-13• TC-STREAM-HASH-1-13

• TC-STREAM-HASH-3-13• TC-RNG-ATTR-1-13• TC-RNG-ATTR-2-13• TC-STREAM-ENC-1-13• TC-STREAM-ENC-2-13

• TC-STREAM-ENCDEC-1-13

KMIP v1.0

KMIP v1.1

KMIP v1.2

KMIP v1.3

•  TC-311-10•  TC-312-10•  TC-313-10•  TC-314-10•  TC-315-10•  TC-32-10•  TC-41-10•  TC-51-10•  TC-61-10•  TC-71-10•  TC-72-10•  TC-81-10•  TC-82-10•  TC-91-10

•  TC-92-10•  TC-93-10•  TC-94-10•  TC-95-10•  TC-101-10•  TC-111-10•  TC-121-10•  TC-131-10•  TC-132-10•  TC-134-10•  TC-NP-1-10•  TC-NP-2-10•  TC-ECC-1-10•  TC-ECC-2-10

•  TC-ECC-3-10•  SKFF-M-1-10•  SKFF-M-2-10•  SKFF-M-3-10•  SKFF-M-4-10•  SKFF-M-5-10•  SKFF-M-6-10•  SKFF-M-7-10•  SKFF-M-8-10•  SKFF-M-9-10•  SKFF-M-10-10•  SKFF-M-11-10•  SKFF-M-12-10•  SKFF-O-1-10

•  SKFF-O-2-10•  SKFF-O-3-10•  SKFF-O-4-10•  SKFF-O-5-10•  SKFF-O-6-10•  SKLC-M-1-10•  SKLC-M-2-10•  SKLC-M-3-10•  SKLC-O-1-10•  AKLC-M-1-10•  AKLC-M-2-10•  AKLC-M-3-10•  AKLC-O-1-10•  OMOS-M-1-10

•  SASED-M-1-10•  SASED-M-2-10•  SASED-M-3-10•  TL-M-1-10•  TL-M-2-10•  TL-M-3-10•  MSGENC-HTTPS-M-1-10•  MSGENC-JSON-M-1-10•  MSGENC-XML-M-1-10•  SUITEB-128-M-1-10•  SUITEB-192-M-1-10

Page 15: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

The Cryptsoft Quality Management System is certified to ISO 9001:2008

Cryptsoft is an OASIS Sponsor and an active member and contributor to the KMIP and PKCS#11 technical committees

Cryptsoft is voting member of the Storage Networking Industry Association (SNIA) and the Storage Security Industry Forum (SSIF)

Page 16: 101010101100100101101001101110010101011010101010 · 101010101100100101101001101110010101011010101010 Key Management Ss Complete vendor-independent key management solution sales SALS

CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT

101010101100100101101001101110010101011010101010

Copyright © 2015 Cryptsoft Pty Ltd. All rights reserved.All trademarks, service marks, trade names, product names and logos are property of their respective owners.

[email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362