SlideShare a Scribd company logo
1 of 17
Presentation on
Palladium Cryptography
Presented By
S . Gulnaz
123T1A0579
Contents

Abstract

Introduction about cryptography

Process of cryptography

Properties of palladium

Example

concepts

Secured Key

Working of palladium

Protection using Palladium

Advantages

Disadvantages

Conclusion

References
Abstract
Palladium is a software architecture designed
by Microsoft to implement parts of Trusted Computing Concepts
on future versions of Windows OS. This relies on Hardware
technology designed by members of Trusted Computing Group
which provide security features, cryptographic co-processors
and ability to hold keys securely.
Introduction about Cryptography

Security:
Many organizations posses valuable information they guard closely. As
more of this information is stored in computers the need of data
security becomes increasingly important. Protecting this information
against unauthorized usage is therefore a major concern for both
operating systems and users alike.
Cont..

Cryptography:
Cryptography is the method in which a message or file,
called plain text, is taken and encrypted into cipher text in such
a way that only authorized people know how to convert it back
to plane text.
Processof Cryptography
Why weneed to go for Palladium Cryptography

In Quantam Cryptography tramission time for documents
encrypted using public key cryptography are significantly slower
then symmetric cryptography.In fact tramission of very large
document is prohibitive.

Public key Cryptography is susceptible to impersion attacks.
Propertiesof Palladium

Architectural enhancement to Windows kernel and computer
hardware.

Will not eliminate any features of Windows.

New applications must be written.

It will operate with any program user specifies while maintaining
security.
Concepts

Trusted Platform Module: provides secure storage of
cryptographic keys and a secure co-processor.

Curtained memory (trusted space)feature in CPU: Execution
space protected from external attacks (protected RAM) Data
within curtained memory can be accessed by applications to
which it belongs.

Sealed Storage: Authentication mechanism that allows
program to store secrets.
Secured Key

Cryptographic key is stored within TPM Applications provide
encrypted data to TPM to be decrypted and decrypted data is
provided for authentication

TPM stores a single key securely

Data as an extension stored in encrypted form that can be
decrypted only by key in TPM

TPM generates cryptographic signature based on hidden key.
Working of Palladium

This architecture will include a new security computing chip and
design changes to a computer’s central processing unit (CPU),
chipsets, and peripheral devices, such as keyboards and
printers.

The pc-specific secret coding within palladium makes stolen
files useless on other machines as they are physically and
cryptographically locked within the hardware of the machine.
Protection using Palladium

Palladium prevents identity theft and unauthorized access to
personal data on the user’s device while on the internet and on
other networks.

With palladium, a system’s secrets are locked in the computer
and are only revealed on terms that the user has specified.
Advantages
One of the more promising aspects that palladium will bring to
end-user is the ability to authenicate the programs they use.
The digital rights management (DRM) potential with a palladium
is what content producers and distributors are intersted with.
Digital rights management has to do with controlling whom and
how long content is distributed.
Shortcomingsand Pit fallsof Palladium

Software and applications have to be rewritten to synchronize
with palladium or new applications must be written

Changes are to be made to the existing computer hardware to
support palladium.

It would be a long time before this technology became
commonplace.
Conclusion
With the usage of “palladium” systems, trustworthy, secure
interactions will become possible. This technology will provide
tougher security defenses and more abundant privacy benefits
than ever before. With palladium, users will have unparalleled
power over system integrity, personal privacy and data security.
References
http://epic.org/privacy/consumer/microsoft/palladium.html
http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Next-
Generation_Secure_Computing_Base.html
https://www.duo.uio.no/bitstream/handle/10852/19503/FinalxTh
esis.pdf?
http://en.wikipedia.org/wiki/Cryptography
palladium

More Related Content

What's hot

Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity Blockchain Council
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityKevin Cedeño, CISM, CISA
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Holographic Versatile Disc - Seminar
Holographic Versatile Disc - SeminarHolographic Versatile Disc - Seminar
Holographic Versatile Disc - SeminarNitin Balakrishnan
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT SecuritySHAAMILIVARSAGV
 

What's hot (20)

Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity
 
Edge computing
Edge computingEdge computing
Edge computing
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of Cybersecurity
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Holographic Versatile Disc - Seminar
Holographic Versatile Disc - SeminarHolographic Versatile Disc - Seminar
Holographic Versatile Disc - Seminar
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Blue brain ppt
Blue brain pptBlue brain ppt
Blue brain ppt
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Kerberos
KerberosKerberos
Kerberos
 

Viewers also liked

Microsoft Palladium.
Microsoft Palladium.Microsoft Palladium.
Microsoft Palladium.Anurag Sharma
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Wireless and Internet Security Principles
Wireless and Internet Security PrinciplesWireless and Internet Security Principles
Wireless and Internet Security Principlespualoob
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladiumNed Hayes
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
E banking security-09-logistics
E banking security-09-logisticsE banking security-09-logistics
E banking security-09-logisticseBankingSecurity
 
Houlihan Lokey: Valuation in the Delaware Courts
Houlihan Lokey: Valuation in the Delaware CourtsHoulihan Lokey: Valuation in the Delaware Courts
Houlihan Lokey: Valuation in the Delaware CourtsHoulihan Lokey
 
eID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment serviceseID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment servicesManel Medina
 

Viewers also liked (20)

Microsoft Palladium
Microsoft PalladiumMicrosoft Palladium
Microsoft Palladium
 
Microsoft Palladium.
Microsoft Palladium.Microsoft Palladium.
Microsoft Palladium.
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
ngscb
ngscbngscb
ngscb
 
Cryptography
CryptographyCryptography
Cryptography
 
Wireless and Internet Security Principles
Wireless and Internet Security PrinciplesWireless and Internet Security Principles
Wireless and Internet Security Principles
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Почта
ПочтаПочта
Почта
 
E banking security-09-logistics
E banking security-09-logisticsE banking security-09-logistics
E banking security-09-logistics
 
Ppt tls
Ppt tlsPpt tls
Ppt tls
 
Hold back the invisible enemy
Hold back the invisible enemyHold back the invisible enemy
Hold back the invisible enemy
 
Houlihan Lokey: Valuation in the Delaware Courts
Houlihan Lokey: Valuation in the Delaware CourtsHoulihan Lokey: Valuation in the Delaware Courts
Houlihan Lokey: Valuation in the Delaware Courts
 
eID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment serviceseID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment services
 

Similar to palladium

Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxchWaqasZahid
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesFred_C_Thomas
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure engsang yoo
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Amr Salah
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptxGaneshBagul8
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS Gregory McNulty
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSGregory McNulty
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...Gerardo Pardo-Castellote
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 

Similar to palladium (20)

Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Security technology
Security technologySecurity technology
Security technology
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure eng
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptx
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 

palladium

  • 2. Contents  Abstract  Introduction about cryptography  Process of cryptography  Properties of palladium  Example  concepts  Secured Key  Working of palladium  Protection using Palladium  Advantages  Disadvantages  Conclusion  References
  • 3. Abstract Palladium is a software architecture designed by Microsoft to implement parts of Trusted Computing Concepts on future versions of Windows OS. This relies on Hardware technology designed by members of Trusted Computing Group which provide security features, cryptographic co-processors and ability to hold keys securely.
  • 4. Introduction about Cryptography  Security: Many organizations posses valuable information they guard closely. As more of this information is stored in computers the need of data security becomes increasingly important. Protecting this information against unauthorized usage is therefore a major concern for both operating systems and users alike.
  • 5. Cont..  Cryptography: Cryptography is the method in which a message or file, called plain text, is taken and encrypted into cipher text in such a way that only authorized people know how to convert it back to plane text.
  • 7. Why weneed to go for Palladium Cryptography  In Quantam Cryptography tramission time for documents encrypted using public key cryptography are significantly slower then symmetric cryptography.In fact tramission of very large document is prohibitive.  Public key Cryptography is susceptible to impersion attacks.
  • 8. Propertiesof Palladium  Architectural enhancement to Windows kernel and computer hardware.  Will not eliminate any features of Windows.  New applications must be written.  It will operate with any program user specifies while maintaining security.
  • 9. Concepts  Trusted Platform Module: provides secure storage of cryptographic keys and a secure co-processor.  Curtained memory (trusted space)feature in CPU: Execution space protected from external attacks (protected RAM) Data within curtained memory can be accessed by applications to which it belongs.  Sealed Storage: Authentication mechanism that allows program to store secrets.
  • 10. Secured Key  Cryptographic key is stored within TPM Applications provide encrypted data to TPM to be decrypted and decrypted data is provided for authentication  TPM stores a single key securely  Data as an extension stored in encrypted form that can be decrypted only by key in TPM  TPM generates cryptographic signature based on hidden key.
  • 11. Working of Palladium  This architecture will include a new security computing chip and design changes to a computer’s central processing unit (CPU), chipsets, and peripheral devices, such as keyboards and printers.  The pc-specific secret coding within palladium makes stolen files useless on other machines as they are physically and cryptographically locked within the hardware of the machine.
  • 12. Protection using Palladium  Palladium prevents identity theft and unauthorized access to personal data on the user’s device while on the internet and on other networks.  With palladium, a system’s secrets are locked in the computer and are only revealed on terms that the user has specified.
  • 13. Advantages One of the more promising aspects that palladium will bring to end-user is the ability to authenicate the programs they use. The digital rights management (DRM) potential with a palladium is what content producers and distributors are intersted with. Digital rights management has to do with controlling whom and how long content is distributed.
  • 14. Shortcomingsand Pit fallsof Palladium  Software and applications have to be rewritten to synchronize with palladium or new applications must be written  Changes are to be made to the existing computer hardware to support palladium.  It would be a long time before this technology became commonplace.
  • 15. Conclusion With the usage of “palladium” systems, trustworthy, secure interactions will become possible. This technology will provide tougher security defenses and more abundant privacy benefits than ever before. With palladium, users will have unparalleled power over system integrity, personal privacy and data security.