Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.

Slides:



Advertisements
Similar presentations
A proposed Trusted-Flow system architecture with aspect-oriented implementation Paolo Falcarin, Mario Baldi Riccardo Scandariato, Maurizio Morisio (Politecnico.
Advertisements

Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
January 2011 As a precaution, re-check the exam time in early January. Various rooms are used, your room will be on your personal timetable, available.
FIT3105 Smart card based authentication and identity management Lecture 4.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
CPE 5002 Network security. Look at the surroundings before you leap.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Key Action II - Objectives Support the development and adoption of novel IST solutions for eCommerce & eWork aimed at enhancing: Support the development.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Dr. Nazar Abbas Saqib.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Smart Card Technology & Features
Applying White-Box Cryptography SoBeNet user group meeting October 8, 2004 Brecht Wyseur.
Network security Network security. Look at the surroundings before you leap.
Chapter 4 Application Level Security in Cellular Networks.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
1 Project Proposals for MAI from COSIC Oct. 6th, pm.
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
TRUSTED FLOW: Why, How and Where??? Moti Yung Columbia University.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Security of the Internet of Things: perspectives and challenges
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
TAG Presentation 18th May 2004 Paul Butler
Information Security, Theory and Practice.
Security Outline Encryption Algorithms Authentication Protocols
Overview on Hardware Security
Crypto in information security
Comments on 18 mitigations proposed by OICA(TFCS-06-11)
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
TAG Presentation 18th May 2004 Paul Butler
CSCE 715: Network Systems Security
Exam Review.
Message Digest Cryptographic checksum One-way function Relevance
DISSERTATION ON CRYPTOGRAPHY.
Web Information Systems Engineering (WISE)
Hashing Hash are the auxiliary values that are used in cryptography.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient Intelligence: more and more miniaturized computing circuits are becoming ubiquitous, including smart cards (for banking, GSM, UMTS, pay-TV, ID-cards or electronic passports applications), RFID tags, personal digital assistants, MP3 readers, etc.: Revisit the three main paradigms of cryptology: encryption, electronic signature and authentication, in the context of embedded systems, and to focus on the special case of executable codes.. Context Project Contact : Pr. Louis Goubin Laboratoire PRiSM – Université de Versailles St-Quentin-en-Yvelines 45 avenue des Etats-Unis – Versailles Cedex – France Tél : Confidentiality of Executable Code: Further study of recent attack models, taking into account the physical nature of computations within embedded systems. Rigorous study of the « code obfuscation » concept: analysis of the cryptographic strength, proposal of new schemes. Code Integrity and authenticity: Architectures for externalized code. Study of their security, by extending if needed already existing cryptographic protocols (which have often been designed for static objects and not for dynamic objects). Security Proofs and Formal Methods: Applications of « proof carrying code » methods for a potentially malicious code. More generally, define and implement specification tools that include security policies in the context of distributed systems. Scientific Goals Physical attacks against embedded systems: publication of new results and countermeasures. Code obfuscation: modelization, analysis of existing solutions and proposal of new schemes. Modelization of security requirements when the executable code is implemented in an external device (e.g. a terminal). Study of new induced threats, and design of new strategies to thwart them. Dissemination of new obtained results: academic publications, participation to international confrences, demonstrations of new architectures. Organization of a workshop in 2009, on « Cryptography for the Security of Embedded Systems ». Outputs and Expected Results Improving the security of smart card based applications: define a secure environment for « big size » complex application. Application of code obfuscation to intellectual property protection for software, especially through the use of « watermarking » systems. Realization of a secure platform (hardware and software) based on a « smart card network » (grid, network, mobile network, etc). Applications PRiSM Laboratory (Versailles St-Quentin- en-Yvelines University): expertise in multivariate cryptography, cryptanalysis, block ciphers, physical attacks, elliptic curve cryptography, hash functions. LaBRI (Bordeaux 1 University): expertise in formal methods and software architecture. LIENS (École normale supérieure): expertise in evaluation of cryptographic mechanisms. Partners Basic Principles CODE OBFUSCATION CODE EXTERNALIZATION A « mobile » code has to be carried together with a proof that it satisfies a security policy. The embedded system (« host ») only has to check the proof. PHYSICAL ATTACKS