33
Cryptography on TFT Cryptography on TFT displays displays Pablo Sánchez Pedrosa Pablo Sánchez Pedrosa

Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa

Embed Size (px)

Citation preview

Cryptography on TFT Cryptography on TFT displaysdisplays

Pablo Sánchez PedrosaPablo Sánchez Pedrosa

ContentsContents

► I) IntroductionI) Introduction► II) Why and how II) Why and how ► III) Current applications III) Current applications ► IV) An example of processorIV) An example of processor►V) ConclusionsV) Conclusions

I)IntroductionI)Introduction

►What does cryptrography mean?What does cryptrography mean?

HiddenHidden

WriteWrite

I) IntroductionI) Introduction

► Some historic examples:Some historic examples:►Greeks and romansGreeks and romans► Enigma ( Second World War)Enigma ( Second World War)

I)IntroductionI)Introduction

►NowadaysNowadays Computer and network securityComputer and network security CommunicationsCommunications Militar operations Militar operations

Now our messages are bit stringsNow our messages are bit strings We use huge numbers (10^100)We use huge numbers (10^100) Discourage attackersDiscourage attackers

I)IntroductionI)Introduction

►What means TFT?What means TFT?

► Thin Film TransistorThin Film Transistor

► Algorithm in Algorithm in hardwarehardware

II) Why and howII) Why and how

►New technology still developingNew technology still developing Testing neededTesting needed Technical problems must be solvedTechnical problems must be solved

►New trusted applications needed New trusted applications needed Device regarded as safe to useDevice regarded as safe to use

II)Why and howII)Why and how

►Reasons for implementation:Reasons for implementation:

- Enhance developing of e-- Enhance developing of e-commercecommerce

- Increasing network security- Increasing network security

- Continuous rise of hacking- Continuous rise of hacking

- Offer new services - Offer new services

II)Why and howII)Why and how

Structure diagramStructure diagram

II)Why and howII)Why and how

►Why TFT screens?Why TFT screens?

Firstly, the end of cathodic rays tube.Firstly, the end of cathodic rays tube.

Very diffrent way of workVery diffrent way of work

II)Why and howII)Why and how

► Secondly, change the CMOS to TFT Secondly, change the CMOS to TFT technology.technology.

Due to economical and quality reasonsDue to economical and quality reasons

- Still looking for TFT standard- Still looking for TFT standard

II)Why and howII)Why and how

► Last advance:Last advance:

OLED technology instead of LCD and plasmaOLED technology instead of LCD and plasma

III)Current applicationsIII)Current applications

► There are still no current applications!!There are still no current applications!!

► All of them under development and expected for 2007 and on.All of them under development and expected for 2007 and on.

III)Current applicationsIII)Current applications

► These technology is not only available for TVThese technology is not only available for TV

► Computers, mobile phones or PDA alsoComputers, mobile phones or PDA also

III)Current applicationsIII)Current applications

►Electronic commerce in a point-of-sale Electronic commerce in a point-of-sale terminalterminal Trough direct communication with the Trough direct communication with the

bankbank Trough smart card paymentTrough smart card payment

►First application proposed (1995)First application proposed (1995)► Increase ecommerceIncrease ecommerce

Avoiding the use of cashAvoiding the use of cash

III)Current applicationsIII)Current applications

► Electronic commerce with a mobileElectronic commerce with a mobile► Already is patented in USAlready is patented in US

More secure, as two acknowledges must be doneMore secure, as two acknowledges must be done

III)Current applicationsIII)Current applications

► eBanking at homeeBanking at home But we know about „man in the middle But we know about „man in the middle

attack“ attack“

► FINREAD attempts to reinforce FINREAD attempts to reinforce securitysecurity Stresses the need of a trusted displayStresses the need of a trusted display

►Looks slow and not very attractiveLooks slow and not very attractive

III)Current applicationsIII)Current applications

III)Current applicationsIII)Current applications

► Include a smart card reader Include a smart card reader

► Account and PIN number are no longer Account and PIN number are no longer enoughenough

► All communication is between the bank and All communication is between the bank and the cardthe card

III)Current applicationsIII)Current applications

III)Current applicationsIII)Current applications

►Secure terminals for e-votingSecure terminals for e-voting► Identification with ID and digital Identification with ID and digital

signaturesignature Through a computerThrough a computer

With a personal PDA With a personal PDA

III)Current applicationsIII)Current applications

►Multimedia broadcasting for mobile phonesMultimedia broadcasting for mobile phones Only the user can see the contentsOnly the user can see the contents Information decrypted in the displayInformation decrypted in the display OMA inverting on itOMA inverting on it

III)Current applicationsIII)Current applications

► TV programmes broadcastingTV programmes broadcasting

► Only the owner of a certain terminal can access the Only the owner of a certain terminal can access the informationinformation

► World cup and SONYWorld cup and SONY

III)Current applicationsIII)Current applications

►Why not in telemedicine?Why not in telemedicine?

III)Current applicationsIII)Current applications

► GPS or Galileo enhanced protectionGPS or Galileo enhanced protection For both militar and public useFor both militar and public use

III)Current applicationsIII)Current applications

►Meetings trough videoconferenceMeetings trough videoconference► Protection of classified informationProtection of classified information

IV) An example of processorIV) An example of processor

► Under development!!Under development!!

IV)An example of processorIV)An example of processor

►DES coprocessorDES coprocessor

IV)An example of processorIV)An example of processor

►DES algorithmDES algorithm

IV)An example of processorIV)An example of processor

►Remarks:Remarks:

DES algorithm can be brokenDES algorithm can be broken

Currently using AES or triple-DESCurrently using AES or triple-DES

IV)An example of processorIV)An example of processor

► VeMiCry block:VeMiCry block:

IV)An example of processorIV)An example of processor

►RSA algorithm:RSA algorithm:

Choose 2 prime numbers p and q . p ≠ qChoose 2 prime numbers p and q . p ≠ q

Compute n=p*qCompute n=p*q

Compute Compute (n) = (p-1)*(q-1)(n) = (p-1)*(q-1)

Choose a random RP integer e such that 1<e< Choose a random RP integer e such that 1<e< (n) (n)

Choose d such that d*e= 1 mod Choose d such that d*e= 1 mod (n) (n) Remember numbers have only one inverse!Remember numbers have only one inverse!

V)ConclusionsV)Conclusions

►Where is the limit of DRM?Where is the limit of DRM? Freedom to be informedFreedom to be informed Economical discriminationEconomical discrimination

► Are this applications really necessary ?Are this applications really necessary ? Already good security in some casesAlready good security in some cases

► The end of hacking?The end of hacking?