Scurit Cryptologie et Codage des Systmes dInformation Grenoble







- Slides: 7

Sécurité, Cryptologie et Codage des Systèmes d’Information Grenoble University Security, Cryptology and Coding of Information Systems History / Organization / Calendar u Objective u Content : 2 possible « tracks » : u F « M 2 P » SCCI : « M 2 R SCCI » F Yet: • « SAFE » : cursus en apprentissage, enseigné en Français u Some examples of Master thesis

Context - Objective n Context : expansion of networks and distributed applications FConfidentiality, Authentication, Integrity, Non-repudiation n Various applications and professional skills: F Enterprise specialised in security: solutions providers (hardware, software, smartcard, …); security audit, … F Specialized department of a company : bank, e-business, telecom, video, tv, … F Information system within a company: network/system administration Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ. ) Institut Fourier et Ensimag n Objective : formation of experts in security and coding technologies F F F n Cryptology : mathematical protocols (RSA, AES, ECC…) Security: software/hardware (network, system, integraton) Applications : watermarking, multimedia, smartcard, … Directed to profession (M 2 P) or to research (M 2 R)

Brief history & Organization n Master UJF-IPG Cryptologie, Sécurité, Codage de l’Information (2001…) u u n n From Sept 2007: international M 2 P – program taught in English u M 2 Security, Cryptology and Coding of Information Systems u Gathers French and English speaking students (2 groups of students) From Sept 2008: part of MOSIG International Master u u n Sept 2003: first promotion: 17 graduate students Up to Sept 2010: 198 graduated students (99 IPG, 99 UJF); 230 expected in 2011. Director UJF/IF : Philippe. [email protected] fr Co-director INP/ENSIMAG: Jean-Louis. [email protected] fr From Sept 2011: 2 academic programs: M 2 R and M 2 P SCCI F http: //www-ufrima. imag. fr/ue_filiere. php 3? filiere=M 2 RCRYPTO&id=739&lang=en F http: //www-ufrima. imag. fr/spip. php? article 49 F http: //www-fourier. ujf-grenoble. fr/enseignement/spip. php? rubrique 19 n From Sept 2011: can be attended as a standard track for ENSIMAG students u n « Grenoble-INP » semestre à choix Academic calendar: u u M 2 R : sept-january : courses / Feb-june: Master thesis M 2 P : sept-march: courses / April-sept: Master thesis) F mid-June: mid-term presentation and mid-September: Master thesis defense

M 2 - P Mosig SCCI (M 2 -P) Organization / Credits n n 27 ECTS Thèse de Master 3 ECTS UE Transversal (Anglais/Français/Histoire des sciences, …. ) 30 ECTS “scientifique/technique” u 15 ECTS Tronc commun u 12 ECTS Spécialisation au choix: “info” ou “math” u 3 ECTS = UE au choix (2 proposés, ouvert Master) General schedule for a 6 ECTS scientific module u 36 h lectures (in English) u + 24 h “training” in ½ group: TP/ Exercises/ Complements F 1 group taight in English + 1 group taught in French

Security, Cryptology and Coding of Information Systems Content / Credits for the Master degree Non-elective Core Courses 18 ECTS Teaching teams Security models: proofs, protocols and politics 6 Autreau, Lafourcade, Roch Symmetric and asymmetric cryptology – PKI 6 Dumas, Elbaz-Vincent System administration and network security 3 Denneulin, Wagner, Marchand English or French 3 Pool Langues Elective A. Security of systems and infrastructures Advanced security of system and networks Hardware and embedded secure architectectures Distributed algorithms and fault-tolerance Deployment of a secure grid infrastructure 3 3 Wagner, Castellucia Leveugle Quéma, Anghel Denneulin, Wagner Elective B. Cryptology, coding and multimedia appl. Advanced cryptology: elliptic curves and cryptanalysis Multimedia applications and watermarking Error correcting codes and fault-tolerance 6 3 3 Elbaz-Vincent, Leprévost, Gillard Cayre, Ebrahimi, Bas Roch, Patchichkine, Brossier Elective 1. Smart card security, certification and norms 3 Autreau, Canovas, Potet Elective 2. Quantum cryptography, biometrics, pairings 3 Arrighi, Elbaz-Vincent Choose one of the two following elective 12 ECTS Choose one of the two following elective 3 ECTS

Parcours M 2 R Security and Cryptology n n Formation à la recherche en SECR Travail individuel (lectures, no “training”, assignments) u n 1 ECTS = 24 H work = 6 h lectures + 18 h individual homework Aspects fondamentaux, aussi bien math que info u Common core: 24 ECTS F Security models: proofs, protocols and politics [6 ECTS] F Symmetric and asymmetric cryptology – PKI F System and Network Security • System administration and network security • Advanced security of system and networks F Advanced cryptology: elliptic curves and cryptanalysis u [6 ECTS] Elective. 6 ECTS F Either: [6 ECTS] • Smart card security, certification and norms • Quantum cryptography, biometrics, pairings F Or elective course in the M 2 MI [6 ECTS] • Requires validation by the program director [3 ECTS]

Examples of Master thesis n n n n n Integration of zero-knowledge authentication on smart card [C-S] Secure server for SIP telecommunications [INRIA] Integration of strong authentication in an information system [British Telecom] Management of identity for printer access [Helwett-Packard, Germany] Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris] Analysis and deployment of a confidential data service [Solucom, Nantes] Integration of biometrics in crypto protocols [SAGEM, Paris] Hidden channel attacks [SAGEM, Paris] Windows Card. Space components in a smart card [Gemalto, La Ciotat] Secure loading of jar in Java. Card 3. 0 [Gemalto, La Ciotat] Lightweight electronic signature [Dictao, Paris] Wireless infrastructure for emergency comm. [Wisecomm, Germany] Secure and anonymous communication on internet [UL, Luxembourg] Test of crypto-secure random generators [LTSI, Lyon] Security analysis of a medical data protection scheme [Philips, Eindhoven] Supervision of the CEA computer infrastructure [CEA, Grenoble] Security analysis of images watermarking [GIPSA, Grenoble] Security audit of the SCADA platform [Atos Origin, Grenoble]
Systmes dinformation fondements des systmes dinformation Le cours
Les systmes dinformation Mthodologie des systmes dinformation 1
Numrisation et codage de linformation Codage de la
Le codage Vigenre Le codage Vigenre consiste utiliser
Introduction Management des systmes dinformation Introduction Grenoble INP