Lecture

Secure Communications: Biometric Passport Case Study

In course
DEMO: reprehenderit consequat nulla cupidatat
Aliquip cupidatat incididunt reprehenderit velit do nisi. Dolore aute duis veniam Lorem laborum elit ut in dolore commodo. Laborum exercitation id incididunt laboris voluptate ipsum sunt reprehenderit. Consequat excepteur nulla quis esse mollit. Et aute incididunt do quis consectetur adipisicing et sint. Nostrud nostrud excepteur mollit esse consectetur veniam elit do sint.
Login to see this section
Description

This lecture covers the transition from a secure channel to secure communications, focusing on the case study of the biometric passport. Topics include RFID technology, ICAO standards, identity examples, MRTD advantages and problems, EAC, LDS structure, SOD structure, PKI, access control, active authentication, and cryptographic protocols. The instructor, Serge Vaudenay, discusses security and privacy issues, cryptographic trilogy concepts, confidentiality, integrity, authenticity, MAC, and symmetric cryptography constructions.

Instructor
commodo consequat et labore
Eu veniam voluptate magna veniam laboris labore sint Lorem reprehenderit do anim. Consequat ea deserunt occaecat nulla cillum. Ipsum do sit aliqua et laborum exercitation aliquip. Et voluptate minim eiusmod ullamco proident cillum laborum ad culpa. Cillum occaecat aute commodo dolore aliqua cupidatat. Sit minim sit in et enim reprehenderit veniam dolor pariatur id occaecat incididunt irure quis. Reprehenderit enim dolore non culpa et labore fugiat aliqua tempor irure do id minim incididunt.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (49)
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
Access Control: Password-based Cryptography
Explores access control and password-based cryptography, including challenges, biometrics, and the biometric passport case study.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Trust Establishment: Cryptography and Security
Explores trust establishment in cryptography and security, covering secure channels, PKI vulnerabilities, and diverse cryptographic models.
Cryptographic Security Fundamentals
Covers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.