Top Banner
Cryptography on TFT Cryptography on TFT displays displays Pablo Sánchez Pedrosa Pablo Sánchez Pedrosa
33

Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

Dec 17, 2015

Download

Documents

Kellie Preston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

Cryptography on TFT Cryptography on TFT displaysdisplays

Pablo Sánchez PedrosaPablo Sánchez Pedrosa

Page 2: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

ContentsContents

► I) IntroductionI) Introduction► II) Why and how II) Why and how ► III) Current applications III) Current applications ► IV) An example of processorIV) An example of processor►V) ConclusionsV) Conclusions

Page 3: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

I)IntroductionI)Introduction

►What does cryptrography mean?What does cryptrography mean?

HiddenHidden

WriteWrite

Page 4: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

I) IntroductionI) Introduction

► Some historic examples:Some historic examples:►Greeks and romansGreeks and romans► Enigma ( Second World War)Enigma ( Second World War)

Page 5: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

I)IntroductionI)Introduction

►NowadaysNowadays Computer and network securityComputer and network security CommunicationsCommunications Militar operations Militar operations

Now our messages are bit stringsNow our messages are bit strings We use huge numbers (10^100)We use huge numbers (10^100) Discourage attackersDiscourage attackers

Page 6: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

I)IntroductionI)Introduction

►What means TFT?What means TFT?

► Thin Film TransistorThin Film Transistor

► Algorithm in Algorithm in hardwarehardware

Page 7: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

II) Why and howII) Why and how

►New technology still developingNew technology still developing Testing neededTesting needed Technical problems must be solvedTechnical problems must be solved

►New trusted applications needed New trusted applications needed Device regarded as safe to useDevice regarded as safe to use

Page 8: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

II)Why and howII)Why and how

►Reasons for implementation:Reasons for implementation:

- Enhance developing of e-- Enhance developing of e-commercecommerce

- Increasing network security- Increasing network security

- Continuous rise of hacking- Continuous rise of hacking

- Offer new services - Offer new services

Page 9: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

II)Why and howII)Why and how

Structure diagramStructure diagram

Page 10: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

II)Why and howII)Why and how

►Why TFT screens?Why TFT screens?

Firstly, the end of cathodic rays tube.Firstly, the end of cathodic rays tube.

Very diffrent way of workVery diffrent way of work

Page 11: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

II)Why and howII)Why and how

► Secondly, change the CMOS to TFT Secondly, change the CMOS to TFT technology.technology.

Due to economical and quality reasonsDue to economical and quality reasons

- Still looking for TFT standard- Still looking for TFT standard

Page 12: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

II)Why and howII)Why and how

► Last advance:Last advance:

OLED technology instead of LCD and plasmaOLED technology instead of LCD and plasma

Page 13: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

► There are still no current applications!!There are still no current applications!!

► All of them under development and expected for 2007 and on.All of them under development and expected for 2007 and on.

Page 14: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

► These technology is not only available for TVThese technology is not only available for TV

► Computers, mobile phones or PDA alsoComputers, mobile phones or PDA also

Page 15: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

►Electronic commerce in a point-of-sale Electronic commerce in a point-of-sale terminalterminal Trough direct communication with the Trough direct communication with the

bankbank Trough smart card paymentTrough smart card payment

►First application proposed (1995)First application proposed (1995)► Increase ecommerceIncrease ecommerce

Avoiding the use of cashAvoiding the use of cash

Page 16: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

► Electronic commerce with a mobileElectronic commerce with a mobile► Already is patented in USAlready is patented in US

More secure, as two acknowledges must be doneMore secure, as two acknowledges must be done

Page 17: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

► eBanking at homeeBanking at home But we know about „man in the middle But we know about „man in the middle

attack“ attack“

► FINREAD attempts to reinforce FINREAD attempts to reinforce securitysecurity Stresses the need of a trusted displayStresses the need of a trusted display

►Looks slow and not very attractiveLooks slow and not very attractive

Page 18: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

Page 19: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

► Include a smart card reader Include a smart card reader

► Account and PIN number are no longer Account and PIN number are no longer enoughenough

► All communication is between the bank and All communication is between the bank and the cardthe card

Page 20: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

Page 21: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

►Secure terminals for e-votingSecure terminals for e-voting► Identification with ID and digital Identification with ID and digital

signaturesignature Through a computerThrough a computer

With a personal PDA With a personal PDA

Page 22: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

►Multimedia broadcasting for mobile phonesMultimedia broadcasting for mobile phones Only the user can see the contentsOnly the user can see the contents Information decrypted in the displayInformation decrypted in the display OMA inverting on itOMA inverting on it

Page 23: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

► TV programmes broadcastingTV programmes broadcasting

► Only the owner of a certain terminal can access the Only the owner of a certain terminal can access the informationinformation

► World cup and SONYWorld cup and SONY

Page 24: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

►Why not in telemedicine?Why not in telemedicine?

Page 25: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

► GPS or Galileo enhanced protectionGPS or Galileo enhanced protection For both militar and public useFor both militar and public use

Page 26: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

III)Current applicationsIII)Current applications

►Meetings trough videoconferenceMeetings trough videoconference► Protection of classified informationProtection of classified information

Page 27: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

IV) An example of processorIV) An example of processor

► Under development!!Under development!!

Page 28: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

IV)An example of processorIV)An example of processor

►DES coprocessorDES coprocessor

Page 29: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

IV)An example of processorIV)An example of processor

►DES algorithmDES algorithm

Page 30: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

IV)An example of processorIV)An example of processor

►Remarks:Remarks:

DES algorithm can be brokenDES algorithm can be broken

Currently using AES or triple-DESCurrently using AES or triple-DES

Page 31: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

IV)An example of processorIV)An example of processor

► VeMiCry block:VeMiCry block:

Page 32: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

IV)An example of processorIV)An example of processor

►RSA algorithm:RSA algorithm:

Choose 2 prime numbers p and q . p ≠ qChoose 2 prime numbers p and q . p ≠ q

Compute n=p*qCompute n=p*q

Compute Compute (n) = (p-1)*(q-1)(n) = (p-1)*(q-1)

Choose a random RP integer e such that 1<e< Choose a random RP integer e such that 1<e< (n) (n)

Choose d such that d*e= 1 mod Choose d such that d*e= 1 mod (n) (n) Remember numbers have only one inverse!Remember numbers have only one inverse!

Page 33: Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

V)ConclusionsV)Conclusions

►Where is the limit of DRM?Where is the limit of DRM? Freedom to be informedFreedom to be informed Economical discriminationEconomical discrimination

► Are this applications really necessary ?Are this applications really necessary ? Already good security in some casesAlready good security in some cases

► The end of hacking?The end of hacking?