You are on page 1of 27

A Seminar Report on

Cicret Braclet
Submitted to the Jai Narain Vyas University, Jodhpur
In Partial fulfillment of the requirement for the degree of
Bachelor of Computer Application
(Session 2013-16)

Submitted by
Bhavana Soni
Under the Guidance of
Miss Mamta Arora
(Assistant Professor)
Lucky Institute of Professional Studies
Affiliated to
Jai Narain Vyas University, Jodhpur
(2016)

CERTIFICATE
This is certify that Seminar report entitled Virtualization has been submitted to
Department of Computer Science of Lucky Institute of Professional Studies, Jodhpur in
partial fulfillment of the requirements for the award of the degree of BCA is the bonafide
work of Aaftab Ahmad who carried out the seminar under my supervision and
guidance.

Date: Guide Name :- Ms. Mamta Arora


(Assistant Professor)
DECLARATION

I Aaftab Ahmad hereby declare that this report entitled Virtualization is a record of
original work done by me under the supervision and Guidance of Ms. Mamta
Arora .The results embodied in this report have not been submitted to any other
university for the award of any degree.

Date: Student Name :- Bhavana Soni

Enrollment No:- 14R/51048

Signature.
INDEX
Slno Content Page
1 Introduction 5
2 What is CICRET? 6
3 CICRET App 6
4 CICRET Bracelet 7
5 The Founders Of CICRET 8
6 Components 10
6.1 Accelerometer 11
6.2Memory Card 11
6.3WIFI Component 11
6.4Micro USB Port 12
6.5 Proximity Sensor 12
6.6Pico-Projector 13
6.7 Bluetooth 13
6.8 LED 13
6.9 Snap Button 13
6.10 Battery 13
7 Characteristics 14
7.1Key features of the CICRET 14
7.2Limitations 15
8 Conclusion 16
9 Bibliography 17

INTRODUCTION
We are living in a world where the security of data has the upmost priority of all. The
world around us is evolving each and every single minute. Social networking is the
powerful aspect now. People want their life to be easy and needs a smooth movement
towards the future. The developers took this into account to create the next revolution
technology CICRET.
CICRET is the developed based on the cloud technology. Cicret is the technology of the
future. Cicret consists of 2 parts. 1 is the application part and the other is a wearable
bracelet. The Cicret App is the only intuitive, secure and free solution for those who want
to chat, share and exchange safely with no chance of being traceable. The app is an
innovative encrypted technology providing anonymity and full control on all contents
you have shared, even after sending them. It allows you to give all your personal
information always with you, on your arm. The idea came from the opinion that the cloud
system is not safe and there is no other place to protect your digital privacy than yourself.
Cicret is the next level technology thats easy to adapt to human environment and it
would make Google Glass a primitive technology in the year 2015 when its expected to
be released.

WHAT IS CICRET
CICRET is the combination of two parts
1 CICRET APP
2 CICRET BRACELET
Its the combination of two products with a single idea: to give you the control.

CICRET APP
The CICRET is the only intuitive, secure and free solution for those who want to chat,
share and exchange safely with no chance of being traceable. Its an innovative encrypted
technology providing anonymity and full control on all contents you have shared, even
after sending them. The CICRET app available on Android.

Features:
Timer : Define the life time of your outbox contents, by the duration or by the
number of views.
Edit : Remotely adjust whatever you sent.
Delete : Remotely erase whatever you wrote.
Exchange whatever you want with whoever you want (Pictures, Videos,
Document, Notes, Audio etc)
Stores a file on your computer and remotely gets it back on your smart phone via
CICRET
Only those to whom you gave your ID, CICRET can contact you and vice versa.
Data access at anywhere at any time.

CICRET BRACELET

With the Cicret Bracelet, you can make your skin your new touchscreen. making it possible for
you to Read your mails, play your favourite games, answer your calls, check the weather, find your
way without having to take out your phone. Do whatever you want on your arm.

Its called CICRET, a spook on SECRET."With the Cicret Bracelet,

THE FOUNDERS OF CICRET

At the beginning, four guys who believed in a crazy idea they are
Guillaume Pommier, Incharge of concept, Marketing and Finance/press
relations.
Fabien Noblet, Incharge of technology and market.
Pascal Pommier , Incharge of technology ,Software and Stratogy.

Nicolus Cruchon, Incharge of design,Web marketing.


Guillaume Pommier Fabien Noblet
VP,Founder, Founder,
Concept, Marketing & Finance / Press relations. Technology &Hardware.

Nicolas Cruchon Pascal Pommier


Founder, Founder,
Creative Marketing and Social Media. Strategic and technology senior advisor.

The company which owns the Cicret bracelet is CN2P SAS, registered in France
at La Grande Arche Paroi Nord Puteaux , 92044 Paris La Defense Cedex. This company
has been created in December 2014.The CEO of this company is M. Pascal Pommier.
Pascal is in charge of Technology, Software and Strategy. The rest of the team is
composed by Guillaume Pommier, in charge of Sales, Marketing and PR. Nicolas
Cruchon, Incharge of Creative Marketing. And Fabien Noblet, Incharge of Technology
and Hardware.
This company owns the patents that protect the concept and the technologies of
the Cicret bracelet.
COMPONENTS
The CICRET bracelet is the aggregation of many components:
Accelerometer
Memory Card
ROM
Processor
Vibrator
Micro USB port
Battery
Proximity Sensor (Long Range)
Pico Projector
Bluetooth
Wifi Component
LED
Snap Button
ACCELEROMETER

Accelerometers are used to detect and monitor vibration in rotating machinery.


Accelerometers are used in tablet computers and digital cameras so that images on
screens are always displayed upright. Accelerometers are used in drones for flight
stabilisation. In smart phones the display gets tilted automatically to adjust to users view
due to the working of the accelerometer.

In CICRET, when the bracelet is shook twice, it gets activated and when shooked again
puts it in a sleep mode.

MEMORY CARD
A memory card or flash card is an electronic flash memory data storage device used for
storing digital information. These are commonly used in many electronic devices,
including digital cameras, mobile phones, laptop computers, MP3 playersand video game
consoles, Tablets. Most of these can be diminutive, re-recordable, and can retain data
without power. 16 to 32GB is currently available for CICRET.

WIFI COMPONENT
The wifi component enables connection between the smart phone and the CICRET
bracelet as long as there is an internet connection available for the two devices.

MICRO USB PORT


CICRET bracelet has a micro USB port to connect to the system for data transfer between
the system and the bracelet. Exchange of informations could include images, music,
document etc

PROXIMITY SENSOR (LONG RANGE)

Is a sensor able to detect the presence of nearby objects without any physical contact. A
proximity sensor often emits an electromagnetic field or a beam of electromagnetic
radiation (infrared, for instance), and looks for changes in the field or return signal. The
object being sensed is often referred to as the proximity sensor's target. Different
proximity sensor targets demand different sensors.
The picoprojector projects the interface to our arm. When you place your finger on your
interface, it stops one of the 8 long range PROXIMITY SENSOR. The SENSOR sends
back the information to the processor place in the CICRET bracelet.

BLUETOOTH
When internet connection is unavailable the CICRET app and bracelet can be connected
via Bluetooth and also the Bluetooth can be used to exchange data/information to other
devices.

PICOPROJECTOR
Its technology that applies the use of an image projector in an handheld device. It is a
response to the emergence/development of compact portable devices such as mobile
phones, personal digital assistants, and digital cameras, which have sufficient storage
capacity to handle presentation materials but little space to accommodate an
attached display screen. Handheld projectors involve miniaturized hardware and software
that can project digital images onto any nearby viewing surface
LED
The LED is used to show notifications and is used to show the working of a process.

SNAP BUTTON
The snap button is a power switch that turns the CICRET bracelet on and off.

BATTERY
CICRET uses a battery that is to provide 8 hours of lifetime continuously.

CHARACTERISTICS
With wearables gaining some traction, smartphones and tablets are by no means the only
mobile devices around nowadays. Now, though, Cicret is looking to take things a step
farther and turn your arm into a smartphone.
KEY FEATURES OF THE CICRET

The band is waterproof and can be used as a standalone device or along with
the Smartphone.
We can send and receive email, browse the web and play games.
Cicret Bracelet will allow you to access almost all the functions from your arm
without holding the gadget every time.
It would be so much easier being able to walk around without having to carry
my big chunky smartphone (which is honestly the size of a brick) along with me.
I can just leave it in my bag, and get all I need to get done via the Cicret
Bracelet.
For ladies, we wont have to worry about missing a call because our phone was
on silent and in the bag or having to take out our laptops or phones every time
we need to send an email or a message. It would all be right there on our wrist, at
our convenience.
It will also be possible for users to pair it with an existing smartphone, answer
incoming phone calls and activate the speakerphone functionality on their
smartphone.
Flick, swipe, pinch and zoom functionality will be supported along with tap to
text.

The younger generation expressed mainly one genuine concern, So will everyone be
able to see what I do online? It looks like its hard to hide if you want to type a message
in private! .For that reason the cicret team created a Cicret app. The Cicret App, is a
simple messaging service that gives you a free and secure chat solution, for those who
want to chat, share, and exchange safely without being traceable. This technology
provides anonymity and full control on all contents you have shared, even after you have
sent them. Meaning, all your messages can be edited even after you have sent it. So now,
pressing that Send button wont be as stressful as it used to be!
There are potential advantages to turning ordinary objects (or, in this case, limbs) into
mobile devices, but projected touch screens typically lack the responsiveness and visual
clarity of the glass screens were used to. It should be interesting to see if the Cicret
Bracelet can improve on the technology, to make something wed actually want to use.
The device will allow users to send and receive emails, browse the web and play games.
It will also be possible for users to pair it with an existing smartphone, answer incoming
phone calls and activate the speakerphone functionality on their smartphone.

LIMITATIONS
Low battery service
Connectivity

CONCLUSION
This product is still in its prototype phase and has not officially been launched yet. The
creators of The Cicret have built a website to explain the details of their vision and have
uploaded a video for us to get a bigger picture too. The cicret is an impressive technology
that eliminates a number of inconveniences experienced by smartphone users.The
philosophy of the cicret team in creating the cicret bracelet is to
Break the rules.
Delete every screens.
Turn any surfaces into a touch screen.
Make technology invisible.
As green as possible.
Till now 8,641 donors were joined and the team have reached their goal up to
83.2%. Although the Cicret bracelet and app may not be impossible to develop with
current technology, it's also not a device that actually exists at this stage. While an
eventual working Cicret could one day be real, it's also possible the concept will graduate
to the realm of vaporware.
Make your skin, your new tablet with the CICRET BRACELET
BIBLIOGRAPHY
http://www.cicret.com/wordpress/
http://en.wikipedia.org/wiki/Advanced_Encryption_Standardwww.cicret.com
http://en.wikipedia.org/wiki/RSA_(cryptosystem)www.cicret.com
http://en.wikipedia.org/wiki/Public-key_cryptography
https://www.youtube.com/watch?v=9J7GpVQCfms
https://www.youtube.com/watch?v=vBum40uRTxc
http://www.cicret.com/wordpress/?p=17836
https://www.lri.fr/~fmartignon/documenti/systemesecurite/5-AES.pdf
http://aesencryption.net/
WORKING

The working of CICRET could be explained in 5 steps.


STEP 1: Download CICRET
STEP 2: ID Generation
STEP 3: AES Key Generation
STEP 4: RSA Key Generation
STEP 5: Encrypted Communication

These 5 steps are explained in detail below to fully understand the proper working of the
CICRET.

STEP 1 :DOWNLOAD CICRET


The CICRET application is available on android play store. Downloading and installation
process is as easy as any app.

STEP 2 :ID GENERATION


As the app gets started for the first time, it asks for user password. When the user
password is entered and is recognized as the key.

STEP 3 :AES KEY GENERATION


The AES stands for Advanced Encryption Standard. This standard was established by the
US NIST(National Institute of Standards and Technologies). AES is based on Rjindael
Cipher.
In CICRET,we use AES-256 encryption. The AES 256 has the following peculiarities:
Key Length :8
Block Size : 32 Bytes
Number of Rounds : 14
AES-256 means that there could be 2256 possible keys. A PC that uses 255keys per second
needs 149 billion years to break AES 256.
A single round in AES-256 consist of 4 stages.
1 Sub-Bytes Transformation
2 Shift Row
3 Mix Columns
4 Add Round Key

The AES algorithm operations are performed on a two dimension array of bytes called
States.

AES Encryption
The above figure shows the encryption of the AES 128. Here plain text of 128 bits are
copied to a 4x4 bytes matrix states. A key of M bytes are expanded and added with the
states. Based on the type of AES used, here we use AES-128, we perform 10 rounds of
encryption. Where each round would perform the 4 stages (as mentioned above) based on
the number of rounds. The number of rounds are based on the type of AES used.
AES-128 : 10 Rounds
AES-256 : 14 Rounds
As in the figure showed above, the AES key is expanded each round and is added during
the stage Add Round Key. W represents the word and the parameters specify the word
number.
W[0,3] Word 0 to Word 3. The figure below shows the key expansion during each
round.
STAGE 1 :Add Round Key
In this method, the key is added with the state S to produce a new state S.
STAGE 2 :Sub-Byte Transformation
In Sub-Byte Transformation, byte by byte transformation takes place.

Each byte in S(row,column) is transformed to S(row,column) using S-Box Table. The S-Box Table
diagram is shown below.

In the table above we can see that the hexadecimal 53is replaced with ED.
The figure bellows provides a bit more detailed understanding about Sub Byte
Transformation.

STAGE 3 :Shift Row


Here in this method, circular left shift happens based on the row number.

STAGE 4 :Mix Column


In this method the matrix is multiplied with a column and the result is stored in another
column in S.
In

AES-256 encryption each method is executed 14 rounds one by one to complete the
encryption. To decrypt the content we need the same key and we need to inverse the
encryption process. Decryption without the key is practically impossible.

The example for AES encryption is shown below:

Here we can see that the message: GOOD MORNING is encrypted with the key 123
and the encrypted message generated based on its algorithm is:
/gxCvp1k7zQYnYV7MnBoLG1EjxOmLw7cUVrVxUdwQu8=

STEP 4 : RSA KEY GENERATION


RSA is stands for the names of the 3 persons who designed it :Rivest, Shamir, Adleman.
RSA is the first public key cryptosystem and is widely in use for secure data
transmission. RSA follows asymmetric cryptography, which means that we use 2 keys for
encryption and decryption. The 2 keys are:
1 Public Key
2 Private Key
A Public Key which may be known by anybody, can be used to encrypt messages and to
verify signatures. The private key is known only to the recipient to decrypt the message
and create signatures.

Digital Signature
In CICRET, a unique RSA key is generated each time you add a contact and you
exchange with the server.

You might also like