Applying Cryptography to Physical Security

Slides:



Advertisements
Similar presentations
Components of GIS.
Advertisements

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
Department of Electrical & Computer Engineering Advisor: Michael Zink.
Software Frameworks for Acquisition and Control European PhD – 2009 Horácio Fernandes.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Smart Client Applications for Developers Davin Mickelson, MCT, MCSD New Horizons of MN.
1. Presenters: Constantine Grantcharov Ryan Burbidge 2.
Chapter 4 System Software.
Week #7 Objectives: Secure Windows 7 Desktop
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Automated Industrial Wind Tunnel Controller By Daniel Monahan and Nick DeTrempe Advised by Dr. Aleksander Malinowski.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Operating Systems JEOPARDY Computer Repair NetworkOS OS Tasks ConceptsComponentsMisc
Open Conditional Access System By Menno de Jong A DISSERTATION Submitted to The University of Liverpool in partial fulfillment of the requirements for.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
SIMULATION OF MULTIPROCESSOR SYSTEM AND NETWORK Manish Patel Nov 8 th 2004 Advisor: Dr. Chung-E-Wang Department of Computer Science California State University,
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
GROUP POLICY. Group Policy is a hierarchical infrastructure which allows systems administrators to configure computer and user settings from a central.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Omaha Linux Users Group October 2010 Thin Clients And Zero Clients.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Operating System and Utility Programs
Section 2.1 Section 2.2 Identify hardware
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
ControlLogix 5580 Controller
Managing, Storing, and Executing DTS Packages
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
2. OPERATING SYSTEM 2.1 Operating System Function
Wireless Protocols WEP, WPA & WPA2.
Fuel Cap Reinvented Fueloyal Presents Smart Fuelcap
One-Stop Solution for Device Networking
KARDEX Drive EWM
WEP & WPA Mandy Kershishnik.
The Role of Smart Transformers within Microgrids
Computer Data Security & Privacy
Microcontroller Based Digital Code Lock
Radius, LDAP, Radius used in Authenticating Users
TYPES AND COMPONENTS OF COMPUTER SYSTEM
FTP - File Transfer Protocol
THE STEPS TO MANAGE THE GRID
Introduction to Computers
Computer Basics Section 2.1 YOU WILL LEARN TO… Identify hardware
Guide to Access Control Systems
Networking for Home and Small Businesses – Chapter 2
Security & .NET 12/1/2018.
Public Key Infrastructure from the Most Trusted Name in e-Security
RKL Remote key loading.
Networked Door Locking System
PREPARED BY: RIDDHI PATEL (09CE085)
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Networking for Home and Small Businesses – Chapter 2
Windows Server Administration Fundamentals
Install AD Certificate Services
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
 Is a machine that is able to take information (input), do some work on (process), and to make new information (output) COMPUTER.
Introducing MagicInfo 6
Presentation transcript:

Applying Cryptography to Physical Security Crypto-SmartLock Kevin J. D’Aquila Frank L. Gerratana Anthony P. Oteri Jeffrey A. Rosenberger Professor Michael J. Ciaraldi Professor R. James Duckworth Applying Cryptography to Physical Security

Crypto-SmartLock Secure Door Lock system Components Door Locks Keys Central Management Computer

Goals of the project Create secure card lock system Disconnected system using only Smart Cards for communication with doors Bridge the gap between centralized systems and manually programmed standalone systems

Problems with existing systems Security issues Lack of convenience

Our Solution Have a centralized management computer, but do not wire it to locks All communication occurs through the Smart Card-based keys All communication and authentication secured using the Advanced Encryption Standard (AES)

Protocol The central server places “commands” for the doors onto cards These commands provide functions such as adding users to doors

Crypto-SmartLock

Components Door System Keycards Key Management Software

Door Embedded system using low power Texas Instruments MSP430 Microcontroller Battery powered (annual replacement schedule) Stand-alone system

Door

Keycard ZeitControl BasicCard Smart Card Chosen due to flexibility and speed of development Contains microcontroller and 8 kilobytes of program/data storage

Key Management Software Runs on standard Windows PC Provides easy to use graphical user interface Allows the system administrator to manage users and door access permissions

Key Management Software

Usage Example System administrator grants a user access to a new door Connects user’s keycard to central system The key management software generates a cryptographic key for authentication and places it on the card

Usage Example (continued) Key management software generates a command instructing the door to add access for a specific user using a specific cryptographic key This command is encrypted and placed on the user’s keycard

Usage Example (continued) When the user inserts their keycard in the door the first time, the door decrypts, authenticates, and processes the command The door then performs challenge-response authentication using the newly added cryptographic key, granting the user access

Accomplishments Designed secure communication protocol Built prototype door hardware Developed the three necessary software components Key Management Software Door Software Keycard Software

Questions