Download presentation
Presentation is loading. Please wait.
1
Applying Cryptography to Physical Security
Crypto-SmartLock Kevin J. D’Aquila Frank L. Gerratana Anthony P. Oteri Jeffrey A. Rosenberger Professor Michael J. Ciaraldi Professor R. James Duckworth Applying Cryptography to Physical Security
2
Crypto-SmartLock Secure Door Lock system Components Door Locks Keys
Central Management Computer
3
Goals of the project Create secure card lock system
Disconnected system using only Smart Cards for communication with doors Bridge the gap between centralized systems and manually programmed standalone systems
4
Problems with existing systems
Security issues Lack of convenience
5
Our Solution Have a centralized management computer, but do not wire it to locks All communication occurs through the Smart Card-based keys All communication and authentication secured using the Advanced Encryption Standard (AES)
6
Protocol The central server places “commands” for the doors onto cards
These commands provide functions such as adding users to doors
7
Crypto-SmartLock
8
Components Door System Keycards Key Management Software
9
Door Embedded system using low power Texas Instruments MSP430 Microcontroller Battery powered (annual replacement schedule) Stand-alone system
10
Door
11
Keycard ZeitControl BasicCard Smart Card
Chosen due to flexibility and speed of development Contains microcontroller and 8 kilobytes of program/data storage
12
Key Management Software
Runs on standard Windows PC Provides easy to use graphical user interface Allows the system administrator to manage users and door access permissions
13
Key Management Software
14
Usage Example System administrator grants a user access to a new door
Connects user’s keycard to central system The key management software generates a cryptographic key for authentication and places it on the card
15
Usage Example (continued)
Key management software generates a command instructing the door to add access for a specific user using a specific cryptographic key This command is encrypted and placed on the user’s keycard
16
Usage Example (continued)
When the user inserts their keycard in the door the first time, the door decrypts, authenticates, and processes the command The door then performs challenge-response authentication using the newly added cryptographic key, granting the user access
17
Accomplishments Designed secure communication protocol
Built prototype door hardware Developed the three necessary software components Key Management Software Door Software Keycard Software
18
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.