Qumate.Security.TLS

Verifiable IT security with flexible software tools

IT security and data protection are the key topics in electronic data exchange and affect all sectors. Unfortunately, cyber attacks and potential threats have become a reality and the methods employed by the attackers are becoming increasingly professional. Greater emphasis is therefore being placed on the value of cyber security and should be achieved with significant investments in security and prevention technology.

Challenges associated with cyber security

Systems communicate via public networks

  • Internet, wireless networks
  • Data can be intercepted and changed

Protecting the integrity of the data

  • Sensor data, control signals

Preventing interception by third parties

  • Trade secrets, personal data

Identification of the communication partners

  • Contracts

Combination of the requirements

  • In critical infrastructure, such as for banking transactions

 

achelos test suites secure your network

achelos offers test tools to test your products and solutions for security and conformity in a manufacturer-independent approach. With our TLS test suite, you can find loopholes and errors in the implementation and configuration of your network connections and then eliminate these in a targeted way. The test objectives are to test the complete structure of the TLS connection, all the way up to mutual authentication and reaction to incorrect behaviour, such as:

  • missing or wrong parts of communication
  • incorrect key material
  • incorrect certificates
  • unsuitable cipher suites
  • incorrect reaction to manipulations

The TLS test suites from achelos can be used flexibly, all the way up to automated test runs. Extremely efficient test management and various simulation environments are available for this purpose. Implementation of the security protocols is investigated in detail and results are logged for future reference.

Protocols guarantee authenticity, integrity and confidentiality

The catalogue of test cases is continuously extended and is based on requirements from the following sources:

  • Functional specifications
  • Technical guidelines (TR)
  • Certifications
  • Cryptographic standards
  • Application notes on Common Criteria certification
  • Evaluation standards
  • Penetration tests
  • Documentation requirements in line with Common Criteria

 



Get started right away – cyber security is achievable

Use the manufacturer-neutral test suites from achelos, developed together with an accredited test center, to secure your TLS network connections. Thanks to flexible architecture and implementation, the test suites from achelos can be used immediately, regardless of the products involved.

To protect themselves from cyber attacks achelos supports:

  • Manufacturers of network components
  • Evaluators and certification bodies
  • System Operators
  • Company IT departments
  • State institutions

Automated test procedure for professionals

A large number of test and evaluation bodies are already using the Qumate test suites from achelos to perform tests within the framework of accredited test procedures.

The architecture and implementation of the test suites has a modular structure. Various test suites, tools and simulations can be integrated on the basis of the Qumate.Testcenter. Automated tests and detailed test reports are used to measure product quality. All you need is a powerful PC without a special IT infrastructure or a complex laboratory environment.

Architecture of the TLS test environment

Benefits when using TLS test suites

Benefits when using TLS test suites

  • Prevention of IT configuration errors
  • Compliance with security guidelines of the Federal Office for Information Security (BSI)
  • Cost savings thanks to faster certification
  • Efficient testing thanks to high degree of automation
  • Convenient simulation environment and excellent ease-of-use
  • Scope and depth of testing, as well as attack scenarios can be individually selected
  • Reproducible and audit-compliant documentation of test results

Our test suites include the following:

  • The expert knowledge of our BSI-trained employees
  • Continuous further development of the Qumate platform since 2009
  • The practical experience of the established Qumate.Testcenter in the field of critical infrastructures
  • A high degree of automation: fast, flexible and with verifiable results
achelos test environment – test coverage

Checking the TLS configuration

  • Protocol version (no SSL 3.0, TLS 1.0, …)
  • Cipher suite (no EXPORT cipher suites, no weak encryption algorithms, …)
  • Cryptographic parameters (RSA key length ≥ 2048 Bit, …)
  • Protocol extensions (TLS compression, heartbeat, …)

Tests for correct implementation

  • Robust protocol implementation (manipulation of the message sequence, …)
  • Correct checking of the padding (adding invalid padding values)
  • Constant-time implementation (for example Lucky Thirteen attacks)
Product versions

The test suites are available individually with the following testing tools:

  • Qumate.Security.TLS-Client
  • Qumate.Security.TLS-Server
  • Qumate.Security.TLS-Checklist

optional:

  • Simulation environment
  • Software Development Kit (SDK)

Heinfried Cznottka

Director Business Development

Email:

Phone:
+49 5251 14212-327