Presentation is loading. Please wait.

Presentation is loading. Please wait.

Applying Cryptography to Physical Security

Similar presentations


Presentation on theme: "Applying Cryptography to Physical Security"— Presentation transcript:

1 Applying Cryptography to Physical Security
Crypto-SmartLock Kevin J. D’Aquila Frank L. Gerratana Anthony P. Oteri Jeffrey A. Rosenberger Professor Michael J. Ciaraldi Professor R. James Duckworth Applying Cryptography to Physical Security

2 Crypto-SmartLock Secure Door Lock system Components Door Locks Keys
Central Management Computer

3 Goals of the project Create secure card lock system
Disconnected system using only Smart Cards for communication with doors Bridge the gap between centralized systems and manually programmed standalone systems

4 Problems with existing systems
Security issues Lack of convenience

5 Our Solution Have a centralized management computer, but do not wire it to locks All communication occurs through the Smart Card-based keys All communication and authentication secured using the Advanced Encryption Standard (AES)

6 Protocol The central server places “commands” for the doors onto cards
These commands provide functions such as adding users to doors

7 Crypto-SmartLock

8 Components Door System Keycards Key Management Software

9 Door Embedded system using low power Texas Instruments MSP430 Microcontroller Battery powered (annual replacement schedule) Stand-alone system

10 Door

11 Keycard ZeitControl BasicCard Smart Card
Chosen due to flexibility and speed of development Contains microcontroller and 8 kilobytes of program/data storage

12 Key Management Software
Runs on standard Windows PC Provides easy to use graphical user interface Allows the system administrator to manage users and door access permissions

13 Key Management Software

14 Usage Example System administrator grants a user access to a new door
Connects user’s keycard to central system The key management software generates a cryptographic key for authentication and places it on the card

15 Usage Example (continued)
Key management software generates a command instructing the door to add access for a specific user using a specific cryptographic key This command is encrypted and placed on the user’s keycard

16 Usage Example (continued)
When the user inserts their keycard in the door the first time, the door decrypts, authenticates, and processes the command The door then performs challenge-response authentication using the newly added cryptographic key, granting the user access

17 Accomplishments Designed secure communication protocol
Built prototype door hardware Developed the three necessary software components Key Management Software Door Software Keycard Software

18 Questions


Download ppt "Applying Cryptography to Physical Security"

Similar presentations


Ads by Google