Security aspects

QUIK Software ensures integrity and privacy of transmitted data, by providing secure connection between workstations and the QUIK server. All information exchange between the server and the client is encrypted.

Broker tools for encryption and authentication

  • Authentication and encryption with standard TLS/SSL protocols
    Authentication requires a name and password, or an X.509 certificate issued as a personal private key generated by its user.
  • Use of certified GOST algorithms generated by systems of cryptographic data protection CryptoPRO CSP and/or SignalCom SSLPro
    Authentication is done by X.509 certificate issued for a personal private key generated by user. The key may also be stored on better protected external carriers — 'pendant' memory devices (JaCarta, eToken, ruToken, etc.).
  • Cryptographic tools by ARQA Technologies
    Public and private keys are generated by users and may be protected by password. Private keys are kept separately from the software, for example, on a flash card. Authentication is done by public user key, encryption — by symmetric private key.

In addition, QUIK has support for

  1. various two-factor authorization mechanisms (RSA SecurID or RADIUS authentication, Windows domain authentication) with a PIN code sent to the user via email or, if Alert dispatch module is installed, to the user's mobile device via an SMS/push message;
  2. logging of all transactions and text messages of users;
  1. fixed IP-range available for connection to a specific terminal;
  2. individual security settings for each user, selective approach;
  3. transactions signed with a digital signature using certified cryptographic tools such as Message-PRO / Signal-COM, CryptoPro CSP, Validata CSP or Bicrypt.

External Cryptographic Tools

Security capabilities can be enhanced by using external certified cryptographic tools for creating digital signatures (sold separately).

Any transaction (new order, request for cancelling an order, non-trade order) can be signed by its initiator with a digital signature that involves the following cryptographic tools certified by the Federal Security Service:

For Ukrainian companies, QUIK supports the following cryptographic tools issued by the accredited key certification centers (except where QUIK server is provided as a managed service*):

* — for companies that intend to use QUIK server as a managed service for access to Ukrainian exchanges, integration with solutions that use digital signature of certified Ukrainian providers is impossible due to Russian and Ukrainian legislation.

For Kazakh companies, support is provided for cryptographic tools of the following developers:

RSA SecurID

In addition to standard means for authorization of QUIK Workstation and webQUIK users, the use of  RSA SecurID® technology is also possible.




Two-factor authentication designed by RSA Security provides additional protection of QUIK users' data from unauthorized access. The RSA SecurID solution uses two components for authentication:

  • PIN, a number known only to the user,
  • A token-key, the number on the token’s display.
The RSA SecurID token is a 'pendant'  memory device or card with an LCD display showing a number which changes every minute. The token-key is generated using a pseudo-random number generator. Each key is unpredictable, even if the previous key is known.

The user must always keep his token at hand. If the token is lost, the person who finds it cannot use it since the PIN is unknown. Similarly, if someone learns its PIN, he will not be able to use it without the token. Moreover, the owner of the token can block it at any time. The token-key can be used only once for authentication. This precludes the possibility of re-using the key in case authentication details have been stolen by an intruder.
img.jpg

Application in QUIK Software

To use RSA SecurID technology, one should have RSA ACE/Server software (basic licence) and RSA SecurID Key Fob, Card or PINPad Card tokens. OOO Demos (www.demos.su) is a distributor of RSA Security in Russia.

One dedicated computer is required for deployment of RSA ACE/Server. It is important that this computer and the QUIK server function within the same network segment, and that the computer's clock is synchronized with UTC (e.g. via NTP).

Two-factor authentication is available separately for each client, and does not affect the work of other users of the system. To connect to the QUIK server the user needs to enter one’s PIN (password) and token-key. The number of attempts is limited. In case an attempt to guess the password is suspected, the communication session is interrupted, and the token is blocked until the administrator interferes.

To top