cryptography on tft displays
DESCRIPTION
Cryptography on TFT displays. Pablo Sánchez Pedrosa. Contents. I) Introduction II) Why and how III) Current applications IV) An example of processor V) Conclusions. I)Introduction. What does cryptrography mean? Kriptos Hidden Graphein Write. I) Introduction. - PowerPoint PPT PresentationTRANSCRIPT
ContentsContents
► I) IntroductionI) Introduction► II) Why and how II) Why and how ► III) Current applications III) Current applications ► IV) An example of processorIV) An example of processor►V) ConclusionsV) Conclusions
I)IntroductionI)Introduction
►What does cryptrography mean?What does cryptrography mean?
HiddenHidden
WriteWrite
I) IntroductionI) Introduction
► Some historic examples:Some historic examples:►Greeks and romansGreeks and romans► Enigma ( Second World War)Enigma ( Second World War)
I)IntroductionI)Introduction
►NowadaysNowadays Computer and network securityComputer and network security CommunicationsCommunications Militar operations Militar operations
Now our messages are bit stringsNow our messages are bit strings We use huge numbers (10^100)We use huge numbers (10^100) Discourage attackersDiscourage attackers
I)IntroductionI)Introduction
►What means TFT?What means TFT?
► Thin Film TransistorThin Film Transistor
► Algorithm in Algorithm in hardwarehardware
II) Why and howII) Why and how
►New technology still developingNew technology still developing Testing neededTesting needed Technical problems must be solvedTechnical problems must be solved
►New trusted applications needed New trusted applications needed Device regarded as safe to useDevice regarded as safe to use
II)Why and howII)Why and how
►Reasons for implementation:Reasons for implementation:
- Enhance developing of e-- Enhance developing of e-commercecommerce
- Increasing network security- Increasing network security
- Continuous rise of hacking- Continuous rise of hacking
- Offer new services - Offer new services
II)Why and howII)Why and how
►Why TFT screens?Why TFT screens?
Firstly, the end of cathodic rays tube.Firstly, the end of cathodic rays tube.
Very diffrent way of workVery diffrent way of work
II)Why and howII)Why and how
► Secondly, change the CMOS to TFT Secondly, change the CMOS to TFT technology.technology.
Due to economical and quality reasonsDue to economical and quality reasons
- Still looking for TFT standard- Still looking for TFT standard
II)Why and howII)Why and how
► Last advance:Last advance:
OLED technology instead of LCD and plasmaOLED technology instead of LCD and plasma
III)Current applicationsIII)Current applications
► There are still no current applications!!There are still no current applications!!
► All of them under development and expected for 2007 and on.All of them under development and expected for 2007 and on.
III)Current applicationsIII)Current applications
► These technology is not only available for TVThese technology is not only available for TV
► Computers, mobile phones or PDA alsoComputers, mobile phones or PDA also
III)Current applicationsIII)Current applications
►Electronic commerce in a point-of-sale Electronic commerce in a point-of-sale terminalterminal Trough direct communication with the Trough direct communication with the
bankbank Trough smart card paymentTrough smart card payment
►First application proposed (1995)First application proposed (1995)► Increase ecommerceIncrease ecommerce
Avoiding the use of cashAvoiding the use of cash
III)Current applicationsIII)Current applications
► Electronic commerce with a mobileElectronic commerce with a mobile► Already is patented in USAlready is patented in US
More secure, as two acknowledges must be doneMore secure, as two acknowledges must be done
III)Current applicationsIII)Current applications
► eBanking at homeeBanking at home But we know about „man in the middle But we know about „man in the middle
attack“ attack“
► FINREAD attempts to reinforce FINREAD attempts to reinforce securitysecurity Stresses the need of a trusted displayStresses the need of a trusted display
►Looks slow and not very attractiveLooks slow and not very attractive
III)Current applicationsIII)Current applications
► Include a smart card reader Include a smart card reader
► Account and PIN number are no longer Account and PIN number are no longer enoughenough
► All communication is between the bank and All communication is between the bank and the cardthe card
III)Current applicationsIII)Current applications
►Secure terminals for e-votingSecure terminals for e-voting► Identification with ID and digital Identification with ID and digital
signaturesignature Through a computerThrough a computer
With a personal PDA With a personal PDA
III)Current applicationsIII)Current applications
►Multimedia broadcasting for mobile phonesMultimedia broadcasting for mobile phones Only the user can see the contentsOnly the user can see the contents Information decrypted in the displayInformation decrypted in the display OMA inverting on itOMA inverting on it
III)Current applicationsIII)Current applications
► TV programmes broadcastingTV programmes broadcasting
► Only the owner of a certain terminal can access the Only the owner of a certain terminal can access the informationinformation
► World cup and SONYWorld cup and SONY
III)Current applicationsIII)Current applications
► GPS or Galileo enhanced protectionGPS or Galileo enhanced protection For both militar and public useFor both militar and public use
III)Current applicationsIII)Current applications
►Meetings trough videoconferenceMeetings trough videoconference► Protection of classified informationProtection of classified information
IV)An example of processorIV)An example of processor
►Remarks:Remarks:
DES algorithm can be brokenDES algorithm can be broken
Currently using AES or triple-DESCurrently using AES or triple-DES
IV)An example of processorIV)An example of processor
►RSA algorithm:RSA algorithm:
Choose 2 prime numbers p and q . p ≠ qChoose 2 prime numbers p and q . p ≠ q
Compute n=p*qCompute n=p*q
Compute Compute (n) = (p-1)*(q-1)(n) = (p-1)*(q-1)
Choose a random RP integer e such that 1<e< Choose a random RP integer e such that 1<e< (n) (n)
Choose d such that d*e= 1 mod Choose d such that d*e= 1 mod (n) (n) Remember numbers have only one inverse!Remember numbers have only one inverse!
V)ConclusionsV)Conclusions
►Where is the limit of DRM?Where is the limit of DRM? Freedom to be informedFreedom to be informed Economical discriminationEconomical discrimination
► Are this applications really necessary ?Are this applications really necessary ? Already good security in some casesAlready good security in some cases
► The end of hacking?The end of hacking?