K.U.Leuven ESAT/SCD/COSIC Computer Security and Industrial - - PowerPoint PPT Presentation

k u leuven esat scd cosic
SMART_READER_LITE
LIVE PREVIEW

K.U.Leuven ESAT/SCD/COSIC Computer Security and Industrial - - PowerPoint PPT Presentation

K.U.Leuven ESAT/SCD/COSIC Computer Security and Industrial Cryptography Danny De Cock Danny.DeCock@esat.kuleuven.be Katholieke Universiteit Leuven/Dept. Elektrotechniek (ESAT) Computer Security and Industrial Cryptography (COSIC) Kasteelpark


slide-1
SLIDE 1

K.U.Leuven ESAT/SCD/COSIC

Computer Security and Industrial Cryptography

Danny De Cock

Danny.DeCock@esat.kuleuven.be

Katholieke Universiteit Leuven/Dept. Elektrotechniek (ESAT) Computer Security and Industrial Cryptography (COSIC) Kasteelpark Arenberg 10 B-3001 Heverlee Belgium

slide-2
SLIDE 2

June 2005 2

ESAT/SCD-COSIC

!SCD Chief: Prof. Dr. Joos Vandewalle !COSIC chiefs: Prof. Bart Preneel, Dr. Ingrid Verbauwhede !Contact data:

"Kasteelpark Arenberg 10, B-3001 Leuven (Belgium) "Telephone: +32-(0)16 321148 "Fax: +32(0)16 321969 "Email: bart.preneel@esat.kuleuven.be "Website: http://www.esat.kuleuven.be/cosic

slide-3
SLIDE 3

Research: Protocols & Applications

Mission statement: Creating electronic equivalent of the real world:

"

confidentiality, digital signature, anonymity, privacy, payments, non-repudiation, digital right managements, elections

!

Technologies:

"

key management: ad hoc networks, PKI, group keying

"

anonymous communications and services

"

software tamper resistance and obfuscation

"

software agents

"

trusted systems: TCG/NGSCB, TPM…

"

e-document security and XML: XADES

!

Applications:

"

electronic payments, e-commerce, m-commerce and secure e-banking

"

e-government: electronic ID card

"

electronic voting: Cybervote

"

securing mobile and wireless communications: UMTS, WLAN, PAN….

"

ambient intelligence

slide-4
SLIDE 4

June 2005 4

Applications

Privacy & Anonymity Identity Management Trusted Platforms Embedded Systems Digital Rights Management Software Obfuscation Security in Wireless and Ad Hoc Networks Document Security Archiving

slide-5
SLIDE 5

June 2005 5

Relevant Projects & Study

!

Identity management:

"

EU/IST/FIDIS – Future of Identity in the Information Society

"

EU/IST/PRIME – Privacy and Identity Management in Europe

"

EU/MODINIS/ModinisIDM – Study on Identity Management in e-government of the European Member States

! With Lawfort (B) and A-SIT (AT)

!

Applications:

"

EU/IST/GST – Global System for Telematics

"

EU/IST/TEAHA – The European Home Alliance

"

B/IWT/ADAPID – Advanced Applications of Electronic Identity Cards

"

B/IBBT/IDEM – Identity Management Systems for Federal and Flemish eGovernment

"

B/IBBT/INDEX – Inter-governmental Data Exchange between Federal and Flemish Administrations

"

B/IBBT/IPEA – Innovative Platform for Electronic Archiving

slide-6
SLIDE 6

Date : June, 2004 Location : Athens, Greece Authors : Danny De Cock, K.U.Leuven

Security Challenges for Current & Future Systems

slide-7
SLIDE 7

June 2005 7

TEAHA Devices

!

Merloni Washing Machine

"

Ultra-low cost power line connection

"

TEAHA Smart Adapter

!

Zigbee/EHS/KNX/Bluetooth

!

Ultra-low cost power line connection

!

Residential Gateway

"

OSGi framework

"

Zigbee/EHS/KNX

"

Ethernet / Wifi / ADSL

!

EDF Power Meter

"

Serial line interface

!

Telefonica Back-End

"

OSGi based platforms for Aggregating services

"

Content and Service Provision/Service Aggregator

Multimedia Cluster Energy mgt Cluster ULC PLC EHS Zigbee Bluetooth UPnP RS232 Household Appliance Cluster Service Provider

slide-8
SLIDE 8

June 2005 8

Different Security Approaches

Based on implementation complexity and cost:

!

No security mechanisms

!

Non-cryptographic techniques (e.g., CRC, hardware enclosures,…)

!

Combine all of the above with cryptographic techniques Different security levels protect data in transit and persistently:

!

Ignore data protection

!

Protect data integrity and/or its confidentiality Different security layers to provide:

!

End-to-End security for users and applications

!

Point-to-Point secure communications

slide-9
SLIDE 9

June 2005 9

TEAHA devices Residential Gateway

State of the Art Security Features

Remote User

Any Network Any Network

!

Secure Zero-configuration

"

Simple hierarchy of devices, users, service providers

"

Seamless interoperability and interaction with other devices

"

Initialization of security parameters during device and service discovery

"

Implicit asset protection of registered TEAHA devices

!

Remote management of security parameters, software, users,…

#

Minimizes maintenance costs

#

Suited for a highly dynamic client-service architecture

!

Simple and modular security mechanisms

#

Ideal and easy to understand and verify

!

Delegation of critical operations to a security module

#

Isolation of security features from non-critical code

!

Policy-based access to (home) network

#

Increased network privacy through transparent access control

slide-10
SLIDE 10

June 2005 10

Installation of a User PC and Internet Gateway

!

A User PC and Internet Gateway receive their proof of registration

!

The Internet Gateway may be a service provided by the residential gateway, these services have been logically separated Neighbor Apartment

Registry Residential Gateway Wash Washing Machine

Ping Ping Ping Ping

Registration Proof SMWM Registration Proof SMRG Wash Washing Machine Registry Residential Gateway

Ping Ping Ping Ping

Registration Proof SMRG’ Registration Proof SMWM’ GUI User PC Registration Proof SMUPC Routing Internet Gateway Registration Proof SMIG

slide-11
SLIDE 11

June 2005 11

Device 2

Layered Security Architecture

Residential Gateway

Secure Communications Tunnel

Device 1

Application Data

Application Data Securely Exchanged between Device 1 and 2 Store and Forward of Application Data, Allows for Heterogeneous Security Mechanisms Application Data Converter, Point to Point Secure Communications

Security Module

Device Intelligence Device Intelligence Device Intelligence

Hardware Component (optional)

secure confidential authenticate insecure

slide-12
SLIDE 12

June 2005 12

Embedded Security

Multimedia Cluster

Service Providers Applications Devices

Household Appliance Cluster Safety Cluster

Users

End-to-End Security Point-to-Point Security

slide-13
SLIDE 13

June 2005 13

Pay Per Use Washing Machine

  • 1. Machine runs out of credit

!

Loading new coins initiated/approved by washing machine user

!

Secure Smart Adapter acts as a protective shell around the machine

!

End to end security:

"

Service Provider validates request authenticated by Secure Smart Adapter

"

Secure Smart Adapter validates response from Service Provider

  • 2. Service Provider checks on the washing machine’s state

!

Triggered from non-home environment, e.g., Service Provider

!

Enters the home environment through a Residential Gateway

!

Request finds its way to the washing machine Secure Smart Adapter

!

Adapter processes the request and forwards it

"

Challenge-response query

!

Response is sent back through the same path

Internet

Pay Per Use Washing Machine Service Provider

slide-14
SLIDE 14

June 2005 14

Secure Registry Discovery and Service Registration/Rejection

A Registry registers the new services New Device New Device Registry Search Device searches a registry Registry Registry Registry Registry Registry Registry The new device can only operate as a true TEAHA device if a Registry approves its existence

1 2 3 4

Existing TEAHA Device Existing TEAHA Device Existing TEAHA Device Existing TEAHA Device Existing TEAHA Device Existing TEAHA Device Optional: Go away – you do not exist!! Hi, I am new around here, could you help me?

a b c d

slide-15
SLIDE 15

June 2005 15

Registry Registry

Secure Service Discovery of TEAHA Devices

D1 D1 Service Query Data Transfer Direct Service Selection Secure P2P Discovery and Usage D2 D2

5 6 5 6

Optionally Through Security Tunnel

1 2 3 4 5 6 5 6

Ping Pong Data Transfer

slide-16
SLIDE 16

June 2005 16

Questions?

TEAHA http://www.teaha.org Myself

Danny.DeCock@esat.kuleuven.be http://www.esat.kuleuven.be/~decockd

key words: “godot TEAHA”