10-Biometrics-Lecture2-Day3-11-00-12-30

10-Biometrics-Lecture2-Day3-11-00-12-30 - Basic...

Info icon This preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
Basic Cryptography Application to Machine Readable Travel Documents Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE http://lasecwww.epfl.ch/ SV 2007 crypto mrtd EPFL 1 / 88
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1 Introduction to Cryptography 2 Conventional Cryptography 3 Asymmetric Cryptography 4 All Together Now: ICAO-MRTD SV 2007 crypto mrtd EPFL 2 / 88
Image of page 2
1 Introduction to Cryptography 2 Conventional Cryptography 3 Asymmetric Cryptography 4 All Together Now: ICAO-MRTD SV 2007 crypto mrtd EPFL 3 / 88
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1 Introduction to Cryptography Defining Cryptography Cryptographic Primitives 2 Conventional Cryptography 3 Asymmetric Cryptography 4 All Together Now: ICAO-MRTD SV 2007 crypto mrtd EPFL 4 / 88
Image of page 4
Example of Critical Application SV 2007 crypto mrtd EPFL 5 / 88
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Requirements strong bidirectional authentication confidentiality of communications integrity of communication need not the client part to be strongly secure SV 2007 crypto mrtd EPFL 6 / 88
Image of page 6
Cryptography = Science of Information and Communication Security Entered in mass product markets quite recently secure communication bank cards, wireless telephone, e-commerce, pay-TV access control car lock systems, ski lifts payment prepaid phone cards, e-cash logistic & supply chains RFID, machine readable passports SV 2007 crypto mrtd EPFL 7 / 88
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
A Science of Malice in Communication Technologies how to abuse an information security system? how to model malicious adversaries? how to reduce to well known puzzle problems? SV 2007 crypto mrtd EPFL 8 / 88
Image of page 8
1 Introduction to Cryptography Defining Cryptography Cryptographic Primitives 2 Conventional Cryptography 3 Asymmetric Cryptography 4 All Together Now: ICAO-MRTD SV 2007 crypto mrtd EPFL 9 / 88
Image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cryptographic Primitives functionality security componants cryptographic primitive componants : algorithms, protocols, ... functionality : possible use in honest environment security : impossible use in malicious environment SV 2007 crypto mrtd EPFL 10 / 88
Image of page 10
Basics on Communication Security Send message Receive message a45 a45 a11 a21 Adversary Authentication : only the legitimate sender can send Integrity : the received and sent messages must be the same Confidentiality : only the legitimate receiver can read SV 2007 crypto mrtd EPFL 11 / 88
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
A Few Cryptographic Primitives Conventional hash function symmetric encryption message authentication code Asymmetric key agreement protocol public-key cryptosystem digital signature SV 2007 crypto mrtd EPFL 12 / 88
Image of page 12
1 Introduction to Cryptography 2 Conventional Cryptography 3 Asymmetric Cryptography 4 All Together Now: ICAO-MRTD SV 2007 crypto mrtd EPFL 13 / 88
Image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1 Introduction to Cryptography 2 Conventional Cryptography Symmetric Encryption Hash Function Message Authentication Code Secure Channel 3 Asymmetric Cryptography 4 All Together Now: ICAO-MRTD SV 2007 crypto mrtd EPFL 14 / 88
Image of page 14
Confidentiality Generator a54 Key Key a54 CONFIDENTIAL a45 Message Encrypt a45 a45 Decrypt a45 Message a11 a21 Adversary SV 2007 crypto mrtd EPFL 15 / 88
Image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Symmetric Encryption Primitive functionality security componants cryptographic primitive componants : algorithms Encrypt, Decrypt, Generator functionality : Decrypt K ( Encrypt K ( x )) = x
Image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern