Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

Similar presentations


Presentation on theme: "Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa."— Presentation transcript:

1 Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa

2 Contents ► I) Introduction ► II) Why and how ► III) Current applications ► IV) An example of processor ► V) Conclusions

3 I)Introduction ► What does cryptrography mean?  Hidden  Write

4 I) Introduction ► Some historic examples: ► Greeks and romans ► Enigma ( Second World War)

5 I)Introduction ► Nowadays  Computer and network security  Communications  Militar operations  Now our messages are bit strings  We use huge numbers (10^100)  Discourage attackers

6 I)Introduction ► What means TFT? ► Thin Film Transistor ► Algorithm in hardware

7 II) Why and how ► New technology still developing  Testing needed  Technical problems must be solved ► New trusted applications needed  Device regarded as safe to use

8 II)Why and how ► Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services

9 II)Why and how Structure diagram

10 II)Why and how ► Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work

11 II)Why and how ► Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard

12 II)Why and how ► Last advance: OLED technology instead of LCD and plasma

13 III)Current applications ► There are still no current applications!! ► All of them under development and expected for 2007 and on.

14 III)Current applications ► These technology is not only available for TV ► Computers, mobile phones or PDA also

15 III)Current applications ► Electronic commerce in a point-of-sale terminal  Trough direct communication with the bank  Trough smart card payment ► First application proposed (1995) ► Increase ecommerce  Avoiding the use of cash

16 III)Current applications ► Electronic commerce with a mobile ► Already is patented in US  More secure, as two acknowledges must be done

17 III)Current applications ► eBanking at home  But we know about „man in the middle attack“ ► FINREAD attempts to reinforce security  Stresses the need of a trusted display ► Looks slow and not very attractive

18 III)Current applications

19 ► Include a smart card reader ► Account and PIN number are no longer enough ► All communication is between the bank and the card

20 III)Current applications

21 ► Secure terminals for e-voting ► Identification with ID and digital signature  Through a computer  With a personal PDA

22 III)Current applications ► Multimedia broadcasting for mobile phones  Only the user can see the contents  Information decrypted in the display  OMA inverting on it

23 III)Current applications ► TV programmes broadcasting ► Only the owner of a certain terminal can access the information ► World cup and SONY

24 III)Current applications ► Why not in telemedicine?

25 III)Current applications ► GPS or Galileo enhanced protection  For both militar and public use

26 III)Current applications ► Meetings trough videoconference ► Protection of classified information

27 IV) An example of processor ► Under development!!

28 IV)An example of processor ► DES coprocessor

29 IV)An example of processor ► DES algorithm

30 IV)An example of processor ► Remarks:  DES algorithm can be broken  Currently using AES or triple-DES

31 IV)An example of processor ► VeMiCry block:

32 IV)An example of processor ► RSA algorithm:  Choose 2 prime numbers p and q. p ≠ q  Compute n=p*q  Compute  (n) = (p-1)*(q-1)  Choose a random RP integer e such that 1<e<  (n)  Choose d such that d*e= 1 mod  (n)  Remember numbers have only one inverse!

33 V)Conclusions ► Where is the limit of DRM?  Freedom to be informed  Economical discrimination ► Are this applications really necessary ?  Already good security in some cases ► The end of hacking?


Download ppt "Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa."

Similar presentations


Ads by Google