Recent Security Features

  • Integrating KMIP, PKCS 11, and SSH

    Introduction P6R has implemented a PKCS 11 Baseline Consumer as part of a SSH server’s Public Key Authentication protocol (i.e., RFC 4252). This implementation provides centralized Public Key management for SSH installations via the use of KMIP. With our PKCS 11 Consumer, the SSH server looks up a user’s Public Key on a remote KMIP […]

  • P6R’s PKCS 11 Provider

    This document was updated on 28 April 2017. Introduction P6R has implemented the 2.40 Version of the PKCS 11 specification. Our library meets the requirements for conformance of a PKCS 11 Extended Provider and Authentication Token (see PKCS11 Cryptographic Token Interface Profiles Version 2.40, 16-Sep-2014, OASIS Committee Specification 01). Currently, our library supports eight types […]

  • Detailed differences between KMIP 1.0 and 1.1

    This document was updated on 23 August 2014. As part of the process of modifying our KMIP 1.0 protocol implementation to support the new KMIP 1.1 specification we compared the two specifications and listed all of differences in the following document.   Once we had this information we updated our KMIP 1.0 implementation to take the […]

  • P6R KMIP Toolkit Introduction

    This document was updated on 22 Feb 2014. See the related product page SKC. P6R has taken a unique approach in its KMIP toolkit design by supporting the translation of a KMIP binary message into a standard DOM tree.  This approach builds on existing P6R technology that supports parsing JSON into DOM trees.  The result […]

  • A multi-threaded, asynchronous implementation of a SSH server

    Introduction P6R has built a brand new implementation of an SSH server. As with all our software, this SSH server runs on multiple platforms which include: Windows, Linux, and Solaris. The main motivation for this project was to construct a server that could easily scale to performance demands that far exceed existing SSH implementations. A […]

  • Key Management with a Powerful Keystore

    This document was updated on 30 March 2014. Key management is essential for data at rest on disk and tape drives. Data at rest (e.g., financial, medial records) has to be stored for years. Stored in encrypted form the only way to access the real data is by reliably locating its associated key. For data […]