SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Big Crypto
Create transparent sensor-to-cloud encryption suitable for common
microcontrollers used by makers.
Securing mobile medical applications one device at a time
Total Beneficiaries Spoken To: 108
Team Members
Team Member
Nicholas Albanese Wenchen Wang Brandon Contino Ziyue Sun
Academic Program
Electrical
Engineering
(Undergrad)
Computer science
(PhD)
Electrical
Engineering
(Undergrad)
Mechanical
Engineering
(Master's)
Relevant
experience
Knows government
agencies and their
standards
Fault tolerant
wireless networks
and protocols
Circuit Designer,
Maker
Researches on
nonlinear controls
and human robotics
Sponsors: Matt Fante, NSA
Mentor: Dr. Dickerson, Samuel J, University of Pittsburgh
Original Hypothesis
Create transparent sensor-to-cloud encryption suitable for common
microcontrollers used by makers.
Value
Proposition
Buy In & Support BeneficiariesKey Activities
Deployment
Key Resources
Key Partners
Mission AchievementCost Structure
-Standard Definers
*NSA: sponsor
-Our Mentor
*Dr. Sam Dickerson
-Influential Makers
* Chad Elish,
President HackPGH,
member of Nation of
makers
-RFID
*Steve Halliday, CEO
high Tech AID,
important member in
the RFID community
- Leveraging Simon
and Speck
*Developing a way to
interface with Simon
and Speck for
encryption
- Create a mutual
authentication protocol
*Develop a way to
create handshaking
- Encryption Algorithm
*Simon and Speck
-Microcontroller
*Arduino, Teensy, etc
-Network Hardware
* Xbee, GSM,
Bluetooth, 802.11, etc
-Communication
Protocol
- Encryption Communication
* protects the data in transit
-Ease of usability
* Enables many makers to
quickly add encryption to their
projects
-Mutual authentications
*Prevents unauthorized
accessing of data or
manipulation
- Transparency
* Makers “make” stuff mostly
for learning how it works. The
security will be transparent so
they can learn how it works
- Influential makers
* Leverage influential
makers to help
“advertise”
- Maker magazines and
channels
* Another way to promote
e.g. Instructables
- Code Repositories
e.g. Github
-Product website
* Could make a page for
the product
Example projects
* Can exhibit example
projects on sites
- Makers
* Chad Ellish, Jon Lewis,
Simon Health, Scott
Hamilton
- NSA
* Sponsor
- Encryption solution -Micro-controller - Servers
- A standard is created
There is a common method
for implementing secure
communications on MCUs
First MVP
General Sensors
Open Source Library
Cloud
Encrypted Data
Micro-controller1 Micro-controller2 Micro-controller3
Shield
Transparent
$$$$
Authentication
Not Solely a Technical Problem
Makers/ public do not care about encryption
Some solutions do exist
Open Source Library Educate the Public
Our Mission Achievement
“Commercial standard that can be deployed for mission application”
Open Source Library Educate the Public
Why do those current libraries not work?
Lack of Understanding Lack of
Awareness
Open Source Library Educate the Public Website w/Libraries
- Enable Developers to Quickly
and Easily Implement Lightweight
Encryption on Their Wireless
Devices
- Customizable solutions for
different applications
Value
Proposition
Buy In & Support BeneficiariesKey Activities
DeploymentKey Resources
Key Partners
Mission AchievementCost Structure
- NSA Encryption
Experts
- Center for
Internet Security
- Internet
Engineering Task
Force (IETF)
- Leveraging Big Crypto
Website
- Big Crypto Website
- NSA Adoption: Linda
Burger
- Maker Community
Utilizes Site
- DoD Adoption: Prove
validity through NSA
- Custom Made Company
Website Online
- Connecting with
Agencies In Person and
Over the Phone
- NSA - Information
Assurance
- NSA/DoD Sensor
Developers
- Server Cost
- Developer Wages
- Easy to use encryption standard that can be deployed for mission
application
Value
Proposition
Customer
Relationships
Customer
Segments
Key Activities
ChannelsKey Resources
Key Partners
Revenue StreamsCost Structure
- Developers who
have developed
lightweight
encryption libraries
- Influential Makers
- Cloud Services
- NSA for
Encryption
Algorithm
Research
- Maintain libraries
- Easy to use interface
- Create tutorials
- Establish a strong
following
- Encryption Libraries
- Code Repositories
- Encryption Algorithm
- Quickly and easily implement
encryption through easy to use
libraries with extensive, but easy
to use tutorials
- Provide visibility to library
- Increase use of cloud service
- Virtual Communication
Support
- Virtual meetings to
discuss library
performance
-Virtual and in person
meetings to discuss cloud
integration
- Website
- Code Repositories
- Example Projects on
Maker Sites
- Developers who Utilize
Wireless Communications
- Developers who want
more people to use their
libraries
- Cloud Solutions who
want their services easily
integrated
- Server Cost
- Developer Wages
- Testing Costs
- Advertisements on the Website
- Optimized versions of the lightweight encryption algorithm
- Consulting Appointments
How Can We Make a Website Sustainable?
Acquire Activate
Open Source Library Educate the Public Website w/Libraries
Encrypted Chips
Back of the Envelope Research
1 million American use insulin pumps - 20% (200,000) use Omnipod
per year spent buying MCU’s and transceivers
at Omnipod alone
$120,000,000
Why making chips may not work
Issues needed to be considered:
● Do medical device developers want to
make changes to their hardware?
● Can we differentiate ourselves from giant
companies?
● Is it economically feasible?
3 Year Financial/Operations Timeline
Open Source Library Educate the Public Website w/Libraries
Encrypted Chips
Encryption Software
Optimized for Medical
Devices
Evaluation of Software Solution
Costs less Easy to implement
Medical device makers
use
Security Through Obscurity
“I think there is more to cyber security
then hiding your laptop under your bed.“
Main Pain Point
Open Source Library Educate the Public Website w/Libraries
Encrypted Chips
Encryption Software
Optimized for Medical
Devices
Communication
System Design
Services
Final MVP
Mission Achievement
How is this going to achieve what the
NSA wanted in the first place?
They wanted to work on improving
IoT cyber security for IA and
possible DoD applications
We will be improving cyber security in
the medical field, and the transition
over to other uses is not that big a
jump
Moving Forward
Disclaimer: All material presented was of the views of the Big Crypto team and by no way is a view of the team's sponsor or the University.

Weitere ähnliche Inhalte

Was ist angesagt?

Spanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurementSpanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurement
Javier Tallón
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 

Was ist angesagt? (20)

Forrester zero trust_dna
 Forrester zero trust_dna Forrester zero trust_dna
Forrester zero trust_dna
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Cisco Connect 2018 Thailand - ecostruxure innovation for data center infrastr...
Cisco Connect 2018 Thailand - ecostruxure innovation for data center infrastr...Cisco Connect 2018 Thailand - ecostruxure innovation for data center infrastr...
Cisco Connect 2018 Thailand - ecostruxure innovation for data center infrastr...
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Spanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurementSpanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurement
 
jtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationjtsec Arqus Alliance presentation
jtsec Arqus Alliance presentation
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
IEA DSM ExCo presentation Task XXIV
IEA DSM ExCo presentation Task XXIVIEA DSM ExCo presentation Task XXIV
IEA DSM ExCo presentation Task XXIV
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016
 
Nanosense engr 245 lean launchpad stanford 2019
Nanosense engr 245 lean launchpad stanford 2019Nanosense engr 245 lean launchpad stanford 2019
Nanosense engr 245 lean launchpad stanford 2019
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Análisis de seguridad integral con Elastic
Análisis de seguridad integral con ElasticAnálisis de seguridad integral con Elastic
Análisis de seguridad integral con Elastic
 
The use case for Cassandra at Ping Identity
The use case for Cassandra at Ping IdentityThe use case for Cassandra at Ping Identity
The use case for Cassandra at Ping Identity
 

Ähnlich wie Big Crypto for Little Things

Webinartestforslideshare
WebinartestforslideshareWebinartestforslideshare
Webinartestforslideshare
Colin Walls
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
Anna Liu
 

Ähnlich wie Big Crypto for Little Things (20)

Webinartestforslideshare
WebinartestforslideshareWebinartestforslideshare
Webinartestforslideshare
 
Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
MICRE: Microservices In MediCal Research Environments
MICRE: Microservices In MediCal Research EnvironmentsMICRE: Microservices In MediCal Research Environments
MICRE: Microservices In MediCal Research Environments
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real World
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient Systems
 
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn
 
Six Principles of Software Design to Empower Scientists
Six Principles of Software Design to Empower ScientistsSix Principles of Software Design to Empower Scientists
Six Principles of Software Design to Empower Scientists
 
The Management of The Future Internet With SDN and NFV
The Management of The Future Internet With SDN and NFV The Management of The Future Internet With SDN and NFV
The Management of The Future Internet With SDN and NFV
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
 
Novi sad ai event 1-2018
Novi sad ai event 1-2018Novi sad ai event 1-2018
Novi sad ai event 1-2018
 

Mehr von H4Diadmin

Xplomo final presentation
Xplomo final presentationXplomo final presentation
Xplomo final presentation
H4Diadmin
 
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew AugmentationLight Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation
H4Diadmin
 

Mehr von H4Diadmin (20)

gARGoyle H4D Final Project Video
gARGoyle H4D Final Project VideogARGoyle H4D Final Project Video
gARGoyle H4D Final Project Video
 
James Madison University Final Presentation
James Madison University Final PresentationJames Madison University Final Presentation
James Madison University Final Presentation
 
Frogman
FrogmanFrogman
Frogman
 
Austra Lumina
Austra LuminaAustra Lumina
Austra Lumina
 
Broadcom
BroadcomBroadcom
Broadcom
 
The Librarian Lessons Learned
The Librarian Lessons LearnedThe Librarian Lessons Learned
The Librarian Lessons Learned
 
Seacurity
Seacurity Seacurity
Seacurity
 
Team Surgency
Team SurgencyTeam Surgency
Team Surgency
 
Xplomo final presentation
Xplomo final presentationXplomo final presentation
Xplomo final presentation
 
Technology Threat Prediction
Technology Threat PredictionTechnology Threat Prediction
Technology Threat Prediction
 
Modern Day Minutemen
Modern Day MinutemenModern Day Minutemen
Modern Day Minutemen
 
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew AugmentationLight Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation
 
Deep Clearance Situational Awareness
Deep Clearance Situational AwarenessDeep Clearance Situational Awareness
Deep Clearance Situational Awareness
 
Digital Overlay
Digital OverlayDigital Overlay
Digital Overlay
 
Drone detection.pptx
Drone detection.pptxDrone detection.pptx
Drone detection.pptx
 
Vital
VitalVital
Vital
 
Team Spyglass Final Presentation
Team Spyglass Final PresentationTeam Spyglass Final Presentation
Team Spyglass Final Presentation
 
Lessons Learned
Lessons LearnedLessons Learned
Lessons Learned
 
H4D Week 12 Final Presentation
H4D Week 12 Final PresentationH4D Week 12 Final Presentation
H4D Week 12 Final Presentation
 
Blue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final PresentationBlue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final Presentation
 

Kürzlich hochgeladen

Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Menggugurkan Kandungan 087776558899
 
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi EscortsRussian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 

Kürzlich hochgeladen (20)

Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
 
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
 
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi EscortsRussian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final Presentation
 
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
 
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
 

Big Crypto for Little Things

  • 1. Big Crypto Create transparent sensor-to-cloud encryption suitable for common microcontrollers used by makers. Securing mobile medical applications one device at a time Total Beneficiaries Spoken To: 108
  • 2. Team Members Team Member Nicholas Albanese Wenchen Wang Brandon Contino Ziyue Sun Academic Program Electrical Engineering (Undergrad) Computer science (PhD) Electrical Engineering (Undergrad) Mechanical Engineering (Master's) Relevant experience Knows government agencies and their standards Fault tolerant wireless networks and protocols Circuit Designer, Maker Researches on nonlinear controls and human robotics Sponsors: Matt Fante, NSA Mentor: Dr. Dickerson, Samuel J, University of Pittsburgh
  • 3. Original Hypothesis Create transparent sensor-to-cloud encryption suitable for common microcontrollers used by makers.
  • 4. Value Proposition Buy In & Support BeneficiariesKey Activities Deployment Key Resources Key Partners Mission AchievementCost Structure -Standard Definers *NSA: sponsor -Our Mentor *Dr. Sam Dickerson -Influential Makers * Chad Elish, President HackPGH, member of Nation of makers -RFID *Steve Halliday, CEO high Tech AID, important member in the RFID community - Leveraging Simon and Speck *Developing a way to interface with Simon and Speck for encryption - Create a mutual authentication protocol *Develop a way to create handshaking - Encryption Algorithm *Simon and Speck -Microcontroller *Arduino, Teensy, etc -Network Hardware * Xbee, GSM, Bluetooth, 802.11, etc -Communication Protocol - Encryption Communication * protects the data in transit -Ease of usability * Enables many makers to quickly add encryption to their projects -Mutual authentications *Prevents unauthorized accessing of data or manipulation - Transparency * Makers “make” stuff mostly for learning how it works. The security will be transparent so they can learn how it works - Influential makers * Leverage influential makers to help “advertise” - Maker magazines and channels * Another way to promote e.g. Instructables - Code Repositories e.g. Github -Product website * Could make a page for the product Example projects * Can exhibit example projects on sites - Makers * Chad Ellish, Jon Lewis, Simon Health, Scott Hamilton - NSA * Sponsor - Encryption solution -Micro-controller - Servers - A standard is created There is a common method for implementing secure communications on MCUs
  • 5. First MVP General Sensors Open Source Library Cloud Encrypted Data Micro-controller1 Micro-controller2 Micro-controller3 Shield Transparent $$$$ Authentication
  • 6. Not Solely a Technical Problem Makers/ public do not care about encryption Some solutions do exist
  • 7. Open Source Library Educate the Public
  • 8. Our Mission Achievement “Commercial standard that can be deployed for mission application”
  • 9. Open Source Library Educate the Public
  • 10. Why do those current libraries not work? Lack of Understanding Lack of Awareness
  • 11. Open Source Library Educate the Public Website w/Libraries
  • 12. - Enable Developers to Quickly and Easily Implement Lightweight Encryption on Their Wireless Devices - Customizable solutions for different applications Value Proposition Buy In & Support BeneficiariesKey Activities DeploymentKey Resources Key Partners Mission AchievementCost Structure - NSA Encryption Experts - Center for Internet Security - Internet Engineering Task Force (IETF) - Leveraging Big Crypto Website - Big Crypto Website - NSA Adoption: Linda Burger - Maker Community Utilizes Site - DoD Adoption: Prove validity through NSA - Custom Made Company Website Online - Connecting with Agencies In Person and Over the Phone - NSA - Information Assurance - NSA/DoD Sensor Developers - Server Cost - Developer Wages - Easy to use encryption standard that can be deployed for mission application
  • 13. Value Proposition Customer Relationships Customer Segments Key Activities ChannelsKey Resources Key Partners Revenue StreamsCost Structure - Developers who have developed lightweight encryption libraries - Influential Makers - Cloud Services - NSA for Encryption Algorithm Research - Maintain libraries - Easy to use interface - Create tutorials - Establish a strong following - Encryption Libraries - Code Repositories - Encryption Algorithm - Quickly and easily implement encryption through easy to use libraries with extensive, but easy to use tutorials - Provide visibility to library - Increase use of cloud service - Virtual Communication Support - Virtual meetings to discuss library performance -Virtual and in person meetings to discuss cloud integration - Website - Code Repositories - Example Projects on Maker Sites - Developers who Utilize Wireless Communications - Developers who want more people to use their libraries - Cloud Solutions who want their services easily integrated - Server Cost - Developer Wages - Testing Costs - Advertisements on the Website - Optimized versions of the lightweight encryption algorithm - Consulting Appointments
  • 14. How Can We Make a Website Sustainable? Acquire Activate
  • 15.
  • 16. Open Source Library Educate the Public Website w/Libraries Encrypted Chips
  • 17. Back of the Envelope Research 1 million American use insulin pumps - 20% (200,000) use Omnipod per year spent buying MCU’s and transceivers at Omnipod alone $120,000,000
  • 18. Why making chips may not work Issues needed to be considered: ● Do medical device developers want to make changes to their hardware? ● Can we differentiate ourselves from giant companies? ● Is it economically feasible?
  • 20. Open Source Library Educate the Public Website w/Libraries Encrypted Chips Encryption Software Optimized for Medical Devices
  • 21. Evaluation of Software Solution Costs less Easy to implement Medical device makers use
  • 22. Security Through Obscurity “I think there is more to cyber security then hiding your laptop under your bed.“
  • 24. Open Source Library Educate the Public Website w/Libraries Encrypted Chips Encryption Software Optimized for Medical Devices Communication System Design Services
  • 26. Mission Achievement How is this going to achieve what the NSA wanted in the first place? They wanted to work on improving IoT cyber security for IA and possible DoD applications We will be improving cyber security in the medical field, and the transition over to other uses is not that big a jump
  • 27. Moving Forward Disclaimer: All material presented was of the views of the Big Crypto team and by no way is a view of the team's sponsor or the University.

Hinweis der Redaktion

  1. Z can you copy over all the original mission model canvas things
  2. Z can you copy over all the original mission model canvas things
  3. Z can you copy over all the original mission model canvas things
  4. The back of the envelop research is what really sold the team on our huge pivot so late. The idea of making software to sell to the companies seemed viable. Talked to a few developers who talked about product development and
  5. These devices were secured by obscuring what anyone knew about it Not a good way to do it because if hacked, all of their systems are compromised Through discovery, learned that: Legal reasons keep companies obscuring it because of the FDA standards Improvements in cyber security were not making their way into the medical device because of the gap the FDA standards create