Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa
Contents ► I) Introduction ► II) Why and how ► III) Current applications ► IV) An example of processor ► V) Conclusions
I)Introduction ► What does cryptrography mean? Hidden Write
I) Introduction ► Some historic examples: ► Greeks and romans ► Enigma ( Second World War)
I)Introduction ► Nowadays Computer and network security Communications Militar operations Now our messages are bit strings We use huge numbers (10^100) Discourage attackers
I)Introduction ► What means TFT? ► Thin Film Transistor ► Algorithm in hardware
II) Why and how ► New technology still developing Testing needed Technical problems must be solved ► New trusted applications needed Device regarded as safe to use
II)Why and how ► Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services
II)Why and how Structure diagram
II)Why and how ► Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work
II)Why and how ► Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard
II)Why and how ► Last advance: OLED technology instead of LCD and plasma
III)Current applications ► There are still no current applications!! ► All of them under development and expected for 2007 and on.
III)Current applications ► These technology is not only available for TV ► Computers, mobile phones or PDA also
III)Current applications ► Electronic commerce in a point-of-sale terminal Trough direct communication with the bank Trough smart card payment ► First application proposed (1995) ► Increase ecommerce Avoiding the use of cash
III)Current applications ► Electronic commerce with a mobile ► Already is patented in US More secure, as two acknowledges must be done
III)Current applications ► eBanking at home But we know about „man in the middle attack“ ► FINREAD attempts to reinforce security Stresses the need of a trusted display ► Looks slow and not very attractive
III)Current applications
► Include a smart card reader ► Account and PIN number are no longer enough ► All communication is between the bank and the card
III)Current applications
► Secure terminals for e-voting ► Identification with ID and digital signature Through a computer With a personal PDA
III)Current applications ► Multimedia broadcasting for mobile phones Only the user can see the contents Information decrypted in the display OMA inverting on it
III)Current applications ► TV programmes broadcasting ► Only the owner of a certain terminal can access the information ► World cup and SONY
III)Current applications ► Why not in telemedicine?
III)Current applications ► GPS or Galileo enhanced protection For both militar and public use
III)Current applications ► Meetings trough videoconference ► Protection of classified information
IV) An example of processor ► Under development!!
IV)An example of processor ► DES coprocessor
IV)An example of processor ► DES algorithm
IV)An example of processor ► Remarks: DES algorithm can be broken Currently using AES or triple-DES
IV)An example of processor ► VeMiCry block:
IV)An example of processor ► RSA algorithm: Choose 2 prime numbers p and q. p ≠ q Compute n=p*q Compute (n) = (p-1)*(q-1) Choose a random RP integer e such that 1<e< (n) Choose d such that d*e= 1 mod (n) Remember numbers have only one inverse!
V)Conclusions ► Where is the limit of DRM? Freedom to be informed Economical discrimination ► Are this applications really necessary ? Already good security in some cases ► The end of hacking?