Applying Cryptography to Physical Security Crypto-SmartLock Kevin J. D’Aquila Frank L. Gerratana Anthony P. Oteri Jeffrey A. Rosenberger Professor Michael J. Ciaraldi Professor R. James Duckworth Applying Cryptography to Physical Security
Crypto-SmartLock Secure Door Lock system Components Door Locks Keys Central Management Computer
Goals of the project Create secure card lock system Disconnected system using only Smart Cards for communication with doors Bridge the gap between centralized systems and manually programmed standalone systems
Problems with existing systems Security issues Lack of convenience
Our Solution Have a centralized management computer, but do not wire it to locks All communication occurs through the Smart Card-based keys All communication and authentication secured using the Advanced Encryption Standard (AES)
Protocol The central server places “commands” for the doors onto cards These commands provide functions such as adding users to doors
Crypto-SmartLock
Components Door System Keycards Key Management Software
Door Embedded system using low power Texas Instruments MSP430 Microcontroller Battery powered (annual replacement schedule) Stand-alone system
Door
Keycard ZeitControl BasicCard Smart Card Chosen due to flexibility and speed of development Contains microcontroller and 8 kilobytes of program/data storage
Key Management Software Runs on standard Windows PC Provides easy to use graphical user interface Allows the system administrator to manage users and door access permissions
Key Management Software
Usage Example System administrator grants a user access to a new door Connects user’s keycard to central system The key management software generates a cryptographic key for authentication and places it on the card
Usage Example (continued) Key management software generates a command instructing the door to add access for a specific user using a specific cryptographic key This command is encrypted and placed on the user’s keycard
Usage Example (continued) When the user inserts their keycard in the door the first time, the door decrypts, authenticates, and processes the command The door then performs challenge-response authentication using the newly added cryptographic key, granting the user access
Accomplishments Designed secure communication protocol Built prototype door hardware Developed the three necessary software components Key Management Software Door Software Keycard Software
Questions