Download presentation
Presentation is loading. Please wait.
Published byKellie Preston Modified over 9 years ago
1
Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa
2
Contents ► I) Introduction ► II) Why and how ► III) Current applications ► IV) An example of processor ► V) Conclusions
3
I)Introduction ► What does cryptrography mean? Hidden Write
4
I) Introduction ► Some historic examples: ► Greeks and romans ► Enigma ( Second World War)
5
I)Introduction ► Nowadays Computer and network security Communications Militar operations Now our messages are bit strings We use huge numbers (10^100) Discourage attackers
6
I)Introduction ► What means TFT? ► Thin Film Transistor ► Algorithm in hardware
7
II) Why and how ► New technology still developing Testing needed Technical problems must be solved ► New trusted applications needed Device regarded as safe to use
8
II)Why and how ► Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services
9
II)Why and how Structure diagram
10
II)Why and how ► Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work
11
II)Why and how ► Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard
12
II)Why and how ► Last advance: OLED technology instead of LCD and plasma
13
III)Current applications ► There are still no current applications!! ► All of them under development and expected for 2007 and on.
14
III)Current applications ► These technology is not only available for TV ► Computers, mobile phones or PDA also
15
III)Current applications ► Electronic commerce in a point-of-sale terminal Trough direct communication with the bank Trough smart card payment ► First application proposed (1995) ► Increase ecommerce Avoiding the use of cash
16
III)Current applications ► Electronic commerce with a mobile ► Already is patented in US More secure, as two acknowledges must be done
17
III)Current applications ► eBanking at home But we know about „man in the middle attack“ ► FINREAD attempts to reinforce security Stresses the need of a trusted display ► Looks slow and not very attractive
18
III)Current applications
19
► Include a smart card reader ► Account and PIN number are no longer enough ► All communication is between the bank and the card
20
III)Current applications
21
► Secure terminals for e-voting ► Identification with ID and digital signature Through a computer With a personal PDA
22
III)Current applications ► Multimedia broadcasting for mobile phones Only the user can see the contents Information decrypted in the display OMA inverting on it
23
III)Current applications ► TV programmes broadcasting ► Only the owner of a certain terminal can access the information ► World cup and SONY
24
III)Current applications ► Why not in telemedicine?
25
III)Current applications ► GPS or Galileo enhanced protection For both militar and public use
26
III)Current applications ► Meetings trough videoconference ► Protection of classified information
27
IV) An example of processor ► Under development!!
28
IV)An example of processor ► DES coprocessor
29
IV)An example of processor ► DES algorithm
30
IV)An example of processor ► Remarks: DES algorithm can be broken Currently using AES or triple-DES
31
IV)An example of processor ► VeMiCry block:
32
IV)An example of processor ► RSA algorithm: Choose 2 prime numbers p and q. p ≠ q Compute n=p*q Compute (n) = (p-1)*(q-1) Choose a random RP integer e such that 1<e< (n) Choose d such that d*e= 1 mod (n) Remember numbers have only one inverse!
33
V)Conclusions ► Where is the limit of DRM? Freedom to be informed Economical discrimination ► Are this applications really necessary ? Already good security in some cases ► The end of hacking?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.