SlideShare una empresa de Scribd logo
1 de 17
CICRET
1
INDEX
Slno Content Page
1 Introduction 2
2 What is CICRET? 3
3 CICRET App 3
4 CICRET Bracelet 4
5 Components 4
5.0 Accelerometer 5
5.1Memory Card 5
5.2WIFI Component 5
5.3Micro USB Port 5
5.4 Proximity Sensor 6
5.5 Pico-Projector 6
5.6 Bluetooth 6
5.7 LED 7
5.8 Snap Button 7
5.9 Battery 7
6 Working 8
6.0Download CICRET 8
6.1ID Generation 8
6.2 AES Generation 8
6.2.0Sub-Byte Transformation 9
6.2.1Shift Row 10
6.2.2Mix Column 10
6.2.3Add Round Key 10
6.3 RSA Key Generation 12
7 Conclusion 14
8 Bibliography 15
CICRET
2
INTRODUCTION
We are living in a world where the security of data has the upmost priority of all. The world
around us is evolving each and every single minute. Social networking is the powerful aspect
now. People want their life to be easy and needs a smooth movement towards the future. The
developers took this into account to create the next revolution technology – CICRET.
CICRET is the developed based on the cloud technology. Cicret is the technology of the
future. Cicret consists of 2 parts. 1 is the application part and the other is a wearable bracelet.
The Cicret App is the only intuitive, secure and free solution for those who want to chat,
share and exchange safely with no chance of being traceable. The app is an innovative
encrypted technology providing anonymity and full control on all contents you have shared,
even after sending them. It allows you to give all your personal information always with you,
on your arm. The idea came from the opinion that the cloud system is not safe and there is no
other place to protect your digital privacy than yourself. Cicret is the next level technology
that’s easy to adapt to human environment and it would make Google Glass a primitive
technology in the year 2015 when its expected to be released.
CICRET
3
WHAT IS CICRET
CICRET is the combination of two parts
1) CICRET APP
2) CICRET BRACELET
It’s the combination of two products with a single idea: to give you the control.
CICRET APP
The CICRET is the only intuitive, secure and free solution for those who want to chat, share
and exchange safely with no chance of being traceable. It’s an innovative encrypted
technology providing anonymity and full control on all contents you have shared, even after
sending them. The CICRET app available on Android.
Features:
 Timer : Define the life time of your outbox contents, by the duration or by the
number of views.
 Edit : Remotely adjust whatever you sent.
 Delete : Remotely erase whatever you wrote.
 Exchange whatever you want with whoever you want (Pictures, Videos, Document,
Notes, Audio etc…)
 Stores a file on your computer and remotely gets it back on your smart phone via
CICRET
 Only those to whom you gave your ID, CICRET can contact you and vice versa.
 Data access at anywhere at any time.
CICRET
4
CICRET BRACELET
With the Cicret Bracelet,you can make your skin your new touchscreen. Read your mails, play your favourite
games, answer your calls, check the weather, find your way…Do whatever you want onyour arm.
COMPONENTS
The CICRET bracelet is the aggregation of many components:
 Accelerometer
 Memory Card
 ROM
 Processor
 Vibrator
 Micro USB port
 Battery
 Proximity Sensor (Long Range)
 Pico Projector
 Bluetooth
 Wifi Component
 LED
 Snap Button
CICRET
5
ACCELEROMETER
Accelerometers are used to detect and monitor vibration in rotating machinery.
Accelerometers are used in tablet computers and digital cameras so that images on screens
are always displayed upright. Accelerometers are used in drones for flight stabilisation. In
smart phones the display gets tilted automatically to adjust to users view due to the working
of the accelerometer.
In CICRET, when the bracelet is shook twice, it gets activated and when shooked again puts
it in a sleep mode.
MEMORY CARD
A memory card or flash card is an electronic flash memory data storage device used for
storing digital information. These are commonly used in many electronic devices,
including digital cameras, mobile phones, laptop computers, MP3 playersand video game
consoles, Tablets. Most of these can be diminutive, re-recordable, and can retain data without
power. 16 to 32GB is currently available for CICRET.
WIFI COMPONENT
The wifi component enables connection between the smart phone and the CICRET bracelet
as long as there is an internet connection available for the two devices.
MICRO USB PORT
CICRET bracelet has a micro USB port to connect to the system for data transfer between the
system and the bracelet. Exchange of information’s could include images, music, document
etc
CICRET
6
PROXIMITY SENSOR (LONG RANGE)
Is a sensor able to detect the presence of nearby objects without any physical contact. A
proximity sensor often emits an electromagnetic field or a beam of electromagnetic
radiation (infrared, for instance), and looks for changes in the field or return signal. The
object being sensed is often referred to as the proximity sensor's target. Different proximity
sensor targets demand different sensors.
The picoprojector projects the interface to our arm. When you place your finger on your
interface, it stops one of the 8 long range PROXIMITY SENSOR. The SENSOR sends back
the information to the processor place in the CICRET bracelet.
BLUETOOTH
When internet connection is unavailable the CICRET app and bracelet can be connected via
Bluetooth and also the Bluetooth can be used to exchange data/information to other devices.
PICOPROJECTOR
It’s technology that applies the use of an image projector in an handheld device. It is a
response to the emergence/development of compact portable devices such as mobile
phones, personal digital assistants, and digital cameras, which have sufficient storage
capacity to handle presentation materials but little space to accommodate an attached display
screen. Handheld projectors involve miniaturized hardware and software that can project
digital images onto any nearby viewing surface
LED
The LED is used to show notifications and is used to show the working of a process.
SNAP BUTTON
The snap button is a power switch that turns the CICRET bracelet on and off.
CICRET
7
BATTERY
CICRET uses a battery that is to provide 8 hours of lifetime continuously.
CICRET
8
WORKING
The working of CICRET could be explained in 5 steps.
STEP 1: Download CICRET
STEP 2: ID Generation
STEP 3: AES Key Generation
STEP 4: RSA Key Generation
STEP 5: Encrypted Communication
These 5 steps are explained in detail below to fully understand the proper working of the
CICRET.
STEP 1 :DOWNLOAD CICRET
The CICRET application is available on android play store. Downloading and installation
process is as easy as any app.
STEP 2 :ID GENERATION
As the app gets started for the first time, it asks for user password. When the user password is
entered and is recognized as the key.
STEP 3 :AES KEY GENERATION
The AES stands for Advanced Encryption Standard. This standard was established by the US
NIST(National Institute of Standards and Technologies). AES is based on Rjindael Cipher.
In CICRET,we use AES-256 encryption. The AES 256 has the following peculiarities:
 Key Length : 8
 Block Size : 32 Bytes
 Number of Rounds : 14
AES-256 means that there could be 2256 possible keys. A PC that uses 255keys per second
needs 149 billion years to break AES 256.
A single round in AES-256 consist of 4 stages.
1. Sub-Bytes Transformation
2. Shift Row
3. Mix Columns
4. Add Round Key
The AES algorithm operations are performed on a two dimension array of bytes called States.
CICRET
9
AES Encryption
The above figure shows the encryption of the AES 128. Here plain text of 128 bits are copied
to a 4x4 bytes matrix states. A key of M bytes are expanded and added with the states. Based
on the type of AES used, here we use AES-128, we perform 10 rounds of encryption. Where
CICRET
10
each round would perform the 4 stages (as mentioned above) based on the number of rounds.
The number of rounds are based on the type of AES used.
AES-128 : 10 Rounds
AES-256 : 14 Rounds
As in the figure showed above, the AES key is expanded each round and is added during the
stage – Add Round Key. W represents the word and the parameters specify the word number.
CICRET
11
W[0,3] – Word 0 to Word 3. The figure below shows the key expansion during each round.
STAGE 1 :Add Round Key
In this method, the key is added with the state S to produce a new state S’.
CICRET
12
STAGE 2 :Sub-Byte Transformation
In Sub-Byte Transformation, byte by byte transformation takes place.
Each byte in S(row,column) is transformed to S’
(row,column) using S-Box Table. The S-Box Table
diagram is shown below.
In the table above we can see that the hexadecimal 53is replaced with ED.
The figure bellows provides a bit more detailed understanding about Sub Byte
Transformation.
CICRET
13
STAGE 3 :Shift Row
Here in this method, circular left shift happens based on the row number.
STAGE 4 :Mix Column
In this method the matrix is multiplied with a column and the result is stored in another
column in S’.
CICRET
14
In AES-256 encryption each method is executed 14 rounds one by one to complete the
encryption. To decrypt the content we need the same key and we need to inverse the
encryption process. Decryption without the key is practically impossible.
The example for AES encryption is shown below:
Here we can see that the message: “GOOD MORNING” is encrypted with the key – 123 and
the encrypted message generated based on its algorithm is:
/gxCvp1k7zQYnYV7MnBoLG1EjxOmLw7cUVrVxUdwQu8=
CICRET
15
STEP 4 : RSA KEY GENERATION
RSA is stands for the names of the 3 persons who designed it :Rivest, Shamir, Adleman. RSA
is the first public key cryptosystem and is widely in use for secure data transmission. RSA
follows asymmetric cryptography, which means that we use 2 keys for encryption and
decryption. The 2 keys are:
1) Public Key
2) Private Key
A Public Key which may be known by anybody, can be used to encrypt messages and to
verify signatures. The private key is known only to the recipient to decrypt the message and
create signatures.
Digital Signature
In CICRET, a unique RSA key is generated each time you add a contact and you exchange
with the server.
CICRET
16
Conclusion
CICRET is the technology that would revolutionize the way we use and interact with
applications. It is the safest way to exchange information and provides a firm set of data
security encryption and decryption methods that’s. It would replace Google Glass and
wouldn’t be surpassed for another 2-3 years.
CICRET
17
BIBLIOGRAPHY
 http://www.cicret.com/wordpress/
 http://en.wikipedia.org/wiki/Advanced_Encryption_Standardwww.cicret.com
 http://en.wikipedia.org/wiki/RSA_(cryptosystem)www.cicret.com
 http://en.wikipedia.org/wiki/Public-key_cryptography
 https://www.youtube.com/watch?v=9J7GpVQCfms
 https://www.youtube.com/watch?v=vBum40uRTxc
 http://www.cicret.com/wordpress/?p=17836
 https://www.lri.fr/~fmartignon/documenti/systemesecurite/5-AES.pdf
 http://aesencryption.net/

Más contenido relacionado

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Destacado

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Cicret Bracelet Doccument

  • 1. CICRET 1 INDEX Slno Content Page 1 Introduction 2 2 What is CICRET? 3 3 CICRET App 3 4 CICRET Bracelet 4 5 Components 4 5.0 Accelerometer 5 5.1Memory Card 5 5.2WIFI Component 5 5.3Micro USB Port 5 5.4 Proximity Sensor 6 5.5 Pico-Projector 6 5.6 Bluetooth 6 5.7 LED 7 5.8 Snap Button 7 5.9 Battery 7 6 Working 8 6.0Download CICRET 8 6.1ID Generation 8 6.2 AES Generation 8 6.2.0Sub-Byte Transformation 9 6.2.1Shift Row 10 6.2.2Mix Column 10 6.2.3Add Round Key 10 6.3 RSA Key Generation 12 7 Conclusion 14 8 Bibliography 15
  • 2. CICRET 2 INTRODUCTION We are living in a world where the security of data has the upmost priority of all. The world around us is evolving each and every single minute. Social networking is the powerful aspect now. People want their life to be easy and needs a smooth movement towards the future. The developers took this into account to create the next revolution technology – CICRET. CICRET is the developed based on the cloud technology. Cicret is the technology of the future. Cicret consists of 2 parts. 1 is the application part and the other is a wearable bracelet. The Cicret App is the only intuitive, secure and free solution for those who want to chat, share and exchange safely with no chance of being traceable. The app is an innovative encrypted technology providing anonymity and full control on all contents you have shared, even after sending them. It allows you to give all your personal information always with you, on your arm. The idea came from the opinion that the cloud system is not safe and there is no other place to protect your digital privacy than yourself. Cicret is the next level technology that’s easy to adapt to human environment and it would make Google Glass a primitive technology in the year 2015 when its expected to be released.
  • 3. CICRET 3 WHAT IS CICRET CICRET is the combination of two parts 1) CICRET APP 2) CICRET BRACELET It’s the combination of two products with a single idea: to give you the control. CICRET APP The CICRET is the only intuitive, secure and free solution for those who want to chat, share and exchange safely with no chance of being traceable. It’s an innovative encrypted technology providing anonymity and full control on all contents you have shared, even after sending them. The CICRET app available on Android. Features:  Timer : Define the life time of your outbox contents, by the duration or by the number of views.  Edit : Remotely adjust whatever you sent.  Delete : Remotely erase whatever you wrote.  Exchange whatever you want with whoever you want (Pictures, Videos, Document, Notes, Audio etc…)  Stores a file on your computer and remotely gets it back on your smart phone via CICRET  Only those to whom you gave your ID, CICRET can contact you and vice versa.  Data access at anywhere at any time.
  • 4. CICRET 4 CICRET BRACELET With the Cicret Bracelet,you can make your skin your new touchscreen. Read your mails, play your favourite games, answer your calls, check the weather, find your way…Do whatever you want onyour arm. COMPONENTS The CICRET bracelet is the aggregation of many components:  Accelerometer  Memory Card  ROM  Processor  Vibrator  Micro USB port  Battery  Proximity Sensor (Long Range)  Pico Projector  Bluetooth  Wifi Component  LED  Snap Button
  • 5. CICRET 5 ACCELEROMETER Accelerometers are used to detect and monitor vibration in rotating machinery. Accelerometers are used in tablet computers and digital cameras so that images on screens are always displayed upright. Accelerometers are used in drones for flight stabilisation. In smart phones the display gets tilted automatically to adjust to users view due to the working of the accelerometer. In CICRET, when the bracelet is shook twice, it gets activated and when shooked again puts it in a sleep mode. MEMORY CARD A memory card or flash card is an electronic flash memory data storage device used for storing digital information. These are commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 playersand video game consoles, Tablets. Most of these can be diminutive, re-recordable, and can retain data without power. 16 to 32GB is currently available for CICRET. WIFI COMPONENT The wifi component enables connection between the smart phone and the CICRET bracelet as long as there is an internet connection available for the two devices. MICRO USB PORT CICRET bracelet has a micro USB port to connect to the system for data transfer between the system and the bracelet. Exchange of information’s could include images, music, document etc
  • 6. CICRET 6 PROXIMITY SENSOR (LONG RANGE) Is a sensor able to detect the presence of nearby objects without any physical contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return signal. The object being sensed is often referred to as the proximity sensor's target. Different proximity sensor targets demand different sensors. The picoprojector projects the interface to our arm. When you place your finger on your interface, it stops one of the 8 long range PROXIMITY SENSOR. The SENSOR sends back the information to the processor place in the CICRET bracelet. BLUETOOTH When internet connection is unavailable the CICRET app and bracelet can be connected via Bluetooth and also the Bluetooth can be used to exchange data/information to other devices. PICOPROJECTOR It’s technology that applies the use of an image projector in an handheld device. It is a response to the emergence/development of compact portable devices such as mobile phones, personal digital assistants, and digital cameras, which have sufficient storage capacity to handle presentation materials but little space to accommodate an attached display screen. Handheld projectors involve miniaturized hardware and software that can project digital images onto any nearby viewing surface LED The LED is used to show notifications and is used to show the working of a process. SNAP BUTTON The snap button is a power switch that turns the CICRET bracelet on and off.
  • 7. CICRET 7 BATTERY CICRET uses a battery that is to provide 8 hours of lifetime continuously.
  • 8. CICRET 8 WORKING The working of CICRET could be explained in 5 steps. STEP 1: Download CICRET STEP 2: ID Generation STEP 3: AES Key Generation STEP 4: RSA Key Generation STEP 5: Encrypted Communication These 5 steps are explained in detail below to fully understand the proper working of the CICRET. STEP 1 :DOWNLOAD CICRET The CICRET application is available on android play store. Downloading and installation process is as easy as any app. STEP 2 :ID GENERATION As the app gets started for the first time, it asks for user password. When the user password is entered and is recognized as the key. STEP 3 :AES KEY GENERATION The AES stands for Advanced Encryption Standard. This standard was established by the US NIST(National Institute of Standards and Technologies). AES is based on Rjindael Cipher. In CICRET,we use AES-256 encryption. The AES 256 has the following peculiarities:  Key Length : 8  Block Size : 32 Bytes  Number of Rounds : 14 AES-256 means that there could be 2256 possible keys. A PC that uses 255keys per second needs 149 billion years to break AES 256. A single round in AES-256 consist of 4 stages. 1. Sub-Bytes Transformation 2. Shift Row 3. Mix Columns 4. Add Round Key The AES algorithm operations are performed on a two dimension array of bytes called States.
  • 9. CICRET 9 AES Encryption The above figure shows the encryption of the AES 128. Here plain text of 128 bits are copied to a 4x4 bytes matrix states. A key of M bytes are expanded and added with the states. Based on the type of AES used, here we use AES-128, we perform 10 rounds of encryption. Where
  • 10. CICRET 10 each round would perform the 4 stages (as mentioned above) based on the number of rounds. The number of rounds are based on the type of AES used. AES-128 : 10 Rounds AES-256 : 14 Rounds As in the figure showed above, the AES key is expanded each round and is added during the stage – Add Round Key. W represents the word and the parameters specify the word number.
  • 11. CICRET 11 W[0,3] – Word 0 to Word 3. The figure below shows the key expansion during each round. STAGE 1 :Add Round Key In this method, the key is added with the state S to produce a new state S’.
  • 12. CICRET 12 STAGE 2 :Sub-Byte Transformation In Sub-Byte Transformation, byte by byte transformation takes place. Each byte in S(row,column) is transformed to S’ (row,column) using S-Box Table. The S-Box Table diagram is shown below. In the table above we can see that the hexadecimal 53is replaced with ED. The figure bellows provides a bit more detailed understanding about Sub Byte Transformation.
  • 13. CICRET 13 STAGE 3 :Shift Row Here in this method, circular left shift happens based on the row number. STAGE 4 :Mix Column In this method the matrix is multiplied with a column and the result is stored in another column in S’.
  • 14. CICRET 14 In AES-256 encryption each method is executed 14 rounds one by one to complete the encryption. To decrypt the content we need the same key and we need to inverse the encryption process. Decryption without the key is practically impossible. The example for AES encryption is shown below: Here we can see that the message: “GOOD MORNING” is encrypted with the key – 123 and the encrypted message generated based on its algorithm is: /gxCvp1k7zQYnYV7MnBoLG1EjxOmLw7cUVrVxUdwQu8=
  • 15. CICRET 15 STEP 4 : RSA KEY GENERATION RSA is stands for the names of the 3 persons who designed it :Rivest, Shamir, Adleman. RSA is the first public key cryptosystem and is widely in use for secure data transmission. RSA follows asymmetric cryptography, which means that we use 2 keys for encryption and decryption. The 2 keys are: 1) Public Key 2) Private Key A Public Key which may be known by anybody, can be used to encrypt messages and to verify signatures. The private key is known only to the recipient to decrypt the message and create signatures. Digital Signature In CICRET, a unique RSA key is generated each time you add a contact and you exchange with the server.
  • 16. CICRET 16 Conclusion CICRET is the technology that would revolutionize the way we use and interact with applications. It is the safest way to exchange information and provides a firm set of data security encryption and decryption methods that’s. It would replace Google Glass and wouldn’t be surpassed for another 2-3 years.
  • 17. CICRET 17 BIBLIOGRAPHY  http://www.cicret.com/wordpress/  http://en.wikipedia.org/wiki/Advanced_Encryption_Standardwww.cicret.com  http://en.wikipedia.org/wiki/RSA_(cryptosystem)www.cicret.com  http://en.wikipedia.org/wiki/Public-key_cryptography  https://www.youtube.com/watch?v=9J7GpVQCfms  https://www.youtube.com/watch?v=vBum40uRTxc  http://www.cicret.com/wordpress/?p=17836  https://www.lri.fr/~fmartignon/documenti/systemesecurite/5-AES.pdf  http://aesencryption.net/