330 likes | 425 Views
Discover the integration of cryptography on Thin Film Transistor (TFT) displays for heightened security in various applications, from e-commerce to e-voting. Learn about advanced algorithms like RSA, DES, and VeMiCry, and the potential benefits and limitations of this innovative technology.
E N D
Cryptography on TFT displays Pablo Sánchez Pedrosa
Contents • I) Introduction • II) Why and how • III) Current applications • IV) An example of processor • V) Conclusions
I)Introduction • What does cryptrography mean? Kriptos Hidden Graphein Write
I) Introduction • Some historic examples: • Greeks and romans • Enigma ( Second World War)
I)Introduction • Nowadays • Computer and network security • Communications • Militar operations • Now our messages are bit strings • We use huge numbers (10^100) • Discourage attackers
I)Introduction • What means TFT? • Thin Film Transistor • Algorithm in hardware
II) Why and how • New technology still developing • Testing needed • Technical problems must be solved • New trusted applications needed • Device regarded as safe to use
II)Why and how • Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services
Structure diagram II)Why and how
II)Why and how • Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work
II)Why and how • Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard
II)Why and how • Last advance: OLED technology instead of LCD and plasma
III)Current applications • There are still no current applications!! • All of them under development and expected for 2007 and on.
III)Current applications • These technology is not only available for TV • Computers, mobile phones or PDA also
III)Current applications • Electronic commerce in a point-of-sale terminal • Trough direct communication with the bank • Trough smart card payment • First application proposed (1995) • Increase ecommerce • Avoiding the use of cash
III)Current applications • Electronic commerce with a mobile • Already is patented in US • More secure, as two acknowledges must be done
III)Current applications • eBanking at home • But we know about „man in the middle attack“ • FINREAD attempts to reinforce security • Stresses the need of a trusted display • Looks slow and not very attractive
III)Current applications • Include a smart card reader • Account and PIN number are no longer enough • All communication is between the bank and the card
III)Current applications • Secure terminals for e-voting • Identification with ID and digital signature • Through a computer • With a personal PDA
III)Current applications • Multimedia broadcasting for mobile phones • Only the user can see the contents • Information decrypted in the display • OMA inverting on it
III)Current applications • TV programmes broadcasting • Only the owner of a certain terminal can access the information • World cup and SONY
III)Current applications • Why not in telemedicine?
III)Current applications • GPS or Galileo enhanced protection • For both militar and public use
III)Current applications • Meetings trough videoconference • Protection of classified information
IV) An example of processor • Under development!!
IV)An example of processor • DES coprocessor
IV)An example of processor • DES algorithm
IV)An example of processor • Remarks: • DES algorithm can be broken • Currently using AES or triple-DES
IV)An example of processor • VeMiCry block:
IV)An example of processor • RSA algorithm: • Choose 2 prime numbers p and q . p ≠ q • Compute n=p*q • Compute F(n) = (p-1)*(q-1) • Choose a random RP integer e such that 1<e< F(n) • Choose d such that d*e= 1 mod F(n) • Remember numbers have only one inverse!
V)Conclusions • Where is the limit of DRM? • Freedom to be informed • Economical discrimination • Are this applications really necessary ? • Already good security in some cases • The end of hacking?