Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Research Paper


Published on

  • Be the first to comment

  • Be the first to like this

Research Paper

  1. 1. Presented By Poongkuzhali Dhanasekaran Secure User Interface I'am not scared of my system security, becoz my system is secured by secure user interface We are hackers
  2. 2. Agenda Introduction Maxims Design Uses
  3. 3. What is secure user interface? <ul><li>Secure user interface is a security mechanism designed to provide security for device usage and device hardware. </li></ul>
  4. 4. What are the maxims behind design? <ul><li>Interface that is subject to observation must be secured. </li></ul><ul><li>Hardware details must be unobservable. </li></ul><ul><li>The device must not contain any useful functions unless a valid user is present </li></ul>
  5. 5. What do they authenticate User? <ul><li>Biometric information (finger-print) was used to authenticate user. </li></ul><ul><li>Conversion of finger print to digital image is done in enrollment stage. </li></ul><ul><li>Search for match is done in Identification stage. </li></ul><ul><li>Comparison is done in verification stage. </li></ul>
  6. 6. What do they do in verification stage? <ul><li>Authenticate iButton which carries secure data to communication platform and also authenticate user to iButton that they carry. </li></ul><ul><li>Download fingerprint from iButton and send to Secugen FDA01 module for verification. </li></ul>
  7. 7. How do they achieve maxims 1 & 2? <ul><li>The tokens were created in the form of java iButton with 128KB of memory. </li></ul><ul><li>Rugged container were designed, which can erase the content in iButton if opened. </li></ul><ul><li>Information (token) is passed from iButton to system processing element through secure communication channel. </li></ul>
  8. 8. How do they design a secure communication channel? <ul><li>Public key encryption system is used which uses RSA encryption. </li></ul><ul><li>In RSA encryption one key is public and other key is private. </li></ul><ul><li>Enormous care is involved in designing private key, because the safety of the private key is the key factor in RSA encryption. </li></ul>
  9. 9. How do they design private key? <ul><li>Designed as n-byte block </li></ul><ul><li>First 2bytes were tag </li></ul><ul><li>The tag is followed by 8-byte random number </li></ul><ul><li>The random number is followed by 10-byte message. </li></ul>
  10. 10. What is the special technique used to achieve maxim 3? <ul><li>Field programmable gate array (FPGA) is used. </li></ul><ul><li>FPGA remains as a simple piece of hardware without any functional details until a valid user enters the system. </li></ul><ul><li>So maxim 3 is achieved by securing FPGA configuration. FPGA is designed on SLAACI-V reconfiguration computing board. </li></ul>
  11. 11. What is SLAACI-V? <ul><li>SLAACI-V is a reconfigurable computing board. </li></ul><ul><li>Contains X0, X1 and X2 module with 10 independent on-board SRAM memory. </li></ul><ul><li>SRAM contains user bit stream in encrypted form </li></ul><ul><li>X0 is the Security management system . </li></ul><ul><li>X1 and X2 are responsible for functional data processing operation. SRAM memory shares its content with X1 and X2. </li></ul>
  12. 12. What are the other components SLAACI-V board? <ul><li>There are four components on the board. They were </li></ul><ul><ul><ul><li>FPGA Programmer </li></ul></ul></ul><ul><ul><ul><li>User authentication unit </li></ul></ul></ul><ul><ul><ul><li>Network interface </li></ul></ul></ul><ul><ul><ul><li>Configuration manager with decryption unit and bit stream table memory. </li></ul></ul></ul>
  13. 13. What are the design Constrains behind decryption unit and bit stream table memory? <ul><li>Hardware of Blowfish is used to encrypt or decrypt up to 35.5 Mbits/sec. </li></ul><ul><li>Custom designed table is used with identification tag, decryption key, bit stream memory address range, partial bit stream indicator and status flag. </li></ul><ul><li>Data can be retrieved or decrypted only with valid entries in all the above specified fields. The user authentication unit and control register in X0 of SLAACI-V is capable of modifying the content in the table. </li></ul>
  14. 14. What is the use of secure user interface in Distributed sensor network? <ul><li>Distributed sensor network is used in the battle field. </li></ul><ul><li>In field operation this system can easily fall into enemy's hand. </li></ul><ul><li>But by the use of secure user interface the device will become useless (does not have any useful functions without a valid user) in the enemy's hand. </li></ul>
  15. 15. Conclusion <ul><li>Thus when implemented properly, secure user interface not only provides security for data flowing through a system but also protects the intellectual properties embedded in that system. </li></ul>
  16. 16. I'am not scared of my system security, becoz my system is secured by secure user interface We are hackers