Projects on digital identification at MTA SZTAKI Ottó Hutter MTA SZTAKI.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Principles of Information Security, 2nd edition1 Cryptography.
Secure Teleradiology Nick Collett Brookside Consulting
PIV Data Model Testing Ketan Mehta March 3, 2006.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
ECE Lecture 1 Security Services.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Module 9: Fundamentals of Securing Network Communication.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Some Perspectives on Smart Card Cryptography
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 7: Cryptographic Systems
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Potential vulnerabilities of IPsec-based VPN
1 Thuy, Le Huu | Pentalog VN Web Services Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
/ 8 FEIDHE Electronic Identification in Finnish Higher Education Janne Kanner FEIDHE Electronic Identification in Finnish Higher Education.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Innovation is Our Passion Online Banking Past, Present and Future.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Biometric technology.
Install AD Certificate Services
COEN 351 Authentication.
Presentation transcript:

Projects on digital identification at MTA SZTAKI Ottó Hutter MTA SZTAKI

Projects on digital identification at MTA SZTAKI Lectures on cryptography and its application Experiences with some practical tools General purpose identification system with high reliability Link collection at startlap

Lectures on cryptography and its application Overview of the public key cryptography Cryptographic algorithms Cryptographic protocols International standards The Hungarian regulation Biometrics

Overview of the public key cryptography public key encryption digital signature theory concepts examples

Cryptographic algorithms Algebric/arithmetic algorithms in cryptography Choice of the parameters of public key cryptosystems Comparison of ECC and RSA Grid reduction in cryptoanalysis

Cryptographic protocols Protocols and their deficiencies SSL Kerberos

International standards Huge number of standards ANSI, NIST, RSA Laboratories, ITU, ISO, IETF, EESSI, SECG...

The Hungarian regulation The law on the digital signature Its effect on the Hungarian PKI systems The situation of certificate authorization in Hungary

Biometrics fingerprint handwriting voice iris hand geometry face ear typing

Experiences with some practical tools Systemguard Icon Hydra

Systemguard

Guardware Systems Fingerprint recognition One-touch computer/network logon Published API to support integration PC-connected optical scanner Optional smart card or proxy card reader Encrypted communication between the device and the connected computer

Icon Hydra Sclumberger smart card On-board key generation RSA, DES, 3DES, SHA-1, MD5 support ISO 7816 standard PC/SC, PKCS#11 integrated

Icon Hydra Microsoft Windows 2000 built-in PKI support logon secure RAS VPN digital signature data encryption secure web access

General purpose identification system with high reliability IKTA project Integration of digital signature, smart card technology and biometrics Handheld identification equipment Online and off-line identification

Link collection at startlap Overview Hungarian law and recommendations Cryptographic algorithms Cryptographic protocols Development tools Presentations Certification authorities Public key infrastructure

Link collection at startlap Products, applications Organizations, laboratories Biometrics International standards and recommendations Chipcards Link collections Conferences, seminars

Links fia.html e-alairas.lap.hu/