What is cryptography? Article 2 of the "China Cryptography Law" has a clear definition: "The term "cryptography" as used in this Law refers to technologies, products and services that use specific transformation methods to encrypt protection and security authenticate for information." This definition is very clear. Cryptography is technologies, products and services for information encryption and security authentication. Of course, this Cryptography means the cipher using SM2/SM2/SM4 algorithm. The zero trust principle is "Never trust, Always verify", emphasizing the need to constantly verify identity, which is one of the important functions of cryptography - "security authentication". ZoTrus Technology zero trust security solution does not use insecure username/password authentication, but use cryptographic technology, to be precise, use PKI digital certificate to achieve strong identity authentication. This is an important core application of cryptography.
Another more important core application of cryptography is "information encryption", which is a more important core part of solving zero trust security - data security, whether it is the "Zero Trust Architecture" formulated by the US National Institute of Standards & Technology or the US Office of Management and Budget (OMB) released the "Federal Zero Trust Strategy", which highly emphasized the application of cryptography/PKI, and emphasized the importance of using cryptographic technology to achieve information encryption, including https encryption and email encryption. This requirement is highly consistent with the second core application requirement of “China Cryptography Law”. Because the purpose of zero trust security is to protect data security.
We can also interpret that the core of the "China Cryptography Law" is also zero trust. Cryptography must be used to achieve identity authentication, cryptography must be used to encrypt information, and cryptography must be used to ensure the security of China core information infrastructure. Therefore, the three concepts of ZoTrus Technology are “Never trust, Always verify, Always encrypt”, full cryptographic implementation to realize always-verify-digital-signature and always- encrypt-information.
ZoTrus Cloud Cryptographic Infrastructure is mainly composed of IA System for identity authentication, CA System for issuing digital certificates, CT System for certificate transparency, KM System for managing keys, TS System for timestamping service, CR System for certificate revocation status querying, DS System for digital signature, and DE System for data encryption, these eight systems in cloud effectively ensure the trust of each network element identity and the encryption of each connection, and reliably provide cryptographic services for zero trust security.
The following figure is a schematic diagram of the implementation of zero trust security technology based on cryptographic service. The five security goals of Zero Trust are identity trust, device trust, traffic encryption, application trust and data encryption. These five goals can be achieved through the digital signature and encryption of digital certificate. It can be seen that cryptographic technology is the foundation technology of zero trust security.
Each element in the network has a trusted identity, and the cloud cryptographic service issues a digital certificate for it, and all element uses a digital signature to prove its trusted identity, and each network access will verify its digital identity (digital signature verification). In order to protect the data itself, each data will be encrypted with a certificate and stored in the cloud in ciphertext. After the user has verified his identity and obtained it legally, he can decrypt it with his identity certificate to get the cleartext. As for what identity can access what data, it is formulated by the access policy system, and the identity authentication system allows access to the corresponding data according to the access policy after verifying the digital signature. After the user gets the data, he must also verify the data identity and the data timestamp signature before decrypting it with his private key. The network traffic encryption mainly uses SSL certificate to realize https encryption, DNS encryption and SMTP/IMAP encryption, which can effectively ensure the encryption of network traffic and ensure the base security of zero trust.
ZoTrus Cryptography as a Service fully supports national algorithm SM2/SM3/SM4 and international algorithm RSA/ECC, users can choose to use SM2 algorithm, RSA algorithm or ECC algorithm to realize digital signature, encryption and timestamp services to ensure the cryptographic application required for business to meet the global trust and national compliance requirement. Customers can choose to deploy an adaptive https encryption service with dual algorithms and dual SSL certificates to ensure that https encryption can be achieved no matter what browser the website visitor uses. For digital signatures, customers can choose dual-algorithm dual-digital signature services, the software system that supports SM2 algorithm verifies the SM2 signature, and the software system that only supports the international algorithm verifies the RSA signature, the timestamp signature also support dual algorithm adaptive. The dual-algorithm adaptive solution can meet the compatibility and compliance requirements.
In order to adopt the zero trust principle to protect the security of information systems, customers can choose the ZoTrus Cryptography as a Service to automatically issue and deploy digital certificates for management systems. These digital certificates are issued from the ZoTrus issuing CA. For organizations that have higher requirements for certificate security and controllability, it is recommended to customize the issuing CA for zero trust security to consolidate the core infrastructure of zero trust security.
The first principle of ZoTrus is to encrypt all http traffic and never trust the http website and system that transmitted in cleartext. All website and systems must deploy an SSL certificate for https encryption, ZoTrus HTTPS Automation Cloud Service make the https encryption fully automatic, no need to apply for and install an SSL certificate, no need to install an ACME client software on the server. It can automatically apply for and deploy SSL certificates in the cloud WAF to achieve website https encryption and cloud WAF protection. This is a solution to issue SSL certificates by ZoTrus SSL certificate issuing CA. For important government website systems and cloud service systems, it is recommended to customize your own SSL certificate issuing CA to improve the security level of the business system. Recommended to customize dual algorithm dual SSL issuing CA, one is the SM2 SSL issuing CA for issuing SM2 SSL certificate, which meets the requirements of cryptography compliance, and the other is the ECC SSL issuing CA for issuing ECC SSL certificate to meet the requirements of global trust.
Based on zero trust principle, all websites and business management systems must verify the https encrypted connection every time, and only trust the SSL certificate issued by their own SSL issuing CA, which can effectively prevent https man-in-the-middle attacks. This custom solution is much more flexible and more secure and controllable than verifying a specific SSL certificate each time.
The second principle of ZoTrus is to encrypt all email traffic and never trust cleartext emails. Not only the web mail login page needs to deploy SSL certificates, but also SMTP and IMAP/POP3 services must deploy SSL certificates, and the most important thing is to implement end-to-end encryption of emails to ensure that emails are encrypted on the way and in the cloud. encryption. ZoTrus Email Security Cloud Service make the email encryption fully automatic, no need to apply for email certificates, no need to exchange public keys in advance, no need to manage keys by themselves, and no need to replace current used email client software, just need to purchase ZoTrus Email Security Cloud Service. This is a solution to issue email certificates by ZoTrus email certificate issuing CA. For important government emails and corporate emails, it is recommended to customize your own email certificate issuing CA to improve the security level of the email system. Recommended to customize dual algorithm dual Email issuing CA, one is the SM2 Email issuing CA for issuing SM2 Email certificate, which meets the requirements of cryptography compliance, and the other is the RSA Email issuing CA for issuing RSA Email certificate to meet the requirements of global trust.
Based on zero trust principle, government email communication and enterprise email communication verify the digital signature of the email every time, and only trust the encrypted and digitally signed email with email certificate issued by the custom-branded email certificate issuing CA, which effectively prevent fake identity emails to keep your email secure. This custom solution is much more flexible and more secure and controllable than verifying a or some specific email certificate each time.
The third principle of ZoTrus is to digitally sign all application software codes, and never trust software codes without digital signatures. Not only all Windows software requires digital signatures, but more importantly, all OTA air upgrade software must have digital signatures. ZoTrus Application Security Cloud Service make the code signing fully automatic, no need to apply for a code signing certificate, no need to wait for the express USB key hard certificate shipping, no need to manage the signing key, just purchase the ZoTrus Application Security Cloud Service. This is a solution to issue code signing certificates for cloud signing services by ZoTrus code signing issuing CA. For organizations that have important software codes that require digital signatures (such as operating system, security system, smart device manufacturers, etc.), it is recommended to customize their own code signing certificate issuing CA to improve the code signing service security level. Recommended to customize dual algorithm dual code signing issuing CA, one is the SM2 code signing issuing CA for issuing SM2 code signing certificate, which meets the requirements of cryptography compliance, and the other is the RSA code signing issuing CA for issuing RSA code signing certificate to meet the requirements of global trust.
Based on zero trust principle, operating system developers must verify the digital signature of the installed and running code every time, and only trust the code signed by the code signing certificate issued by their own code signing issuing CA to ensure the security of the operating system. The OTA (Over-The-Air) upgrade software of all devices of smart device manufacturers must first verify whether the downloaded software is trusted by whether it has a digital signature and whether it is signed by the code signing certificate issued by its own code signing issuing CA, and only trust the code signed by the code signing certificate issued by its own code signing issuing CA, to ensure that it is an authentic upgrade package and not malicious attack software. This custom solution is much more flexible and more secure and controllable than verifying a specific code signing certificate each time.
The fourth principle of ZoTrus is to digitally sign all electronic documents, and never trust electronic documents without digital signatures. Whether it is a government electronic document or an enterprise electronic document, there should be a digital signature to ensure that the identity of the document publisher is authentic and trusted. ZoTrus Document Security Cloud Service make the document signing fully automatic, no need to apply for a document signing certificate, no need to wait for the express shipping of USB key, no need to manage the signing key, just purchase the ZoTrus Document Security Cloud Service. This is a solution to issue a document signing certificate for cloud signing services by ZoTrus document signing certificate issuing CA. For government agency and large enterprises (including electronic signature service providers) that have many important documents that require digital signatures, it is recommended to customize your own document signing certificate issuing CA to improve the security level of the document signing service. Recommended to customize dual algorithm dual document signing issuing CA, one is the SM2 document signing issuing CA for issuing SM2 document signing certificate, which meets the requirements of cryptography compliance, and the other is the RSA document signing issuing CA for issuing RSA document signing certificate to meet the requirements of global trust.
Based on zero trust principle, the government and enterprise management systems always verify the digital signatures of all documents every time, and only trust the documents signed by the document signing certificate issued by the custom-branded issuing CA to ensure document security. And inform the user to also check whether the document has a digital signature and the digital signature implemented by the document signing certificate issued by the custom-branded issuing CA. Only in this way can they not be deceived by the fake document. This custom solution is much more flexible and more secure and controllable than verifying a specific document signing certificate each time.
The fifth principle of ZoTrus is to only trust individuals with trusted digital identities, and never trust individuals with unauthenticated identities. For the Internet of Things, each IoT device must have a trusted identity certificate (device certificate), which represents the unique trusted identity of the device and is used for communication and data exchange between devices and between people and devices. ZoTrus Cloud CA Service and Cloud KM Service automatically distribute keys and automatically issue device certificates for IoT devices. This certificate is issued from ZoTrus IoT certificate issuing CA. For manufactures that have large number of IoT devices that require device certificates, it is recommended to customize their own IoT certificate issuing CA to improve the base security level of IoT devices.
Recommended to customize dual algorithm dual IoT certificate issuing CA, one is the SM2 IoT certificate issuing CA for issuing SM2 IoT certificate, which meets the requirements of cryptography compliance, and the other is the ECC IoT certificate issuing CA for issuing ECC IoT certificate to meet the requirements of global trust.
Based on zero trust principle, issue an IoT device certificate (identity certificate or SSL certificate) to each IoT device to prove identity and encrypt communication, and only trust the communications initiated by devices with identity certificates issued the custom-branded issuing CA to ensure IoT security. This custom solution is much more flexible and more secure and controllable than verifying a specific certificate each time.
ZoTrus Cryptography as a Service is provided by ZoTrus Cloud Cryptographic Infrastructure, mainly composed of IA System for identity authentication, CA System for issuing digital certificates, KM System for managing keys, TS System for timestamping service, CR System for certificate revocation status querying, DS System for digital signature, and DE System for data encryption, these seven systems in cloud effectively ensure the trust of each network element identity and the encryption of each connection, and reliably provide cryptographic services for zero trust security.
If government agencies and large enterprises have a large number of systems that require self-controllable cryptographic services, they can purchase and locally deploy these sub-systems of ZoTrus Cloud Cryptographic infrastructure according to business need. These systems not only provide cryptographic services, but also can connect to ZoTrus Cryptography as a Service to automatically obtain globally trusted and national compliant digital certificates required for business, and realize digital signature, encryption, and timestamp services for business systems.
The founder of ZoTrus Technology has 18 years of experience in CA operation and construction and has a very good cooperative relationship with major national CAs and international CAs, enabling ZoTrus Cryptographic as a Service to automatically configure digital certificates of global trust and national compliance for digital signature and encryption for all cloud cryptographic applications. The founder has persisted in the continuous in-depth research and innovation of cryptographic technology for 18 years, which has ensured the technological leadership of the ZoTrus Cryptographic as a Service.
ZoTrus Cryptographic as a Service has the following ten special advantages:
ZoTrus Cryptography as a Service is the cornerstone of zero trust security, only the comprehensive application of cryptographic technology and services can truly implement reliable zero trust security. With ZoTrus Cryptography as a Service, you can easily achieve: