cicret ppt
TRANSCRIPT
CICRET
Swaroop Koshy MathewMCA, Macfast
What is Cicret?
Cicret is the combination of two products with a single idea:>>to give you complete control
Two Products:a) Cicret Appb) Cicret Bracelet
Cicret ApplicationIt’s a secure and free solution for those who want to :
a) Chatb) Sharec) Safe Exchange of datad) Untraceablee) Cryptic Message
Available on ANDROID
Cicret Bracelet
Makes your skin a new touchscreen.- Reads your mail- Play music- Answer your calls- Check Weather etc…Use it anytime, anywhere..
Sixth Sence Technology
Developed By:Pranav Misra : Indian
Cicret Connection
Cicret Bracelet - Components
Cicret Bracelet – Components
*Accelerometer
Most commonly found on drones for flight stabilization
Cicret Bracelet – Components
*Micro USB port
Exchange information between the system & bracelet.Data to be exchanged includes : - Images & Videos- Documents etc…
Cicret Bracelet – Components
*Proximity Sensor
Emits electromagnetic field/ beamLooks for change in field/return signalWhen hand placed : stops one of the 8 sensor and sends information back to the processor
Cicret Bracelet – Components
*Pico Projector
Cicret Bracelet - Components
Cicret – Working
Step 1 : Download CicretStep 2 : ID GenerationStep 3 : AES Key GenerationStep 4 : Encrypted Communication
Cicret – Working
AES - Advanced Encryption Standard- Established by US NIST- Cicret uses AES-256 encryption -> 2256 possible keys
Block Size : 4 Key Length : 32 bytes No. Rounds : 14
- 14 rounds of encryption performed- Use Symmetric Block Cipher- Cipher?- Symmetric Block Cipher?
Cicret – Working
Single Round consists of 4 Stages:
a) Add Round Keyb) Substitute Bytesc) Shift Rowsd) Mix Columns
Since 14 rounds are used, 14 times these 4 stages are performed one after the other sequentially.
Cicret – WorkingAES – 128- uses 128 bit block- represented in 4X4 matrix- 1 word = 16 bytes
Cicret – WorkingAES - 128Encryption & Decryption
Cicret – WorkingStage 1 : Add Round Key
Fig: Round Key Transformation
Cicret – WorkingStage 2 : Substitute Bytes
Fig: Substitute Byte
Transformation
Cicret – WorkingStage 3 : Shift Row
Fig: Shift Row Transformation
Cicret – WorkingStage 4 : Mix Column
Fig: Mix Column Transformation
Cicret – Working
Fig: aesencryption.net
Cicret – WorkingRSA Key generation- Creators : Rivest, Shamir, Adleman - Follows asymmetric cryptography- Asymmetric cryptography?- Public & Private Keys?- Unique RSA key generated each time when data is exchanged with server.
Thank You!!
[ Links ]
www.cicret.comhttps://www.youtube.com/watch?v=9J7GpVQCfms
Prepared & Presented By:Swaroop Koshy Mathew, Macfast
Tiruvalla, Kerala
2015 JAN