Week 7 - IoT Security
Week 7 - IoT Security
Week 7 - IoT Security
IoT Security
07/31/2021
What is Security?
“The quality or state of being secure—to be free
from danger”
To ensure protection
against unauthorized To ensure the accuracy
access to or use of and completeness of
confidential information information to protect
business processes
• One-Time Pads
Software • Data Encryption Standard (DES)
Approaches • Advanced Encryption Standard (AES
• RSA: Rivest, Shamir, and Adleman
How?
Symmetric (Shared Key) Cryptography
Ronald L. Rivest, Adi Shamir, and Leonard Adelman, 1978 and 2010
RSA Overview
(me)d mod n = m
The public key is then (e, n), and the private key is d.
Encryption:
• Add bits to message M to make m coprime to n.
• Ciphertext: C = (me) mod n
RSA Overview
(me)d mod n = m
The public key is then (e, n), and the private key is d.
Decription:
• m = (Cd ) mod n
• Remove extra bits by reversing the padding scheme
RSA Key Generation
Eavesdropper
Intro to SSL/TLS Based on Certificates
Browser (client)
Decrypted With
Bank's Private Key
Secret to be shared
Encrypted With Bank's
Public Key
Bank's Bank's
Public Key Private Key
A message is encrypted with the private key and both the mes
sage and its encryption are sent.
• www.bankofamerica.com
Certificates Thermostat
Roomba
HVAC
Microwave
Hardware Aprroaches