PV204 Security technologies Team projects Petr Švenda Faculty of Informatics, Masaryk University, Brno, CZ | PV204 - Security technologies.

Slides:



Advertisements
Similar presentations
Web-enabled Smart Card for Ubiquitous Access of Patients Medical Record Praveen G Puligundla.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
White-Box Cryptography
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
VM: Chapter 5 Guiding Principles for Software Security.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
CSPs are the device side mechanism that are targeted by the MDM XML and make changes on the device. Windows Phone 8.1 CSPs are moving into.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
FIT3105 Smart card based authentication and identity management Lecture 4.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Encrypted File System (EFS) Sankara Narayanan. CSE 785 Computer Security, Syracuse University, NY Spring 2003 – 2004.
outline Purpose Design Implementation Market Conclusion presentation Outline.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Payment Card Industry (PCI) Data Security Standard
魂▪創▪通魂▪創▪通 Digital Certificate and Beyond Sangrae Cho Authentication Research Team.
Chapter 3  Manage the computer’s resources ◦ CPU ◦ Memory ◦ Disk drives ◦ Printers  Establish a user interface  Execute and provide services for applications.
Information Security for Managers (Master MIS)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Masaryk U., Monet White-box attack resistant cryptography – mobility tickets Petr Švenda Masaryk University,
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, ICDIM '07. 2nd International.
Aggregation in Sensor Networks
Databases and security continued CMSC 461 Michael Wilson.
SSD: Cryptography. Learning Outcomes After the scenario has been completed, you are expected to be able to: Explain the relative strengths of encryption.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Open Conditional Access System By Menno de Jong A DISSERTATION Submitted to The University of Liverpool in partial fulfillment of the requirements for.
Applying White-Box Cryptography SoBeNet user group meeting October 8, 2004 Brecht Wyseur.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
Public Key Encryption  Illustration  Uses  Importance  RSA  Cryptcard.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Bzupages.com. Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria.
Security Planning and Administrative Delegation Lesson 6.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Configuration Management CSCI 5801: Software Engineering.
Wireless and Mobile Security
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Lecture 5 Page 1 CS 236 Online Key Management Choosing long, random keys doesn’t do you any good if your clerk is selling them for $10 a pop at the back.
Dilip Dwarakanath.  The topic I’m about to present was taken from a paper titled “Apple iOS 4 Security Evaluation” written by Dino A Dai Zovi.  Dino.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
CSCE 201 Identification and Authentication Fall 2015.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
The Federal Information Processing Standards (FIPS) Encryption Suite Sean Smith COSC
PV204 Security technologies Labs: Secure authentication and authorization Petr Švenda Faculty of Informatics, Masaryk.
PV204 Security technologies
PV204 Security technologies
PV204 Security technologies
Hardware-rooted Trust for Secure Key Management & Transient Trust
PV204 Security technologies LABS
Trusted Computing and the Trusted Platform Module
PV204 Security Technologies
Hardware Cryptographic Coprocessor
PV204 Security technologies
CIS 560 Possible Is Everything/snaptutorial.com
فصل پانزدهم فاز پياده سازي مونا بخارايي نيا
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

PV204 Security technologies Team projects Petr Švenda Faculty of Informatics, Masaryk University, Brno, CZ | PV204 - Security technologies

Project idea Provide secure key storage/processing for existing open-source application with need for cryptographic material Existing application asks user directly for keys Project introduce intermediate component –Password/keys are stored on smart card –Provided to existing application –Processing with key can be done directly on card | PV204 - Security technologies

Situation before your project | PV204 - Security technologies Password Sfdlk2c&432mo% Open-source application password manager, disk encryption, zip encryption… User stores keys Memory, paper… Key transmitted to PC app

Project work | PV204 - Security technologies Open-source app password manager, disk encryption, zip encryption… JavaCard applet Secure key storage Processing with key Secure channel PC application Secure channel with card Facilitate use of key by app C/C++/Java

Project 1.Identify suitable target scenario with need for cryptographic keys (disk encryption, remote authentication, DRM app…) –Open-source application 2.Design and implement JavaCard smart card applet –Storage and processing of secrets (keys) –Authentication and secure channel with PC application –Source code and installation scripts provided to other teams (code review) 3.Design and implement PC-based counterpart application –Establish secure channel with smart card applet –Transmit key from card or transmit data for processing by other team –Provide full dump of communication to other teams (reverse engineering) 4.Review implementations of other teams –Source code review of other team applet –Reverse-engineer of other team application dump | PV204 - Security technologies

Teams 3 people per team –Assigned by us (within group), available in IS Start working early, especially with implementation –Distribute work load between all members –Use GitHub platform frequently (push often, your evaluation will be partially based on your participation) Teams may use own existing code from previous assignments (SimpleApplet etc.) | PV204 - Security technologies

Projects - timeline 1.Identify target scenario, design of applications –7 points (before 15 th of April) –Report (max. 2 pages A4) 2.Write code (GitHub) –13 points (before 5 th of May) –JavaCard application, PC-based application –Design, code + presentation ( , your seminar group, random team member) 3.Review and attack implementations –10 points (before 19 th of May) –Review and attack implementations of other teams –Report + presentations ( , random team member) At least 15 points from project are required | PV204 - Security technologies