Cryptography on TFT displays Cryptography on TFT displays Pablo Sánchez Pedrosa.

  • Published on

  • View

  • Download

Embed Size (px)


  • Slide 1
  • Cryptography on TFT displays Cryptography on TFT displays Pablo Snchez Pedrosa
  • Slide 2
  • Contents I) Introduction II) Why and how III) Current applications IV) An example of processor V) Conclusions
  • Slide 3
  • I)Introduction What does cryptrography mean? Hidden Write
  • Slide 4
  • I) Introduction Some historic examples: Greeks and romans Enigma ( Second World War)
  • Slide 5
  • I)Introduction Nowadays Computer and network security Communications Militar operations Now our messages are bit strings We use huge numbers (10^100) Discourage attackers
  • Slide 6
  • I)Introduction What means TFT? Thin Film Transistor Algorithm in hardware
  • Slide 7
  • II) Why and how New technology still developing Testing needed Technical problems must be solved New trusted applications needed Device regarded as safe to use
  • Slide 8
  • II)Why and how Reasons for implementation: - Enhance developing of e-commerce - Increasing network security - Continuous rise of hacking - Offer new services
  • Slide 9
  • II)Why and how Structure diagram
  • Slide 10
  • II)Why and how Why TFT screens? Firstly, the end of cathodic rays tube. Very diffrent way of work
  • Slide 11
  • II)Why and how Secondly, change the CMOS to TFT technology. Due to economical and quality reasons - Still looking for TFT standard
  • Slide 12
  • II)Why and how Last advance: OLED technology instead of LCD and plasma
  • Slide 13
  • III)Current applications There are still no current applications!! All of them under development and expected for 2007 and on.
  • Slide 14
  • III)Current applications These technology is not only available for TV Computers, mobile phones or PDA also
  • Slide 15
  • III)Current applications Electronic commerce in a point-of-sale terminal Trough direct communication with the bank Trough smart card payment First application proposed (1995) Increase ecommerce Avoiding the use of cash
  • Slide 16
  • III)Current applications Electronic commerce with a mobile Already is patented in US More secure, as two acknowledges must be done
  • Slide 17
  • III)Current applications eBanking at home But we know about man in the middle attack FINREAD attempts to reinforce security Stresses the need of a trusted display Looks slow and not very attractive
  • Slide 18
  • III)Current applications
  • Slide 19
  • Include a smart card reader Account and PIN number are no longer enough All communication is between the bank and the card
  • Slide 20
  • III)Current applications
  • Slide 21
  • Secure terminals for e-voting Identification with ID and digital signature Through a computer With a personal PDA
  • Slide 22
  • III)Current applications Multimedia broadcasting for mobile phones Only the user can see the contents Information decrypted in the display OMA inverting on it
  • Slide 23
  • III)Current applications TV programmes broadcasting Only the owner of a certain terminal can access the information World cup and SONY
  • Slide 24
  • III)Current applications Why not in telemedicine?
  • Slide 25
  • III)Current applications GPS or Galileo enhanced protection For both militar and public use
  • Slide 26
  • III)Current applications Meetings trough videoconference Protection of classified information
  • Slide 27
  • IV) An example of processor Under development!!
  • Slide 28
  • IV)An example of processor DES coprocessor
  • Slide 29
  • IV)An example of processor DES algorithm
  • Slide 30
  • IV)An example of processor Remarks: DES algorithm can be broken Currently using AES or triple-DES
  • Slide 31
  • IV)An example of processor VeMiCry block:
  • Slide 32
  • IV)An example of processor RSA algorithm: Choose 2 prime numbers p and q. p q Compute n=p*q Compute (n) = (p-1)*(q-1) Choose a random RP integer e such that 1


View more >