SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Information Security
      Ingrid Verbauwhede
      Danny De Cock
Outline


 Information security: we need it!
 Partners
 Competences within IBBT
 Illustrations




                                      2
IBBT focus areas


Every focus area needs information security!
    eHealth: patient data protection
    New Media: digital rights management & trusted
     archiving
    eGovernment: secure identification & identity
     management
       eID cards and embedded biometry
    Mobility: trusted communication
       In mobile terminals, in RFID devices
Other applications:
    eVoting, eCommerce, eBusiness, …
                                                      3
Partners

Security requires a wide range of technologies:
 K.U.Leuven – COSIC
   Computer Security and Industrial cryptography
 K.U.Leuven – Distrinet
   Secure software
 K.U.Leuven – ICRI
   Legal aspects
 U. Gent
   Network security
 V.U.B
   Multimedia security

                                                   4
Expertise 1: fundamental research

 Cryptographic algorithms and protocols
 Technologies for privacy and anonymity
 Chip cards and secure tokens
 Secure software and hardware obfuscation & side-channel
  attacks
 Digital rights management, watermarking and perceptual
  hashing
 Trusted computing
 Biometry
 Document security


                                                        5
Example: Rijndael/AES

                        S S S S S S S S S S S S S S S S
               round
Key Schedule



               round    S S S S S S S S S S S S S S S S
                        MixColumns MixColumns MixColumns MixColumns


               round    key length: 16/24/32 bytes
                        block length:
                 .
                 .
                 .          Rijndael: 16/24/32 bytes
                 .
                 .          AES: 16 bytes
               round



                                                                6
Expertise 2:
 Security for state of the art systems


 Network security (fixed, ad-hoc and wireless)
 Embedded systems
 RFID and sensor nodes
 Ambient intelligence and pervasive

                           Confidentialit
                                 y
                           Identification
                             Integrity
                  SIM
                  SIM




                                                  7
Example: secure embedded systems



          Confidentiality
            Integrity       Protocol: Wireless authentication protocol
          Identification             design
   SIM


         Cipher Design,     Algorithm: Embedded fingerprint matching
          Biometrics
                                     algorithms, crypto algorithms
              Java
               JCA          Architecture: Co-design, HW/SW, SOC
               KVM
               JVM

         CPU
                   Crypto   Micro-Architecture: co-processor design
         MEM
             Vcc


               D
                  Q         Circuit: Circuit techniques to combat side
               CLK
                                      channel analysis attacks


                                                                   8
Example: Side channel analysis: EMA




                                      9
Expertise 3: Security for software platforms


 Enterprise middleware & application servers
 Web services
 AAA (Authentication, Authorization, Access control)
  services
 Identity and credential management
 Non repudiation services and accountability
 Time stamping and trusted archiving

 Such research has for instance been conducted in the T-
  CASE project (see further).

                                                        10
Expertise 4: Secure development


 Analysis of security requirements
 Development process and certification
 Secure software architecture
 Software security
 Software verification and assurance

 Such research has for instance been conducted in the
  IDEM project (https://projects.ibbt.be/idem)




                                                         11
Expertise 5:
 Security management & deployment


 Risk analysis
 Policy language and policy enforcement
 Architectures for monitoring and management
 Run-time verification
 Security infrastructures




                                                12
Demonstration:
     Belgian eID card & RFID Passport
   Identity file                                          Citizen’s main address file
       Chip-specific:                                        Street + number
                                                              Zip code
            Chip number                                      Municipality
        Citizen-specific:                                 Digital signature on main address issued by RRN
              Name                                        Citizen’s JPEG photo ~3 Kbyte
              First 2 names
              First letter of 3rd first name
              RRN identification number                                 King, Prince, Count, Earl, Baron,…
                                                                                                    Baron,…
              Nationality
                                                                         No status, white cane (blind
              Birth location and date                                   people), yellow cane (partially
              Gender                                                    sighted people), extended minority,
              Noble condition                                           any combination
              Special status
              SHA-1 hash of citizen photo
        Card-specific:
              Card number
              Validity’s begin and end date
              Card delivery municipality
              Document type
   Digital signature on identity file issued by
    RRN
                                                   Belgian citizen or child, European community citizen, non-
                                                   European community citizen, bootstrap card,
                                                   habilitation/machtigings card                                13
To illustrate the approach: 4 projects


 4 projects demonstrated in the back of the room

 ISBO – QOE: (security part of it): anonymous Voice over
  IP
 IPEA (security part of it): format compliant encryption of
  video stream
 TCASE – Technologies and Capabilities for Service
  Enabling
 EHIP – E-Health Information Platforms



                                                               14
Thank you!

Contenu connexe

Tendances

E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorIJSRED
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeRehan Guha
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
K binkowski metody_uwierzytelnienia_windows_7
K binkowski metody_uwierzytelnienia_windows_7K binkowski metody_uwierzytelnienia_windows_7
K binkowski metody_uwierzytelnienia_windows_7Krzysztof Binkowski
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteitStichting ePortfolio Support
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificateKumkum Sharma
 
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolNovel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolCSCJournals
 

Tendances (10)

E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print Sensor
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable Barcode
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
K binkowski metody_uwierzytelnienia_windows_7
K binkowski metody_uwierzytelnienia_windows_7K binkowski metody_uwierzytelnienia_windows_7
K binkowski metody_uwierzytelnienia_windows_7
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificate
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolNovel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication Protocol
 

En vedette

03 Bart De Nil Situering Erfgoed 2 0
03  Bart De Nil   Situering Erfgoed 2 003  Bart De Nil   Situering Erfgoed 2 0
03 Bart De Nil Situering Erfgoed 2 0imec.archive
 
Mark Sterns : entrepreneurship and faithfulness
Mark Sterns : entrepreneurship and faithfulnessMark Sterns : entrepreneurship and faithfulness
Mark Sterns : entrepreneurship and faithfulnessmicahdavis
 
Ecrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud PaperEcrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud Paperimec.archive
 
Tr@Ins7 Heterogeneous Access Daan Pareit
Tr@Ins7 Heterogeneous Access   Daan PareitTr@Ins7 Heterogeneous Access   Daan Pareit
Tr@Ins7 Heterogeneous Access Daan Pareitimec.archive
 
Brokerage2006 beheer van volgende generatie telecom services
Brokerage2006 beheer van volgende generatie telecom servicesBrokerage2006 beheer van volgende generatie telecom services
Brokerage2006 beheer van volgende generatie telecom servicesimec.archive
 
Grid07 4 Tzannetakis
Grid07 4 TzannetakisGrid07 4 Tzannetakis
Grid07 4 Tzannetakisimec.archive
 
Lab 20x20
Lab 20x20Lab 20x20
Lab 20x20hetlab
 
Brokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusionBrokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusionimec.archive
 
I Minds2009 Health Decision Support Prof Bart De Moor (Ibbt Esat Ku Leuven)
I Minds2009 Health Decision Support  Prof  Bart De Moor (Ibbt Esat Ku Leuven)I Minds2009 Health Decision Support  Prof  Bart De Moor (Ibbt Esat Ku Leuven)
I Minds2009 Health Decision Support Prof Bart De Moor (Ibbt Esat Ku Leuven)imec.archive
 
Blogging for MSc in Biomedical Informatics
Blogging for MSc in Biomedical InformaticsBlogging for MSc in Biomedical Informatics
Blogging for MSc in Biomedical InformaticsRikaz Sheriff
 
Breakout Collaboration tools - Kris Naessens
Breakout Collaboration tools - Kris NaessensBreakout Collaboration tools - Kris Naessens
Breakout Collaboration tools - Kris Naessensimec.archive
 
M. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICT
M. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICTM. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICT
M. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICTimec.archive
 
Qo E E2 E5 User Centric Approach Katrien De Moor
Qo E E2 E5   User Centric Approach   Katrien De MoorQo E E2 E5   User Centric Approach   Katrien De Moor
Qo E E2 E5 User Centric Approach Katrien De Moorimec.archive
 
Cloudeo Quick Guide: Social Media
Cloudeo Quick Guide: Social MediaCloudeo Quick Guide: Social Media
Cloudeo Quick Guide: Social MediaCloudeo Oy
 
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...imec.archive
 
Crsm 6 Crsm 2009 Filip Louagie The Flemish Cognitive Radio Research Cluster
Crsm 6 Crsm 2009   Filip Louagie   The Flemish Cognitive Radio Research ClusterCrsm 6 Crsm 2009   Filip Louagie   The Flemish Cognitive Radio Research Cluster
Crsm 6 Crsm 2009 Filip Louagie The Flemish Cognitive Radio Research Clusterimec.archive
 
Analyse Gent M #11 & Launch Startup Garage
Analyse Gent M #11 & Launch Startup GarageAnalyse Gent M #11 & Launch Startup Garage
Analyse Gent M #11 & Launch Startup Garageimec.archive
 
Maduf05 Interactivity Tom Paridaens
Maduf05 Interactivity   Tom ParidaensMaduf05 Interactivity   Tom Paridaens
Maduf05 Interactivity Tom Paridaensimec.archive
 
Presentation Powerpoint
Presentation PowerpointPresentation Powerpoint
Presentation Powerpointadberb3
 

En vedette (20)

03 Bart De Nil Situering Erfgoed 2 0
03  Bart De Nil   Situering Erfgoed 2 003  Bart De Nil   Situering Erfgoed 2 0
03 Bart De Nil Situering Erfgoed 2 0
 
Mark Sterns : entrepreneurship and faithfulness
Mark Sterns : entrepreneurship and faithfulnessMark Sterns : entrepreneurship and faithfulness
Mark Sterns : entrepreneurship and faithfulness
 
Ecrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud PaperEcrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud Paper
 
Tr@Ins7 Heterogeneous Access Daan Pareit
Tr@Ins7 Heterogeneous Access   Daan PareitTr@Ins7 Heterogeneous Access   Daan Pareit
Tr@Ins7 Heterogeneous Access Daan Pareit
 
Brokerage2006 beheer van volgende generatie telecom services
Brokerage2006 beheer van volgende generatie telecom servicesBrokerage2006 beheer van volgende generatie telecom services
Brokerage2006 beheer van volgende generatie telecom services
 
Grid07 4 Tzannetakis
Grid07 4 TzannetakisGrid07 4 Tzannetakis
Grid07 4 Tzannetakis
 
Lab 20x20
Lab 20x20Lab 20x20
Lab 20x20
 
Brokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusionBrokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusion
 
I Minds2009 Health Decision Support Prof Bart De Moor (Ibbt Esat Ku Leuven)
I Minds2009 Health Decision Support  Prof  Bart De Moor (Ibbt Esat Ku Leuven)I Minds2009 Health Decision Support  Prof  Bart De Moor (Ibbt Esat Ku Leuven)
I Minds2009 Health Decision Support Prof Bart De Moor (Ibbt Esat Ku Leuven)
 
Blogging for MSc in Biomedical Informatics
Blogging for MSc in Biomedical InformaticsBlogging for MSc in Biomedical Informatics
Blogging for MSc in Biomedical Informatics
 
Breakout Collaboration tools - Kris Naessens
Breakout Collaboration tools - Kris NaessensBreakout Collaboration tools - Kris Naessens
Breakout Collaboration tools - Kris Naessens
 
M. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICT
M. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICTM. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICT
M. Claire Van de Velde - Green ICT Energy efficiëncy in and by ICT
 
Qo E E2 E5 User Centric Approach Katrien De Moor
Qo E E2 E5   User Centric Approach   Katrien De MoorQo E E2 E5   User Centric Approach   Katrien De Moor
Qo E E2 E5 User Centric Approach Katrien De Moor
 
Cloudeo Quick Guide: Social Media
Cloudeo Quick Guide: Social MediaCloudeo Quick Guide: Social Media
Cloudeo Quick Guide: Social Media
 
Modal Verbs
Modal VerbsModal Verbs
Modal Verbs
 
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...
 
Crsm 6 Crsm 2009 Filip Louagie The Flemish Cognitive Radio Research Cluster
Crsm 6 Crsm 2009   Filip Louagie   The Flemish Cognitive Radio Research ClusterCrsm 6 Crsm 2009   Filip Louagie   The Flemish Cognitive Radio Research Cluster
Crsm 6 Crsm 2009 Filip Louagie The Flemish Cognitive Radio Research Cluster
 
Analyse Gent M #11 & Launch Startup Garage
Analyse Gent M #11 & Launch Startup GarageAnalyse Gent M #11 & Launch Startup Garage
Analyse Gent M #11 & Launch Startup Garage
 
Maduf05 Interactivity Tom Paridaens
Maduf05 Interactivity   Tom ParidaensMaduf05 Interactivity   Tom Paridaens
Maduf05 Interactivity Tom Paridaens
 
Presentation Powerpoint
Presentation PowerpointPresentation Powerpoint
Presentation Powerpoint
 

Similaire à Brokerage 2007 presentation security

Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
ePassport reloaded goes mobile
ePassport reloaded goes mobileePassport reloaded goes mobile
ePassport reloaded goes mobileJeroen van Beek
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfssuser5b47c8
 
2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf0xctrlalt
 
Semlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex Europe
 
The Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs DeveloperThe Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs Developerbeires
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Biometrics (Distributed computing)
Biometrics (Distributed computing)Biometrics (Distributed computing)
Biometrics (Distributed computing)Sri Prasanna
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionUlf Mattsson
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Abhinav Biswas
 
Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?Murray Security Services
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 FinalBen Rothke
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environmentsStevenSegaert
 
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...imec.archive
 

Similaire à Brokerage 2007 presentation security (20)

Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
ePassport reloaded goes mobile
ePassport reloaded goes mobileePassport reloaded goes mobile
ePassport reloaded goes mobile
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf
 
Semlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex's Crossfinger - ENG
Semlex's Crossfinger - ENG
 
The Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs DeveloperThe Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs Developer
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Biometrics (Distributed computing)
Biometrics (Distributed computing)Biometrics (Distributed computing)
Biometrics (Distributed computing)
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environments
 
Smartcard
SmartcardSmartcard
Smartcard
 
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
 

Plus de imec.archive

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTimec.archive
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing eventimec.archive
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Futureimec.archive
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingimec.archive
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...imec.archive
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Labimec.archive
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshopsimec.archive
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platformimec.archive
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012imec.archive
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)imec.archive
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...imec.archive
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value imec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersimec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 

Plus de imec.archive (20)

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICT
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing event
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Future
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent living
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Lab
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshops
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platform
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 

Brokerage 2007 presentation security

  • 1. Information Security Ingrid Verbauwhede Danny De Cock
  • 2. Outline  Information security: we need it!  Partners  Competences within IBBT  Illustrations 2
  • 3. IBBT focus areas Every focus area needs information security!  eHealth: patient data protection  New Media: digital rights management & trusted archiving  eGovernment: secure identification & identity management eID cards and embedded biometry  Mobility: trusted communication In mobile terminals, in RFID devices Other applications:  eVoting, eCommerce, eBusiness, … 3
  • 4. Partners Security requires a wide range of technologies:  K.U.Leuven – COSIC Computer Security and Industrial cryptography  K.U.Leuven – Distrinet Secure software  K.U.Leuven – ICRI Legal aspects  U. Gent Network security  V.U.B Multimedia security 4
  • 5. Expertise 1: fundamental research  Cryptographic algorithms and protocols  Technologies for privacy and anonymity  Chip cards and secure tokens  Secure software and hardware obfuscation & side-channel attacks  Digital rights management, watermarking and perceptual hashing  Trusted computing  Biometry  Document security 5
  • 6. Example: Rijndael/AES S S S S S S S S S S S S S S S S round Key Schedule round S S S S S S S S S S S S S S S S MixColumns MixColumns MixColumns MixColumns round  key length: 16/24/32 bytes  block length: . . .  Rijndael: 16/24/32 bytes . .  AES: 16 bytes round 6
  • 7. Expertise 2: Security for state of the art systems  Network security (fixed, ad-hoc and wireless)  Embedded systems  RFID and sensor nodes  Ambient intelligence and pervasive Confidentialit y Identification Integrity SIM SIM 7
  • 8. Example: secure embedded systems Confidentiality Integrity Protocol: Wireless authentication protocol Identification design SIM Cipher Design, Algorithm: Embedded fingerprint matching Biometrics algorithms, crypto algorithms Java JCA Architecture: Co-design, HW/SW, SOC KVM JVM CPU Crypto Micro-Architecture: co-processor design MEM Vcc D Q Circuit: Circuit techniques to combat side CLK channel analysis attacks 8
  • 9. Example: Side channel analysis: EMA 9
  • 10. Expertise 3: Security for software platforms  Enterprise middleware & application servers  Web services  AAA (Authentication, Authorization, Access control) services  Identity and credential management  Non repudiation services and accountability  Time stamping and trusted archiving  Such research has for instance been conducted in the T- CASE project (see further). 10
  • 11. Expertise 4: Secure development  Analysis of security requirements  Development process and certification  Secure software architecture  Software security  Software verification and assurance  Such research has for instance been conducted in the IDEM project (https://projects.ibbt.be/idem) 11
  • 12. Expertise 5: Security management & deployment  Risk analysis  Policy language and policy enforcement  Architectures for monitoring and management  Run-time verification  Security infrastructures 12
  • 13. Demonstration: Belgian eID card & RFID Passport  Identity file  Citizen’s main address file  Chip-specific:  Street + number  Zip code  Chip number  Municipality  Citizen-specific:  Digital signature on main address issued by RRN  Name  Citizen’s JPEG photo ~3 Kbyte  First 2 names  First letter of 3rd first name  RRN identification number King, Prince, Count, Earl, Baron,… Baron,…  Nationality No status, white cane (blind  Birth location and date people), yellow cane (partially  Gender sighted people), extended minority,  Noble condition any combination  Special status  SHA-1 hash of citizen photo  Card-specific:  Card number  Validity’s begin and end date  Card delivery municipality  Document type  Digital signature on identity file issued by RRN Belgian citizen or child, European community citizen, non- European community citizen, bootstrap card, habilitation/machtigings card 13
  • 14. To illustrate the approach: 4 projects  4 projects demonstrated in the back of the room  ISBO – QOE: (security part of it): anonymous Voice over IP  IPEA (security part of it): format compliant encryption of video stream  TCASE – Technologies and Capabilities for Service Enabling  EHIP – E-Health Information Platforms 14