Scurit Cryptologie et Codage des Systmes dInformation Grenoble

  • Slides: 7
Download presentation
Sécurité, Cryptologie et Codage des Systèmes d’Information Grenoble University Security, Cryptology and Coding of

Sécurité, Cryptologie et Codage des Systèmes d’Information Grenoble University Security, Cryptology and Coding of Information Systems History / Organization / Calendar u Objective u Content : 2 possible « tracks » : u F « M 2 P » SCCI : « M 2 R SCCI » F Yet: • « SAFE » : cursus en apprentissage, enseigné en Français u Some examples of Master thesis

Context - Objective n Context : expansion of networks and distributed applications FConfidentiality, Authentication,

Context - Objective n Context : expansion of networks and distributed applications FConfidentiality, Authentication, Integrity, Non-repudiation n Various applications and professional skills: F Enterprise specialised in security: solutions providers (hardware, software, smartcard, …); security audit, … F Specialized department of a company : bank, e-business, telecom, video, tv, … F Information system within a company: network/system administration Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ. ) Institut Fourier et Ensimag n Objective : formation of experts in security and coding technologies F F F n Cryptology : mathematical protocols (RSA, AES, ECC…) Security: software/hardware (network, system, integraton) Applications : watermarking, multimedia, smartcard, … Directed to profession (M 2 P) or to research (M 2 R)

Brief history & Organization n Master UJF-IPG Cryptologie, Sécurité, Codage de l’Information (2001…) u

Brief history & Organization n Master UJF-IPG Cryptologie, Sécurité, Codage de l’Information (2001…) u u n n From Sept 2007: international M 2 P – program taught in English u M 2 Security, Cryptology and Coding of Information Systems u Gathers French and English speaking students (2 groups of students) From Sept 2008: part of MOSIG International Master u u n Sept 2003: first promotion: 17 graduate students Up to Sept 2010: 198 graduated students (99 IPG, 99 UJF); 230 expected in 2011. Director UJF/IF : Philippe. [email protected] fr Co-director INP/ENSIMAG: Jean-Louis. [email protected] fr From Sept 2011: 2 academic programs: M 2 R and M 2 P SCCI F http: //www-ufrima. imag. fr/ue_filiere. php 3? filiere=M 2 RCRYPTO&id=739&lang=en F http: //www-ufrima. imag. fr/spip. php? article 49 F http: //www-fourier. ujf-grenoble. fr/enseignement/spip. php? rubrique 19 n From Sept 2011: can be attended as a standard track for ENSIMAG students u n « Grenoble-INP » semestre à choix Academic calendar: u u M 2 R : sept-january : courses / Feb-june: Master thesis M 2 P : sept-march: courses / April-sept: Master thesis) F mid-June: mid-term presentation and mid-September: Master thesis defense

M 2 - P Mosig SCCI (M 2 -P) Organization / Credits n n

M 2 - P Mosig SCCI (M 2 -P) Organization / Credits n n 27 ECTS Thèse de Master 3 ECTS UE Transversal (Anglais/Français/Histoire des sciences, …. ) 30 ECTS “scientifique/technique” u 15 ECTS Tronc commun u 12 ECTS Spécialisation au choix: “info” ou “math” u 3 ECTS = UE au choix (2 proposés, ouvert Master) General schedule for a 6 ECTS scientific module u 36 h lectures (in English) u + 24 h “training” in ½ group: TP/ Exercises/ Complements F 1 group taight in English + 1 group taught in French

Security, Cryptology and Coding of Information Systems Content / Credits for the Master degree

Security, Cryptology and Coding of Information Systems Content / Credits for the Master degree Non-elective Core Courses 18 ECTS Teaching teams Security models: proofs, protocols and politics 6 Autreau, Lafourcade, Roch Symmetric and asymmetric cryptology – PKI 6 Dumas, Elbaz-Vincent System administration and network security 3 Denneulin, Wagner, Marchand English or French 3 Pool Langues Elective A. Security of systems and infrastructures Advanced security of system and networks Hardware and embedded secure architectectures Distributed algorithms and fault-tolerance Deployment of a secure grid infrastructure 3 3 Wagner, Castellucia Leveugle Quéma, Anghel Denneulin, Wagner Elective B. Cryptology, coding and multimedia appl. Advanced cryptology: elliptic curves and cryptanalysis Multimedia applications and watermarking Error correcting codes and fault-tolerance 6 3 3 Elbaz-Vincent, Leprévost, Gillard Cayre, Ebrahimi, Bas Roch, Patchichkine, Brossier Elective 1. Smart card security, certification and norms 3 Autreau, Canovas, Potet Elective 2. Quantum cryptography, biometrics, pairings 3 Arrighi, Elbaz-Vincent Choose one of the two following elective 12 ECTS Choose one of the two following elective 3 ECTS

Parcours M 2 R Security and Cryptology n n Formation à la recherche en

Parcours M 2 R Security and Cryptology n n Formation à la recherche en SECR Travail individuel (lectures, no “training”, assignments) u n 1 ECTS = 24 H work = 6 h lectures + 18 h individual homework Aspects fondamentaux, aussi bien math que info u Common core: 24 ECTS F Security models: proofs, protocols and politics [6 ECTS] F Symmetric and asymmetric cryptology – PKI F System and Network Security • System administration and network security • Advanced security of system and networks F Advanced cryptology: elliptic curves and cryptanalysis u [6 ECTS] Elective. 6 ECTS F Either: [6 ECTS] • Smart card security, certification and norms • Quantum cryptography, biometrics, pairings F Or elective course in the M 2 MI [6 ECTS] • Requires validation by the program director [3 ECTS]

Examples of Master thesis n n n n n Integration of zero-knowledge authentication on

Examples of Master thesis n n n n n Integration of zero-knowledge authentication on smart card [C-S] Secure server for SIP telecommunications [INRIA] Integration of strong authentication in an information system [British Telecom] Management of identity for printer access [Helwett-Packard, Germany] Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris] Analysis and deployment of a confidential data service [Solucom, Nantes] Integration of biometrics in crypto protocols [SAGEM, Paris] Hidden channel attacks [SAGEM, Paris] Windows Card. Space components in a smart card [Gemalto, La Ciotat] Secure loading of jar in Java. Card 3. 0 [Gemalto, La Ciotat] Lightweight electronic signature [Dictao, Paris] Wireless infrastructure for emergency comm. [Wisecomm, Germany] Secure and anonymous communication on internet [UL, Luxembourg] Test of crypto-secure random generators [LTSI, Lyon] Security analysis of a medical data protection scheme [Philips, Eindhoven] Supervision of the CEA computer infrastructure [CEA, Grenoble] Security analysis of images watermarking [GIPSA, Grenoble] Security audit of the SCADA platform [Atos Origin, Grenoble]