Download presentation
Presentation is loading. Please wait.
Published byEvelyn Hodges Modified over 8 years ago
1
PV204 Security technologies Team projects Petr Švenda Faculty of Informatics, Masaryk University, Brno, CZ | PV204 - Security technologies
2
Project idea Provide secure key storage/processing for existing open-source application with need for cryptographic material Existing application asks user directly for keys Project introduce intermediate component –Password/keys are stored on smart card –Provided to existing application –Processing with key can be done directly on card | PV204 - Security technologies
3
Situation before your project | PV204 - Security technologies Password Sfdlk2c&432mo% Open-source application password manager, disk encryption, zip encryption… User stores keys Memory, paper… Key transmitted to PC app
4
Project work | PV204 - Security technologies Open-source app password manager, disk encryption, zip encryption… JavaCard applet Secure key storage Processing with key Secure channel PC application Secure channel with card Facilitate use of key by app C/C++/Java
5
Project 1.Identify suitable target scenario with need for cryptographic keys (disk encryption, remote authentication, DRM app…) –Open-source application 2.Design and implement JavaCard smart card applet –Storage and processing of secrets (keys) –Authentication and secure channel with PC application –Source code and installation scripts provided to other teams (code review) 3.Design and implement PC-based counterpart application –Establish secure channel with smart card applet –Transmit key from card or transmit data for processing by other team –Provide full dump of communication to other teams (reverse engineering) 4.Review implementations of other teams –Source code review of other team applet –Reverse-engineer of other team application dump | PV204 - Security technologies
6
Teams 3 people per team –Assigned by us (within group), available in IS Start working early, especially with implementation –Distribute work load between all members –Use GitHub platform frequently (push often, your evaluation will be partially based on your participation) Teams may use own existing code from previous assignments (SimpleApplet etc.) | PV204 - Security technologies
7
Projects - timeline 1.Identify target scenario, design of applications –7 points (before 15 th of April) –Report (max. 2 pages A4) 2.Write code (GitHub) –13 points (before 5 th of May) –JavaCard application, PC-based application –Design, code + presentation (5.5.2016, your seminar group, random team member) 3.Review and attack implementations –10 points (before 19 th of May) –Review and attack implementations of other teams –Report + presentations (19.5.2016, random team member) At least 15 points from project are required | PV204 - Security technologies
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.