1 / 6

PV204 Security technologies

PV204 Security technologies. Team projects. Petr Švenda Faculty of Informatics, Masaryk University, Brno, CZ. Situation before your project. Sfdlk2c&4 32mo%. User stores keys Memory, paper…. Open-source application password manager, disk encryption, zip encryption…. Password.

jlott
Download Presentation

PV204 Security technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PV204 Security technologies Team projects Petr Švenda Faculty of Informatics, Masaryk University, Brno, CZ | PV204 - Security technologies

  2. Situation before your project Sfdlk2c&4 32mo% User stores keys Memory, paper… Open-source application password manager, disk encryption, zip encryption… Password Key transmitted to PC app | PV204 - Security technologies

  3. Project work Open-source app password manager, disk encryption, zip encryption… JavaCard applet Secure key storage Processing with key Secure channel PC application Secure channel with card Facilitate use of key by app C/C++/Java Secure channel | PV204 - Security technologies

  4. Project • Identify suitable target scenario with need for cryptographic keys (disk encryption, remote authentication, DRM app…) • Open-source application • Design and implement JavaCard smart card applet • Storage and processing of secrets (keys) • Authentication and secure channel with PC application • Source code and installation scripts provided to other teams (code review) • Design and implement PC-based counterpart application • Establish secure channel with smart card applet • Transmit key from card or transmit data for processing by other team • Provide full dump of communication to other teams (reverse engineering) • Review implementations of other teams • Source code review of other team applet • Reverse-engineer of other team application dump | PV204 - Security technologies

  5. Teams • 3 people per team • Assigned by us (within group), available in IS • Start working early, especially with implementation • Distribute work load between all members • Use GitHub platform frequently (push often, your evaluation will be partially based on your participation) • Teams may use own existing code from previous assignments (SimpleApplet etc.) | PV204 - Security technologies

  6. Projects - timeline • Identify target scenario, design of applications • 7 points (before 15thof April) • Report (max. 2 pages A4) • Write code (GitHub) • 13 points (before 5th of May) • JavaCard application, PC-based application • Design, code + presentation (5.5.2016, your seminar group, random team member) • Review and attack implementations • 10 points (before 19th of May) • Review and attack implementations of other teams • Report + presentations (19.5.2016, random team member) • At least 15 points from project are required | PV204 - Security technologies

More Related