1 / 33

Cryptography on TFT displays

Cryptography on TFT displays. Pablo Sánchez Pedrosa. Contents. I) Introduction II) Why and how III) Current applications IV) An example of processor V) Conclusions. I)Introduction. What does cryptrography mean? Kriptos Hidden Graphein Write. I) Introduction.

Download Presentation

Cryptography on TFT displays

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography on TFT displays Pablo Sánchez Pedrosa

  2. Contents • I) Introduction • II) Why and how • III) Current applications • IV) An example of processor • V) Conclusions

  3. I)Introduction • What does cryptrography mean? Kriptos Hidden Graphein Write

  4. I) Introduction • Some historic examples: • Greeks and romans • Enigma ( Second World War)

  5. I)Introduction • Nowadays • Computer and network security • Communications • Militar operations • Now our messages are bit strings • We use huge numbers (10^100) • Discourage attackers

  6. I)Introduction • What means TFT? • Thin Film Transistor • Algorithm in hardware

  7. II) Why and how • New technology still developing • Testing needed • Technical problems must be solved • New trusted applications needed • Device regarded as safe to use

  8. II)Why and how • Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services

  9. Structure diagram II)Why and how

  10. II)Why and how • Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work

  11. II)Why and how • Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard

  12. II)Why and how • Last advance: OLED technology instead of LCD and plasma

  13. III)Current applications • There are still no current applications!! • All of them under development and expected for 2007 and on.

  14. III)Current applications • These technology is not only available for TV • Computers, mobile phones or PDA also

  15. III)Current applications • Electronic commerce in a point-of-sale terminal • Trough direct communication with the bank • Trough smart card payment • First application proposed (1995) • Increase ecommerce • Avoiding the use of cash

  16. III)Current applications • Electronic commerce with a mobile • Already is patented in US • More secure, as two acknowledges must be done

  17. III)Current applications • eBanking at home • But we know about „man in the middle attack“ • FINREAD attempts to reinforce security • Stresses the need of a trusted display • Looks slow and not very attractive

  18. III)Current applications

  19. III)Current applications • Include a smart card reader • Account and PIN number are no longer enough • All communication is between the bank and the card

  20. III)Current applications

  21. III)Current applications • Secure terminals for e-voting • Identification with ID and digital signature • Through a computer • With a personal PDA

  22. III)Current applications • Multimedia broadcasting for mobile phones • Only the user can see the contents • Information decrypted in the display • OMA inverting on it

  23. III)Current applications • TV programmes broadcasting • Only the owner of a certain terminal can access the information • World cup and SONY

  24. III)Current applications • Why not in telemedicine?

  25. III)Current applications • GPS or Galileo enhanced protection • For both militar and public use

  26. III)Current applications • Meetings trough videoconference • Protection of classified information

  27. IV) An example of processor • Under development!!

  28. IV)An example of processor • DES coprocessor

  29. IV)An example of processor • DES algorithm

  30. IV)An example of processor • Remarks: • DES algorithm can be broken • Currently using AES or triple-DES

  31. IV)An example of processor • VeMiCry block:

  32. IV)An example of processor • RSA algorithm: • Choose 2 prime numbers p and q . p ≠ q • Compute n=p*q • Compute F(n) = (p-1)*(q-1) • Choose a random RP integer e such that 1<e< F(n) • Choose d such that d*e= 1 mod F(n) • Remember numbers have only one inverse!

  33. V)Conclusions • Where is the limit of DRM? • Freedom to be informed • Economical discrimination • Are this applications really necessary ? • Already good security in some cases • The end of hacking?

More Related