Top Banner
CICRET Swaroop Koshy Mathew MCA, Macfast
26

Cicret PPT

Apr 15, 2017

Download

Technology

swaroop koshy
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cicret  PPT

CICRET

Swaroop Koshy MathewMCA, Macfast

Page 2: Cicret  PPT

What is Cicret?

Cicret is the combination of two products with a single idea:>>to give you complete control

Two Products:a) Cicret Appb) Cicret Bracelet

Page 3: Cicret  PPT

Cicret ApplicationIt’s a secure and free solution for those who want to :

a) Chatb) Sharec) Safe Exchange of datad) Untraceablee) Cryptic Message

Available on ANDROID

Page 4: Cicret  PPT

Cicret Bracelet

Makes your skin a new touchscreen.- Reads your mail- Play music- Answer your calls- Check Weather etc…Use it anytime, anywhere..

Page 5: Cicret  PPT

Sixth Sence Technology

Developed By:Pranav Misra : Indian

Page 6: Cicret  PPT

Cicret Connection

Page 7: Cicret  PPT

Cicret Bracelet - Components

Page 8: Cicret  PPT

Cicret Bracelet – Components

*Accelerometer

Most commonly found on drones for flight stabilization

Page 9: Cicret  PPT

Cicret Bracelet – Components

*Micro USB port

Exchange information between the system & bracelet.Data to be exchanged includes : - Images & Videos- Documents etc…

Page 10: Cicret  PPT

Cicret Bracelet – Components

*Proximity Sensor

Emits electromagnetic field/ beamLooks for change in field/return signalWhen hand placed : stops one of the 8 sensor and sends information back to the processor

Page 11: Cicret  PPT

Cicret Bracelet – Components

*Pico Projector

Page 12: Cicret  PPT

Cicret Bracelet - Components

Page 13: Cicret  PPT

Cicret – Working

Step 1 : Download CicretStep 2 : ID GenerationStep 3 : AES Key GenerationStep 4 : Encrypted Communication

Page 14: Cicret  PPT

Cicret – Working

AES - Advanced Encryption Standard- Established by US NIST- Cicret uses AES-256 encryption -> 2256 possible keys

Block Size : 4 Key Length : 32 bytes No. Rounds : 14

- 14 rounds of encryption performed- Use Symmetric Block Cipher- Cipher?- Symmetric Block Cipher?

Page 15: Cicret  PPT

Cicret – Working

Single Round consists of 4 Stages:

a) Add Round Keyb) Substitute Bytesc) Shift Rowsd) Mix Columns

Since 14 rounds are used, 14 times these 4 stages are performed one after the other sequentially.

Page 16: Cicret  PPT

Cicret – WorkingAES – 128- uses 128 bit block- represented in 4X4 matrix- 1 word = 16 bytes

Page 17: Cicret  PPT

Cicret – WorkingAES - 128Encryption & Decryption

Page 18: Cicret  PPT

Cicret – WorkingStage 1 : Add Round Key

Fig: Round Key Transformation

Page 19: Cicret  PPT

Cicret – WorkingStage 2 : Substitute Bytes

Fig: Substitute Byte

Transformation

Page 20: Cicret  PPT

Cicret – WorkingStage 3 : Shift Row

Fig: Shift Row Transformation

Page 21: Cicret  PPT

Cicret – WorkingStage 4 : Mix Column

Fig: Mix Column Transformation

Page 22: Cicret  PPT

Cicret – Working

Fig: aesencryption.net

Page 23: Cicret  PPT

Cicret – WorkingRSA Key generation- Creators : Rivest, Shamir, Adleman - Follows asymmetric cryptography- Asymmetric cryptography?- Public & Private Keys?- Unique RSA key generated each time when data is exchanged with server.

Page 24: Cicret  PPT

Thank You!!

Page 25: Cicret  PPT

[ Links ]

www.cicret.comhttps://www.youtube.com/watch?v=9J7GpVQCfms

Page 26: Cicret  PPT

Prepared & Presented By:Swaroop Koshy Mathew, Macfast

Tiruvalla, Kerala

2015 JAN