CICRET
Swaroop Koshy Mathew
MCA, Macfast
What is Cicret?
Cicret is the combination of two products with a
single idea:
>>to give you complete control
Two Products:
a) Cicret App
b) Cicret Bracelet
Cicret Application
It’s a secure and free solution for those who want to :
a) Chat
b) Share
c) Safe Exchange of data
d) Untraceable
e) Cryptic Message
Available on ANDROID
Cicret Bracelet
Makes your skin a new touchscreen.
- Reads your mail
- Play music
- Answer your calls
- Check Weather etc…
Use it anytime, anywhere..
Sixth Sence Technology
Developed By:
Pranav Misra : Indian
Cicret Connection
Cicret Bracelet - Components
Cicret Bracelet – Components
*Accelerometer
Most commonly found on drones for flight stabilization
Cicret Bracelet – Components
*Micro USB port
Exchange information between the system & bracelet.
Data to be exchanged includes :
- Images & Videos
- Documents etc…
Cicret Bracelet – Components
*Proximity Sensor
Emits electromagnetic field/ beam
Looks for change in field/return signal
When hand placed : stops one of the 8 sensor and sends
information back to the processor
Cicret Bracelet – Components
*Pico Projector
Cicret Bracelet - Components
Cicret – Working
Step 1 : Download Cicret
Step 2 : ID Generation
Step 3 : AES Key Generation
Step 4 : Encrypted Communication
Cicret – Working
AES
- Advanced Encryption Standard
- Established by US NIST
- Cicret uses AES-256 encryption -> 2256 possible keys
Block Size : 4
Key Length : 32 bytes
No. Rounds : 14
- 14 rounds of encryption performed
- Use Symmetric Block Cipher
- Cipher?
- Symmetric Block Cipher?
Cicret – Working
Single Round consists of 4 Stages:
a) Add Round Key
b) Substitute Bytes
c) Shift Rows
d) Mix Columns
Since 14 rounds are used, 14 times these 4 stages are
performed one after the other sequentially.
Cicret – Working
AES – 128
- uses 128 bit block
- represented in 4X4 matrix
- 1 word = 16 bytes
Cicret – Working
AES - 128
Encryption & Decryption
Cicret – Working
Stage 1 : Add Round Key
Fig: Round Key Transformation
Cicret – Working
Stage 2 : Substitute Bytes
Fig: Substitute Byte Transformation
Cicret – Working
Stage 3 : Shift Row
Fig: Shift Row Transformation
Cicret – Working
Stage 4 : Mix Column
Fig: Mix Column Transformation
Cicret – Working
Fig: aesencryption.net
Cicret – Working
RSA Key generation
- Creators : Rivest, Shamir, Adleman
- Follows asymmetric cryptography
- Asymmetric cryptography?
- Public & Private Keys?
- Unique RSA key generated
each time when data is
exchanged with server.
Thank You!!
[ Links ]
www.cicret.com
https://www.youtube.com/watch?v=9J7GpVQCfms
Prepared & Presented By:
Swaroop Koshy Mathew, Macfast
Tiruvalla, Kerala
2015 JAN

Cicret PPT