Beruflich Dokumente
Kultur Dokumente
CHAPTER 1
INTRODUCTION
ITwin was invented by an Indian named Lux Anantharaman. He has
completed a Bachelors degree in Electrical and Electronic Engineering. He
studied in IIT in Chennai and he completed a Masters degree from IISc in
Bangalore. Lux was completing a part-time MBA at NUS Business School
in Singapore, but he put studies on hold because of the potential of iTwin.
ITwin is completely new file sharing and remote access device developed
by a company named as iTwin. It is very similar like two ends of a cable,
but is does not need the cable. It is simpler to use than a flash drive. It is
just a plug and play device. With iTwin, it is possible to connect any two
online computers located anywhere in the world.
2
1.2 SPECIFICATIONS :
CHAPTER 2
CHARACTERISTICS
This feature enables you to observe the desktop of the main computer
an allows you to manage the device. This is very useful medium for
managing your computer from a remote position and it can also be used
to offer tech support to somebody who experiencing computer problems
without actually being seated in front of the PC.
2.2 Teleport Me :
The Teleport Me feature is the secret browsing tool that enables you to
surf the Internet lacking any limitations. Any websites that you open or
any information that you transmit passes through the protected Virtual
Private Network channel and uses the similar Internet connection that
your house or workplace PC uses.
The Teleport Me feature is a helpful tool, mainly if you are browsing the
Internet on hotel or other types of public wireless networks where security
is an important issue. Teleport Me takes care that your private information
is protected from snooping eyes. It also ensures that no one is tracking
your browsing movement. There are no browsing limits which denote that
6
you can browse your social media accounts, can watch programs, and
connect in any other activity you usually do online.
If they have one part of the iTwin device, you can access and managed the
Desktop and repair the problem.
2.6 FEATURES :
There are no subscription fees for file access. But you need to pay
for one-time for drop box account with unlimited storage, which is
included in device cost. So, no additional fees ever.
Additionally, you can setup password for your iTwin for more
security. It has also a feature to remotely disable connection to
computer with other half of iTwin. It even uses AES encryption in
order to transfer data securely.
Unplug iTwin and all temp files are cleared automatically. This is
very much useful when using a computer that doesn’t belong to you.
iTwin supports passwords of any length. Unlike other web and cloud
services, iTwin password is stored on itself, not on any server.
8
If you forget your password, simply pair both halves of your iTwin
and plug them into a computer and set a new password. There is no
need for any technical support.
CHAPTER 3
AES ENCRYPTION
AES(Advanced Encryption Standard) is a identification for the
encryption of electronic data established by the U.S National Institute Of
Standards And Technology(NIST) in 2001.
AES has been adopted by U.S government and it replaces the Data
Encryption Standard(DES), which was published in 1977.The algorithm
reported by AES is a symmetric-key algorithm, meaning the same key is
used for encrypting and decrypting the data.
For AES, NIST selected three members of the Rijndael family, each
with a block size of 128 bits, but three different key lengths: 128, 192 and
256 bits.
AES has been adopted by the U.S. government and is now used
worldwide. It supersedes the Data Encryption Standard (DES), which was
published in 1977. The algorithm described by AES is a symmetric-key
10
algorithm, meaning the same key is used for both encrypting and
decrypting the data.
For instance, if there are 16 bytes, these bytes are represented as this two-
dimensional array:
The key size used for an AES cipher specifies the number of
transformation rounds that convert the input, called the plaintext, into the
final output, called the ciphertext. The number of rounds are as follows:
AES requires a separate 128-bit round key block for each round plus
one more.
9, 11 or 13 rounds:
o AddRoundKey
o SubBytes
o ShiftRows
o AddRoundKey
13
In the SubBytes step, each byte in the state is replaced with its entry in
a fixed 8-bit lookup table, S; bij = S(aij).
In the SubBytes step, each byte in the state array is replaced with
a SubByte using an 8-bit substitution box. This operation provides the
non-linearity in the cipher. The S-box used is derived from
the multiplicative inverse over GF(28), known to have good non-linearity
properties.
In Shifted Rows step, bytes in each row of the state are shifted cyclically
to the left. The number of places the bytes are shifted differs from each
row.
14
The Shift Rows step operates on the rows of the state; it cyclically shifts
the bytes in each row by a certain offset. For AES, the first row is left
unchanged. Each byte of the second row is shifted one to the left.
Similarly, the third and fourth rows are shifted by offsets of two and
three respectively. In this way, each column of the output state of
the ShiftRows step is composed of bytes from each column of the input
state.
In the Mix Columns step, the four bytes of each column of the state are
combined using an invertible linear transformation. The Mix
Columns function takes four bytes as input and outputs four bytes, where
each input byte affects all four output bytes.
In the AddRoundKey step, the subkey is combined with the state. For
each round, a subkey is derived from the main key using Rijndael's key
schedule; each subkey is the same size as the state.
The subkey is added by combining each byte of the state with the
corresponding byte of the subkey using bitwise XOR.
16
possible key in sequence. A break can thus include results that are
infeasible with current technology.
The key space increases by a factor of 2 for each additional bit of key
length, and if every possible value of the key is equiprobable, this
translates into a doubling of the average brute-force key search time.
This implies that the effort of a brute-force search increases
exponentially with key length. Key length in itself does not imply
security against attacks, since there are ciphers with very long keys
that have been found to be vulnerable.
Since then, other papers have shown that the attack, as originally
presented, is unworkable; see XSL attack on block ciphers.
The practicality of these attacks with stronger related keys has been
criticized, for instance, by the paper on "chosen-key-relations-in-
the-middle" attacks on AES-128 authored by Vincent Rijmen in
2010.
This result has been further improved to 2126.0 for AES-128, 2189.9 for
AES-192 and 2254.3 for AES-256, which are the current best results
in key recovery attack against AES.
In October 2005, Dag Arne Osvik, Adi Shamir and Eran Tromer
presented a paper demonstrating several cache-timing attacks
against the implementations in AES found in Open SSL and
Linux's dm-crypt partition encryption function. One attack was able
to obtain an entire AES key after only 800 operations triggering
encryptions, in a total of 65 milliseconds.
21
In March 2016, Ashok kumar C., Ravi Prakash Giri and Bernard
Menezes presented a very efficient side-channel attack on AES
implementations that can recover the complete 128-bit AES key in
just 6–7 blocks of plaintext/ciphertext which is a substantial
improvement over previous works that require between 100 and a
million encryptions.
CHAPTER 4
SYMMETRIC KEY ALOGORITHM
Symmetric-key algorithms are algorithms for cryptography that use
the same cryptographic keys for both encryption of plaintext and
decryption of ciphertext. The keys may be identical or there may be a
simple transformation to go between the two keys. The keys, in practice,
represent a shared secret between two or more parties that can be used to
maintain a private information link. This requirement that both parties
have access to the secret key is one of the main drawbacks of symmetric
key encryption, in comparison to public-key encryption (also known as
asymmetric key encryption).
4.1 TYPES :
4.2 IMPLEMENTATIONS :
required one of those people to somehow receive a copy of that secret key
over a physically secure channel.
Beaufort cipher
Enigma machine
ROT13
XOR cipher
Vatsyayana cipher
26
CHAPTER 5
CRYPTOGRAPH
Cryptography involves creating written or generated codes that allow
information to be kept secret. Cryptography converts data into a format
that is unreadable for an unauthorized user, allowing it to be transmitted
without unauthorized entities decoding it back into a readable format,
thus compromising the data.
Information security uses cryptography on several levels. The
information cannot be read without a key to decrypt it. The information
maintains its integrity during transit and while being stored. Cryptography
also aids in nonrepudiation. This means that the sender and the delivery
of a message can be verified.
Cryptography also allows senders and receivers to authenticate each
other through the use of key pairs. There are various types of algorithms
for encryption, some common algorithms include :
Secret Key Cryptography (SKC): Here only one key is used for both
encryption and decryption. This type of encryption is also referred
to as symmetric encryption.
Public Key Cryptography (PKC): Here two keys are used. This type
of encryption is also called asymmetric encryption. One key is the
public key that anyone can access. The other key is the private key,
and only the owner can access it. The sender encrypts the
information using the receiver’s public key. The receiver decrypts
the message using his/her private key. For nonrepudiation, the
sender encrypts plain text using a private key, while the receiver
uses the sender’s public key to decrypt it. Thus, the receiver knows
who sent it.
27
Hash Functions: These are different from SKC and PKC. They use
no key and are also called one-way encryption. Hash functions are
mainly used to ensure that a file has remained unchanged.
5.2 Security:
The design and strength of all key lengths of the AES algorithm (i.e,
128,192 and 256) are sufficient to protect categorized information
up to the confidential level.
Highly confidential information requires use of either the 192 or 256
key lengths.
The implementation of AES in commodity deliberates to safeguard
national security systems and/or information must be evaluated
and certified by NSA prior to their accession and use.
When two parts of iTwin connect are attached together and inserted
into a computer, a arbitrary 256-bit cryptographic key is generated on-
board the iTwin device. This cryptographic key is shared among the two
halves of the iTwin device using the particular iTwin connector.
The cryptographic key never leaves the device. All data and
information transferred by means of the two halves of iTwin is encrypted
using this cryptographic key.
The user can ‘join up’ the device to generate the keys anytime and any
number of times. The keys are saved only inside the device and not known
to any other entity.
29
The password set for your iTwin is stored only on the two halves of your
iTwin and nowhere else.
C. Remote Disable
In the one half of the iTwin is lost; connection between the two halves
of the device can be disconnected using the Remote Disable Feature.
The shared cryptographic key stored in the two parts of the iTwin
device are used to produce session keys which protect all information
transmitted over the Internet using industrial strength AES-256 bit
encryption.
30
Every iTwin half has given a unique device ID and an linked device
authentication key, adapted during manufacturing.
Every iTwin device also carries certified public certificates of Twin Trust
servers, inserted during manufacturing. Before allowing any data transfer,
every iTwin is authenticated by iTwin's Twin Trust servers.
5.3 Performance:
High speed and low RAM requirements were benchmark of the AES
election process.
CHAPTER 6
ITwin USB
Access to computer's
Capacity entire 2GB to 256GB
hard drive & any
attached (depending on model).
storage.
Support encryption.
on AES 256-bit. Need
additional
software.
34
copy to be created on
office files remotely, other
computers.
Accidental
Delete present. Not present
Protection
CHAPTER 7
7.1 Advantages
One-time straight payment gives you lifetime access of the device.
It has secure military grade AES encryption ensures secure file and
data transport.
Small and easy to carry around just one device (single pairing)
37
7.2 Applications :
Most of the mobile professionals and individuals that want to access
their files and information in spite of where they are, select cloud
services for backing up and storing important documents.
A cloud service is suitable and enables you to access your files from
some device with an Internet connection.
On the other hand, not anything is one hundred percent perfect that
means a device like iTwin Connect can help you cover up all of your
bases in the event of data break or loss.
iTwin Connect device makes sure that your files reside private and
protected. as you own the device, it is just functional when attached
to the computer; it uses two-factor authentication and military grade
security, as well as performs functions that we have discussed in
this article.
Even if you leave the main computer powered up so you can connect
to it from any place, your data and records stay protected.
38
CHAPTER 8
CONCLUSION
ITwin is a extra-ordinary solution for users who wish to work from
home. They can remotely access, edit, and share files between home and
office computers. iTwin bypasses cloud services to turn your physical
storage into its own networking solution. Moreover, iTwin is simple plug
and play type device which solves drop box limitations extensively.
There's little doubt in our mind that the iTwin when used in single
form is pretty darn cool .The big update though is multiple user access,
which is where we feel the iTwin falls apart. For a very small group of two
or three people, it's not entirely onerous, but for groups any larger, the
pairing process and the requirement to have a full set of iTwins for every
user is a bit odd, so is the notion of keeping track of a dozen or more of
these iTwins in the host computer. For true multi-user access, iTwin is
going to need to figure out a way to pair additional iTwins with a single
iTwin host USB device, so users don't have to get a giant USB hub to
support a team of users or lug around another suitcase of parts if this is
a mobile platform.
39
REFERENCES :
[1] "USB ‘A’ Plug Form Factor Revision 1.0" (PDF). USB Implementers
Forum. 23 March 2005. p. 1. Retrieved 4 April 2012.
[4]. Michael F. Lewis (March 29, 2013). "Move over Al Gore, Kurt Vonnegut
invented the internet". Wordpress
[8]. Ranger, Steve (24 March 2015). "The undercover war on your internet
secrets: How online surveillance cracked our trust in the web".
TechRepublic. Archived from the original on 2016-06-12. Retrieved 2016-
06-12.
[9]. Doctorow, Cory (2 May 2007). "Digg users revolt over AACS key". Boing
Boing. Retrieved 26 March 2015.
[13]. Gannon, James (2001). Stealing Secrets, Telling Lies: How Spies and
Codebreakers Helped Shape the Twentieth Century. Washington, D.C.:
Brassey's.