Mifare cards come in two technologies: Classic Mifare with sector/block structure, and Desfire with a file system and greater security features like DES encryption. Desfire has enhanced memory sizes up to 8k, more files and applications per card, and supports DES and triple DES encryption. It allows up to 32 applications identified by Application IDs. DESfire implements cryptographic security through challenge-response authentication, data encryption for confidentiality, message signatures for integrity and non-repudiation. DES is a symmetric key algorithm that encrypts data in 64-bit blocks, with security increased using triple DES. DESfire supports public key algorithms for encryption/decryption and signing with hash functions like MD5 and SHA providing message
All you need to know about timber in just a single ppt with interesting slides. Hope it hlps! This ppt was created as the result of a teamwork with my classmates
A hollow core slab refers to a precast slab that is prepared using prestressed concrete. It is generally used in the construction of floors for high-rise apartments or multistorey buildings.
All you need to know about timber in just a single ppt with interesting slides. Hope it hlps! This ppt was created as the result of a teamwork with my classmates
A hollow core slab refers to a precast slab that is prepared using prestressed concrete. It is generally used in the construction of floors for high-rise apartments or multistorey buildings.
This is an introductory presentation regarding the issues in designing a campus network infrastructure. Unlike theoretical approaches, this presentation actually was used to describe some of the real configurations performed by Server Administrators and Network Managers. This is for an introductory audience with very little background in computer networks assumed.
The presentation covers the basics of packet forwarding and simplified architecture of the router. Additionally it explains what problem Cisco Express Forwarding (CEF) solves and how. At the end static routing is covered.
Delivered by Dmitry Figol, CCIE R&S #53592.
High Rise the most common word in Modern Architecture. Here we made a Report on Vertical Circulation and Services of a High rise. Hope this will help you to Design a High rise.
Pile foundation is important for construction of foundation where bearing capacity of soil is poor. Pile foundation is use for distribution of uneven load of superstructure.There are so many type of pile are use for construction. Here i present some of pile with suitable condition for construction and methods for construction.
Thank you.
This is an introductory presentation regarding the issues in designing a campus network infrastructure. Unlike theoretical approaches, this presentation actually was used to describe some of the real configurations performed by Server Administrators and Network Managers. This is for an introductory audience with very little background in computer networks assumed.
The presentation covers the basics of packet forwarding and simplified architecture of the router. Additionally it explains what problem Cisco Express Forwarding (CEF) solves and how. At the end static routing is covered.
Delivered by Dmitry Figol, CCIE R&S #53592.
High Rise the most common word in Modern Architecture. Here we made a Report on Vertical Circulation and Services of a High rise. Hope this will help you to Design a High rise.
Pile foundation is important for construction of foundation where bearing capacity of soil is poor. Pile foundation is use for distribution of uneven load of superstructure.There are so many type of pile are use for construction. Here i present some of pile with suitable condition for construction and methods for construction.
Thank you.
ACR128 Dualboost Contact and Contactless Smart Card Reader - product presentation by Advanced Card Systems Ltd. Feel free to visit www.acs.com.hk or www.acr128.com
NFC is a short range wireless RFID technology.
It is meant for applications where a physical touch –
or close to it – is required. This action ensures the
presence of a person and the intent to do something.
This technology is particularly interesting for payment, access and transport markets.
This seminar presents an overview of networking and local connectivity of Java ME platform: HTTP, Sockets, Datagrams, messaging, Bluetooth, serial and RFID.
This presentation introduces the Basics of Cryptography and Network Security concepts. Heavily derived from content from William Stalling's book with the same title.
Project consists of individual modules of encryption and decryption units. Standard T-DES algorithm is implemented. Presently working on to integrate DES with AES to develop stronger crypto algorithm and test the same against Side Channel Attacks and compare different algorithms.
This presentation consists of the Seminar, provided by me in the partial fulfillment of my Bachelors Degree in G B Pant Engineering College. Seminar included information about Encryption, Decryption, Cryptosystems and Authenticity in crytosystem.
The presentation covers the following:
Basic Terms
Cryptography
The General Goals of Cryptography
Common Types of Attacks
Substitution Ciphers
Transposition Cipher
Steganography- “Concealed Writing”
Symmetric Secret Key Encryption
Types of Symmetric Algorithms
Common Symmetric Algorithms
Asymmetric Secret Key Encryption
Common Asymmetric Algorithms
Public Key Cryptography
Hashing Techniques
Hashing Algorithms
Digital Signatures
Transport Layer Security
Public key infrastructure (PKI)
I hope You all like it. I hope It is very beneficial for you all. I really thought that you all get enough knowledge from this presentation. This presentation is about materials and their classifications. After you read this presentation you knowledge is not as before.
2. Mifare Has 2 type Technology :
• Mifare Sector/Block Card (Classic Mifare)
• Mifare Desfire (File System, More secured, fast & reliable) with Crypto
• DES (Data Encryption Standard )
• What is Crypto in Desfire Cards
3. The DESFire® platform is a memory technology like the Mifare Classic, but with
enhanced file handling and security features.
DESFire ® Platform Differences
MF3IC40 MF3IC21–EV1 MF3IC41-EV1 MF3 IC D80
Memory Size 4k 2k 4k 8k
Internal Use 256 bytes
Free Space 4096 bytes 2272 bytes 4832 bytes 7936 bytes
Max. Applications 28 28 28 28
Max. Files per Application 16 32 32 32
Crypto DES, TDES DES, TDES DES, TDES DES, TDES
Life 10 Years 10 years 10 Years 10 years
DESFire® AIDs
DESFire® allows up to 32 applications on a card. Every application has a three byte
Application Identifier (AID) by means of which it can be found and selected.
4. Cryptographic Security Implementation
• Authenticity
– implementation using challenge - response
• Confidentiality
– implementation using data encryption
• Integrity
– implementation using message signature
• Non-repudiation
– implementation using message signature
5. DES - Data Encryption Standard
• symmetrical key algorithm
• manipulate data in 8 bytes block
• only known attack is exhaustive key search,
2 to the power of 56 computations
• 2 million years for today’s PC @1ms per
computation or a few hours with special
designed hardware, parallel processing
• security can be increased using triple DES
6. Symmetrical Algorithm
• Symmetrical e.g. DES (or triple DES)
– good for many-to-one and one-to-one security for e.g.
bank customers , Personal Identification &
Verification
– simple key management (Public & Private)
– Cannot achieve non-repudiation
7. DES plain text, P
DES
Z=DES(K,P)
know K, P, can find Z easily
know K,Z, can find P easily
know P,Z, impossible to find
key, K
K except exhaustive search
-1
ciphered text,Z P=DES(K,Z)
-1
DES
8. DES / Triple DES
Single DES uses single length key (8 bytes), K(8)
3DES uses double length key (16 bytes), K(16) = KL(8)
| KR(8) or KA(8) | KB(8)
If the left and right part are the same, 3DES reduces
to single DES
Allows smooth migration from single DES to 3DES
Least significant bit of each byte not used
9. Triple DES
3-DES Encryption 3-DES Decryption
Plain Text Cipher Text
Left Key DES Left Key DES-1
Right key DES-1 Right key DES
Left Key DES Left Key DES-1
Ciphered Text Plain Text
Z=3DES(K,P) P=3DES-1 (K,Z)
10. MAC - Message Authentication Code Single DES
message
I.V. xor xor xor
key
DES DES DES
K
mac=MAC(Kmac,message)
11. MAC - Message Authentication Code Triple DES
message
I.V. xor xor xor
key
DES DES DES
K
-1
DES
DES
mac=3MAC(Kmac,message)
12. Hash
a cryptographic function
takes a variable length message
returns a fixed length hash value
also known as a Message Digest function
examples MD5(128 bits), SHA(160 bits)
analogous to a message finger print
no key is involved
usage - signature on message’s hash is as good as
signature on the message
13. Public Key Algorithm
each party gets a public key and a private (secret)
key which is unique
public key is published (free read access)
private key is secret (known only to the party)
public key is certified by a key certification body -
key certificate
the public key of the certification body is public
read access
14. Encryption Using Public Key Algorithm
Check receiver public key certificate with CA public key
Check public key revocation list
Generate random 3DES key
Encrypt message using 3DES
Encrypt 3DES Key using other party public key
Append encrypted 3DES key with encrypted message
Decryption Using Public Key Algorithm
Decrypt 3DES key using the private key
Use decrypted 3DES key to decrypt the message
15. Decryption Using Public Key Algorithm
Decrypt 3DES key using the private key
Use decrypted 3DES key to decrypt the message
16. Application
• Advanced public transportation
• High secure access control
• Event ticketing
• E-Government
• Identity Verification without Central connectivity
• E-Purse ( Canteen, Laundry & any payment)
Available file types
The files within an application can be any of the following types:
• Standard data files
• Backup data files
• Value files with backup
• Linear record files with backup
• Cyclic record files with backup