330 likes | 419 Views
Cryptography on TFT displays. Pablo Sánchez Pedrosa. Contents. I) Introduction II) Why and how III) Current applications IV) An example of processor V) Conclusions. I)Introduction. What does cryptrography mean? Kriptos Hidden Graphein Write. I) Introduction.
E N D
Cryptography on TFT displays Pablo Sánchez Pedrosa
Contents • I) Introduction • II) Why and how • III) Current applications • IV) An example of processor • V) Conclusions
I)Introduction • What does cryptrography mean? Kriptos Hidden Graphein Write
I) Introduction • Some historic examples: • Greeks and romans • Enigma ( Second World War)
I)Introduction • Nowadays • Computer and network security • Communications • Militar operations • Now our messages are bit strings • We use huge numbers (10^100) • Discourage attackers
I)Introduction • What means TFT? • Thin Film Transistor • Algorithm in hardware
II) Why and how • New technology still developing • Testing needed • Technical problems must be solved • New trusted applications needed • Device regarded as safe to use
II)Why and how • Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services
Structure diagram II)Why and how
II)Why and how • Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work
II)Why and how • Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard
II)Why and how • Last advance: OLED technology instead of LCD and plasma
III)Current applications • There are still no current applications!! • All of them under development and expected for 2007 and on.
III)Current applications • These technology is not only available for TV • Computers, mobile phones or PDA also
III)Current applications • Electronic commerce in a point-of-sale terminal • Trough direct communication with the bank • Trough smart card payment • First application proposed (1995) • Increase ecommerce • Avoiding the use of cash
III)Current applications • Electronic commerce with a mobile • Already is patented in US • More secure, as two acknowledges must be done
III)Current applications • eBanking at home • But we know about „man in the middle attack“ • FINREAD attempts to reinforce security • Stresses the need of a trusted display • Looks slow and not very attractive
III)Current applications • Include a smart card reader • Account and PIN number are no longer enough • All communication is between the bank and the card
III)Current applications • Secure terminals for e-voting • Identification with ID and digital signature • Through a computer • With a personal PDA
III)Current applications • Multimedia broadcasting for mobile phones • Only the user can see the contents • Information decrypted in the display • OMA inverting on it
III)Current applications • TV programmes broadcasting • Only the owner of a certain terminal can access the information • World cup and SONY
III)Current applications • Why not in telemedicine?
III)Current applications • GPS or Galileo enhanced protection • For both militar and public use
III)Current applications • Meetings trough videoconference • Protection of classified information
IV) An example of processor • Under development!!
IV)An example of processor • DES coprocessor
IV)An example of processor • DES algorithm
IV)An example of processor • Remarks: • DES algorithm can be broken • Currently using AES or triple-DES
IV)An example of processor • VeMiCry block:
IV)An example of processor • RSA algorithm: • Choose 2 prime numbers p and q . p ≠ q • Compute n=p*q • Compute F(n) = (p-1)*(q-1) • Choose a random RP integer e such that 1<e< F(n) • Choose d such that d*e= 1 mod F(n) • Remember numbers have only one inverse!
V)Conclusions • Where is the limit of DRM? • Freedom to be informed • Economical discrimination • Are this applications really necessary ? • Already good security in some cases • The end of hacking?