Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

Slides:



Advertisements
Similar presentations
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Advertisements

Feb 12, 2002Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Public Key Encryption Algorithm
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
FIT3105 Smart card based authentication and identity management Lecture 4.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Attacks on Digital Signature Algorithm: RSA
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Announcements: 1. Presentations start Friday 2. Cem Kaner presenting O th block today. Questions? This week: DSA, Digital Cash DSA, Digital Cash.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Årskonference 2003 Theory and Practice of Personal Digital Signatures - The ITSCI project Ivan Damgård, University of Aarhus.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
RSA Encryption & Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
An Efficient Identity-based Cryptosystem for
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
The Present and Future of Electronic Payment Systems Vivek Reddy Information Assurance 5/19/04.
Mobile Commerce (M-Commerce)
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Exercises Information Security Course Eric Laermans – Tom Dhaene.
Feb 11, 2003Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Presented by Katherine Heller COSC 4765 University of Wyoming April 26, 2011 Image source: PC Dynamics, Inc.
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
Some Perspectives on Smart Card Cryptography
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Chapter 7 – Confidentiality Using Symmetric Encryption.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Electronic Banking & Security Electronic Banking & Security.
Unit 9 Finance and Banking. Electronic Banking What is E-Banking Electronic banking or e- banking gives people electronic access to bank accounts and.
e-Health Platform End 2 End encryption
ATM using fingerprint
Rivest, Shamir and Adleman
Introduction to Symmetric-key and Public-key Cryptography
Lecture 6: Digital Signature
DISSERTATION ON CRYPTOGRAPHY.
CSC 774 Advanced Network Security
Security in Distributed Systems
Presentation transcript:

Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa

Contents ► I) Introduction ► II) Why and how ► III) Current applications ► IV) An example of processor ► V) Conclusions

I)Introduction ► What does cryptrography mean?  Hidden  Write

I) Introduction ► Some historic examples: ► Greeks and romans ► Enigma ( Second World War)

I)Introduction ► Nowadays  Computer and network security  Communications  Militar operations  Now our messages are bit strings  We use huge numbers (10^100)  Discourage attackers

I)Introduction ► What means TFT? ► Thin Film Transistor ► Algorithm in hardware

II) Why and how ► New technology still developing  Testing needed  Technical problems must be solved ► New trusted applications needed  Device regarded as safe to use

II)Why and how ► Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services

II)Why and how Structure diagram

II)Why and how ► Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work

II)Why and how ► Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard

II)Why and how ► Last advance: OLED technology instead of LCD and plasma

III)Current applications ► There are still no current applications!! ► All of them under development and expected for 2007 and on.

III)Current applications ► These technology is not only available for TV ► Computers, mobile phones or PDA also

III)Current applications ► Electronic commerce in a point-of-sale terminal  Trough direct communication with the bank  Trough smart card payment ► First application proposed (1995) ► Increase ecommerce  Avoiding the use of cash

III)Current applications ► Electronic commerce with a mobile ► Already is patented in US  More secure, as two acknowledges must be done

III)Current applications ► eBanking at home  But we know about „man in the middle attack“ ► FINREAD attempts to reinforce security  Stresses the need of a trusted display ► Looks slow and not very attractive

III)Current applications

► Include a smart card reader ► Account and PIN number are no longer enough ► All communication is between the bank and the card

III)Current applications

► Secure terminals for e-voting ► Identification with ID and digital signature  Through a computer  With a personal PDA

III)Current applications ► Multimedia broadcasting for mobile phones  Only the user can see the contents  Information decrypted in the display  OMA inverting on it

III)Current applications ► TV programmes broadcasting ► Only the owner of a certain terminal can access the information ► World cup and SONY

III)Current applications ► Why not in telemedicine?

III)Current applications ► GPS or Galileo enhanced protection  For both militar and public use

III)Current applications ► Meetings trough videoconference ► Protection of classified information

IV) An example of processor ► Under development!!

IV)An example of processor ► DES coprocessor

IV)An example of processor ► DES algorithm

IV)An example of processor ► Remarks:  DES algorithm can be broken  Currently using AES or triple-DES

IV)An example of processor ► VeMiCry block:

IV)An example of processor ► RSA algorithm:  Choose 2 prime numbers p and q. p ≠ q  Compute n=p*q  Compute  (n) = (p-1)*(q-1)  Choose a random RP integer e such that 1<e<  (n)  Choose d such that d*e= 1 mod  (n)  Remember numbers have only one inverse!

V)Conclusions ► Where is the limit of DRM?  Freedom to be informed  Economical discrimination ► Are this applications really necessary ?  Already good security in some cases ► The end of hacking?