brokerage 2007 presentation security

15
Information Security Ingrid Verbauwhede Danny De Cock

Upload: iminds

Post on 18-Dec-2014

419 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Brokerage 2007 presentation security

Information SecurityIngrid VerbauwhedeDanny De Cock

Page 2: Brokerage 2007 presentation security

2

Outline

Information security: we need it! Partners Competences within IBBT Illustrations

Page 3: Brokerage 2007 presentation security

3

IBBT focus areas

Every focus area needs information security! eHealth: patient data protection New Media: digital rights management & trusted

archiving eGovernment: secure identification & identity

managementeID cards and embedded biometry

Mobility: trusted communicationIn mobile terminals, in RFID devices

Other applications: eVoting, eCommerce, eBusiness, …

Page 4: Brokerage 2007 presentation security

4

Partners

Security requires a wide range of technologies: K.U.Leuven – COSIC

Computer Security and Industrial cryptography K.U.Leuven – Distrinet

Secure software K.U.Leuven – ICRI

Legal aspects U. Gent

Network security V.U.B

Multimedia security

Page 5: Brokerage 2007 presentation security

5

Expertise 1: fundamental research

Cryptographic algorithms and protocols Technologies for privacy and anonymity Chip cards and secure tokens Secure software and hardware obfuscation & side-channel

attacks Digital rights management, watermarking and perceptual

hashing Trusted computing Biometry Document security

Page 6: Brokerage 2007 presentation security

6

Key

Sch

edul

eround

.....

round

round

round

S S S S S S S S S S S S S S S S

S S S S S S S S S S S S S S S SMixColumns MixColumns MixColumns MixColumns

key length: 16/24/32 bytes block length:

Rijndael: 16/24/32 bytes AES: 16 bytes

Example: Rijndael/AES

Page 7: Brokerage 2007 presentation security

7

Expertise 2:Security for state of the art systems

Network security (fixed, ad-hoc and wireless) Embedded systems RFID and sensor nodes Ambient intelligence and pervasive

SIMSIMSIMSIM

Confidentiality

IdentificationIntegrity

Page 8: Brokerage 2007 presentation security

8

Example: secure embedded systems

Cipher Design,Biometrics

DQ

Vcc

CPUCrypto

MEM

JCAJava

JVM

CLK

DQ

Vcc

CPUMEM

JCAJava

KVM

CLK

Protocol: Wireless authentication protocol design

Algorithm: Embedded fingerprint matchingalgorithms, crypto algorithms

Architecture: Co-design, HW/SW, SOC

Circuit: Circuit techniques to combat sidechannel analysis attacks

Micro-Architecture: co-processor design

Identification

ConfidentialityIntegrity

SIM

Identification

ConfidentialityIntegrity

IdentificationIntegrity

SIMSIMSIM

Page 9: Brokerage 2007 presentation security

9

Example: Side channel analysis: EMA

Page 10: Brokerage 2007 presentation security

10

Expertise 3: Security for software platforms

Enterprise middleware & application servers Web services AAA (Authentication, Authorization, Access control)

services Identity and credential management Non repudiation services and accountability Time stamping and trusted archiving

Such research has for instance been conducted in the T-CASE project (see further).

Page 11: Brokerage 2007 presentation security

11

Expertise 4: Secure development

Analysis of security requirements Development process and certification Secure software architecture Software security Software verification and assurance

Such research has for instance been conducted in theIDEM project (https://projects.ibbt.be/idem)

Page 12: Brokerage 2007 presentation security

12

Expertise 5:Security management & deployment

Risk analysis Policy language and policy enforcement Architectures for monitoring and management Run-time verification Security infrastructures

Page 13: Brokerage 2007 presentation security

13

Demonstration:Belgian eID card & RFID Passport

Identity file Chip-specific:

Chip number Citizen-specific:

Name First 2 names First letter of 3rd first name RRN identification number Nationality Birth location and date Gender Noble condition Special status SHA-1 hash of citizen photo

Card-specific: Card number Validity’s begin and end date Card delivery municipality Document type

Digital signature on identity file issued byRRN

Citizen’s main address file Street + number Zip code Municipality

Digital signature on main address issued by RRN Citizen’s JPEG photo ~3 Kbyte

Belgian citizen or child, European community citizen, non-Belgian citizen or child, European community citizen, non-European community citizen, bootstrap card,European community citizen, bootstrap card,habilitation/machtigings cardhabilitation/machtigings card

No status, white cane (blindNo status, white cane (blindpeople), yellow cane (partiallypeople), yellow cane (partiallysighted people), extended minority,sighted people), extended minority,any combinationany combination

King, Prince, Count, Earl, Baron,King, Prince, Count, Earl, Baron,……

Page 14: Brokerage 2007 presentation security

14

To illustrate the approach: 4 projects

4 projects demonstrated in the back of the room

ISBO – QOE: (security part of it): anonymous Voice overIP

IPEA (security part of it): format compliant encryption ofvideo stream

TCASE – Technologies and Capabilities for ServiceEnabling

EHIP – E-Health Information Platforms

Page 15: Brokerage 2007 presentation security

Thank you!