Qumate.Security.IKE

Flexible software tools deliver verifiable IT security

Established network protocols, such as Standard Transport Layer Security (TLS) and Internet Key Exchange (IKE)/Internet Protocol Security (IPsec), are recognised standards that today form the basis for secure networks. However, implementation and configuration are extremely complex and can present loopholes for hackers if not performed correctly.

Threat potential of cyber security

Systems communicate via public networks

  • Internet, wireless networks
  • Data can be intercepted and changed

Protecting the integrity of the data

  • Sensor data, control signals

Preventing interception by third parties

  • Trade secrets, personal data

Identification of the communication partners

  • Contracts

In many cases, all of these measures are required

  • Banking transactions, Critical infrastructure

achelos test suites secure your network

achelos offers test tools to test your products and solutions for security and conformity in a manufacturer-independent approach. With our IKE test suite, you can find loopholes and errors in the implementation and configuration of your network connections and then eliminate these in a targeted way. The test objectives are to test the complete structure of the IKE connection, all the way up to mutual authentication and reaction to incorrect behaviour, such as

  • missing or wrong parts of communication
  • incorrect key material
  • incorrect certificates
  • unsuitable cipher suites
  • incorrect reaction to manipulations

The IKE test suites from achelos can be used flexibly, all the way up to automated test runs. Extremely efficient test management and various simulation environments are available for this purpose. Implementation of the security protocols is investigated in detail and results are logged for future reference.

Protocols guarantee authenticity, integrity and confidentiality

Internet Protocol Security (IPsec) is one protocol family

  • Encapsulating Security Payload (ESP) defined in RFC 4303
  • ESP secures IP packets
  • For example used by VPN gateways

The catalogue of test cases is continuously extended and is based on requirements from the following sources:

  • Functional specifications
  • Technical guidelines (TR)
  • Certifications
  • Cryptographic standards
  • Application notes on Common Criteria certification
  • Evaluation standards
  • Penetration tests
  • Documentation requirements in line with Common Criteria

achelos test suites are based on strict security requirements

We developed our test suites in close cooperation with an accredited test center. The catalogue of test cases is continuously extended and is based on requirements from the following sources:

  • Functional specifications
  • Technical guidelines (TR)
  • Certifications
  • Cryptographic standards
  • Application notes on Common Criteria certification
  • Evaluation standards
  • Penetration tests
  • Documentation requirements in line with Common Criteria


Get started right away – cyber security is achievable

Use the manufacturer-neutral test suites from achelos, developed together with an accredited test center, to secure your IKE network connections. Thanks to flexible architecture and implementation, the test suites from achelos can be used immediately, regardless of the products involved.

To protect themselves from cyber-attacks achelos supports:

  • Manufacturers of network components
  • Evaluators and certification bodies
  • System Operators
  • Company IT departments
  • State institutions

Automated test procedure for professionals

A large number of tes and evaluation bodies are already using the Qumate test suites from achelos to perform tests within the framework of accredited test procedures.

The architecture and implementation of the test suites has a modular structure. Various test suites, tools and simulations can be integrated on the basis of the Qumate.Testcenter. Automated tests and detailed test reports are used to measure product quality. All you need is a powerful PC without a special IT infrastructure or a complex laboratory environment.

Architecture of the IKE test environment

Benefits when using IKE test suites

Benefits when using IKE test suites

  • Prevention of IT configuration errors
  • Compliance with security guidelines of the Federal Office for Information Security (BSI)
  • Cost savings thanks to faster certification
  • Efficient testing thanks to high degree of automation
  • Convenient simulation environment and excellent ease-of-use
  • Scope and depth of testing, as well as attack scenarios can be individually selected
  • Reproducible and audit-compliant documentation of test results

Our test suites include the following:

  • The expert knowledge of our BSI-trained employees
  • Continuous further development of the Qumate platform since 2009
  • The practical experience of the established Qumate.Testcenter in the field of critical infrastructures
  • A high degree of automation: fast, flexible and with verifiable results
achelos test environment – test coverage

IKE/IPsec test suite

  • Verification of the Internet Key Exchange implementation on the basis of IKE v.2.
  • Handling of testaspects of the IPsec level
  • Definition bases of the IKE/IPsec test suite:
    • IETF RFC 3602 "The AES-CBC Cipher Algorithm and its use with IPsec"
    • Federal Office for Information Security (BSI) "Requirements of cryptographically secured VPN channels / trusted channel in the German CC certification scheme IKE/ IPsec version 0.0.2“
    • Simulation of an IKE responder

 

Product versions

Product versions

The IKE test suite including test tools is available:

Qumate.Security.IKE/IPsec

 

Qumate.Security.IKE/IPsec

 optional:

  • Simulation environment
  • Software Development Kit (SDK)

 The test suites are available individually with the following testing tools:

  • Qumate.Security.TLS-Client
  • Qumate.Security.TLS-Server
  • Qumate.Security.TLS-Checklist

 optional:

  • Simulation environment
  • Software Development Kit (SDK)

 

Heinfried Cznottka

Director Business Development

Email:

Phone:
+49 5251 14212-327