Security and Cryptography at NXP
Ventzislav Nikov NXP Semiconductors Research Laboratory Leuven Center of Competence System Security and DRM 29.05.2008
Security and Cryptography at NXP Ventzislav Nikov NXP - - PowerPoint PPT Presentation
Security and Cryptography at NXP Ventzislav Nikov NXP Semiconductors Research Laboratory Leuven Center of Competence System Security and DRM 29.05.2008 Outline Products Domains, Telematics, Product Security Cryptography
Ventzislav Nikov NXP Semiconductors Research Laboratory Leuven Center of Competence System Security and DRM 29.05.2008
2
3
4
Mobile and Personal Home Automotive and Identification
5
Security
User Interface
(USB headsets)
Multimedia Processing
Cellular Pipe
Telecom Software
Connectivity Pipes
Broadcast Pipes
6
internet
Content server Rights manager license server
Acquisition License and Content Transfer License and Content Storage Streaming
7
8
Transactions Payment everywhere: Mobile phone = POS Transactions Access to public transport: Mobile phone = transport card Transactions Access Control: Mobile phone = key Connectivity Exchange information Mobile phone = electronic business card Service Discovery Take info from poster: Mobile phone = ticket counter Transactions Micro-payments: Mobile phone = debit card
9
10
Transport & payment card
Secure Positioning Secure Payment Secure ID Secure Services Secure Physical Link
11
Car Identification Privacy OBU Active Secure Payment Positioning Secure
M a n u f a c t u r i n g R e g i s t r a t i
A c t i v a t i
T e r m i n a t i
D i a g n
t i c Secure Software Secure Communication Root of Trust
12
Police Checks Checkpoints
Car Sensors (odometer, gauge, tachymeter…) GSM Trilateration OBU Compass, accelerometer…
Smart Roads
13
Road Price Operator Government
Network Operator Family 3rd-Parties
14
15
16
– Requirements – Architecture – Specification and Design – Implementation – Testing + [Certification] – Maintenance
– Cost-effectiveness – User friendliness
Plan Check Act Do
17
18
– Secure Manufacturing – Application security – Platform security – Hardware security – …
and renewal/revocation)
19
20
21
22
23
24
Cryptographic Algorithms AES, SHA, RSA Cryptographic Primitives CBC mode, HMAC, Digital signatures Security Protocols SSL, IPSec, DTCP, OCSP Secure Services PKI, DRM, Timestamping
Few, Generic and Mathematically secure Many, Ad hoc, Complex, Multiple compromises
Cryptographic Protocols Key Establishment, Distributed Computing
25
26
27
28
29