Top Banner
2008-2009 Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who’s who Grenoble University
12

Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

Mar 19, 2016

Download

Documents

tejana

Grenoble University. Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems. Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who’s who. Context - Objective. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Sécurité, Cryptologie et Codage des Systèmes d’InformationSecurity, Cryptology and Coding of Information Systems

Context

General presentation1. Academic program, calendar2. Lectures/Tutoring organization

Administration, registration: who’s who

Grenoble University

Page 2: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Context - Objective Context : expansion of networks and distributed applications

Confidentiality, Authentication, Integrity, Non-repudiation

Various applications and professional skills: Enterprise specialised in security: solutions providers (hardware, software, smartcard, …);

security audit, … Specialized department of a company : bank, e-business, telecom, video, tv, … Information system within a company: network/system administration

Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ.) Institut Fourier et Ensimag + Dépt Telecom

Objective : formation of experts in security and coding technologies Cryptology : mathematical protocols (RSA, AES, ECC…) Security: software/hardware (network, system, integraton) Applications : watermarking, multimedia, smartcard, …

M2P : Directed to profession: sept-feb=lectures / march-sept internship/thesis

Page 3: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Brief history & organization Master UJF-INPG Cryptologie, Sécurité, Codage de l’Information (2001…)

Sept 2003: first promotion: 17 graduate students 148 graduate students up to sept 2009 (24 en sept 2008) From Sept 2007: international M2P – program taught in english From sept 2008: part of MOSIG International Master; From sept 2009: new calendar

M2P Security, Cryptology and Coding of Information Systems 2009-20010: 50 students: 14 ENSIMAG / 25 Institut Fourier / 11 Emirati (intl. coop) Gathers French and English speaking students (2 groups of students) Director UJF/IF : [email protected] Co-director INP/ENSIMAG: [email protected] Web:

http://www-ufrima.imag.fr/spip.php?article49 http://www-fourier.ujf-grenoble.fr/enseignement/spip.php?rubrique19

Page 4: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Calendar 2009-2010

Academic calendar:

mid-Sept -> March: courses (level 3) (Rem: 2 weeks optional pretraining early sept)

April -> September 30: (level 4)full-time internship (Master thesis) mid-june: mid-term presentation,

+ “PFE ingénieur” for ENSIMAG students mid-september: Master thesis defense

Validation: by “level” (~semester) Mark ≥ 10/20=50% to level 3 (courses)

No mark < 7 in global units Mark ≥ 10/20=50% to level 4 (thesis/project)

Page 5: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Organisation M2 Mosig SCCI (M2-P)

27 ECTS Master thesis 3 ECTS UE Transversal (English / French / … ) 30 ECTS “scientific/technology”

15 ECTS Common Core 12 ECTS Elective Specialization in Security (“math” or “info”) 3 ECTS = electve unit (2 proposed, but yet open to all units

proposed in Grenoble M2 Math-Info)

Page 6: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Security, Cryptology and Coding of Information SystemsM2 SCCI – 2009/2010

Non-elective Core Courses 18 ECTS ECTS Teaching teams

- Security models: proofs, protocols and politics 6 Autreau, Lafourcade, Roch

- Symmetric and asymmetric cryptology – PKI 6 Fousse, Elbaz-Vincent

- System administration and network security 3 Denneulin, Wagner, Marchand

- English or French 3 Pool Langues

Choose one of the two following elective 12 ECTS

Elective A. Security of systems and infrastructures- Advanced security of system and networks- Hardware and embedded secure architectectures - Distributed algorithms and fault-tolerance- Deployment of a secure grid infrastructure

3333

Wagner, CastelluciaLeveugleQuéma, AnghelDenneulin, Wagner

Elective B. Cryptology, coding and multimedia - Advanced cryptology:elliptic curves, cryptanalysis- Multimedia applications and watermarking- Error correcting codes and fault-tolerance

633

Elbaz-Vincent, Leprévost, GillardCayre, Ebrahimi, Bas Pernet; Patchichkine, Brossier

Choose one of the two following elective 3 ECTS- Elective 1. Smart card security, certif. and norms 3 Autreau, Buzon

- Elective 2. New trends in cryptography 3 Perdrix, Malha, Mainguet, Elbaz-Vincent

Page 7: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Examples of Master thesis Integration of zero-knowledge authentication on smart card [C-S] Secure server for SIP telecommunications [INRIA] Integration of strong authentication in an information system [British Telecom] Management of identity for printer access [Helwett-Packard, Germany] Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris] Analysis and deployment of a confidential data service [Solucom, Nantes] Integration of biometrics in crypto protocols [SAGEM, Paris] Hidden channel attacks [SAGEM, Paris] Windows CardSpace components in a smart card [Gemalto, La Ciotat] Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat] Lightweight electronic signature [Dictao, Paris] Wireless infrastructure for emergency comm. [Wisecomm, Germany] Secure and anonymous communication on internet [UL, Luxembourg] Test of crypto-secure random generators [LTSI, Lyon] Security analysis of a medical data protection scheme [Philips, Eindhoven] Supervision of the CEA computer infrastructure [CEA, Grenoble] Security analysis of images watermarking [GIPSA, Grenoble] Security audit of the SCADA platform [Atos Origin, Grenoble] ….

Page 8: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Organization of courses 1 ECTS Scientific Unit = 10h attendency M2P

3 ECTS = 30H classes / 45H practical work + Homework 18h lectures in English (~ 2 slots de 1h30 / week) + 12h “training” in ½-group: TP/ Exercises/complts

given twice: 1 group in English + 1 group in French => for each unit, choose either French or English, once!

Courses slots of 1.30 hours per week per student: 8h-9h30 / 9h45- 11h15 / 11h30-13h 13h30/15 / 15h15-16h45 / 17h-18h30

Additional tutoring (office hours) on request: see your professors

Page 9: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Elèves-ingénieur(double-inscription) Programme = M2 + Cours ingénierie additionnels

Anglais suivi à l’ENSIMAG (+ 2eme langue) Cours « smart card security » + NTC (ou dans le M2 MI) module « projet professionnel » constitué :

-  de la soutenance de stage 2A. -  du REX, le 1er octobre pm (retour d'expériences sur les stages)

un cours au choix: dans le module «environnement et culture » : les lundi après 16h30 Ou dans le module « sciences et pratiques du management » (les 21, 22 et 23) (négociation

partenariale, management de l'innovation, Les essentiels du management, Gestion de projet

PFE (juin) + Thèse Master (sept) + Sport, 3eme langue, …

Page 10: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Contacts and links Academic supervisors:

Director (UJF) Philippe Elbaz-Vincent [email protected] Co-director (INP) Jean-Louis Roch [email protected]

Administration: registration, timetable, … UJF: Sylviane El Gares [email protected] INP / ENSIMAG: Elena Leibowitch [email protected]

Links Planning, timetable: ADE

http://ade52-inpg.grenet.fr/ade/custom/modules/plannings/direct_planning.jsp?projectId=58&login=voirIMATEL&password=imatel&resources=895&days=0,1,2,3,4&displayConfId=6

Kiosk: https://intranet.ensimag.fr/KIOSK/MasterCSCI/ M2P SCCI http://www-fourier.ujf-grenoble.fr/enseignement/-Master-M2P-S-C-C-I.html MOSIG http://mosig.imag.fr/MainEn/Grenoble ENSIMAG http://www.ensimag.fr

Page 11: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

M2 courses Common core: cryptology and security [15 ECTS]

• Models for security • Symmetric and asymmetric cryptology - PKI infrastructures• System administration and network security

Elective specialization [12 ECTS] : choose one between Security of Information Systems [12 ECTS]

• Advanced system and network security• Secure hardware architecture• Distributed algorithms and fault-tolerance• Secure infrastructure deployment project

Cryptology, coding and multimedia applications [12 ECTS]• Advanced cryptology: elliptic curves, cryptanalysis• Multimedia applications, watermarking• Coding and fault-tolerance

Elective course unit [3 ECTS] : choose one between• Smart card security; audit and normalization [3 ECTS]• New trends in cryptology: quantum, biometrics, pairings [3 ECTS]

Master thesis [30 ECTS]

Note: early september: Specific optional introduction courses Math [group theory,arithmetics]; linux & programming ; information systems [UML]

Page 12: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Propositionparcours R crypto

Formation à la recherche en SCCI Aspects fondamentaux, aussi bien math que info

2 cours tronc commun (12 ECTS) Cours sécurité système et réseau avancée [spécialité info, 6 ECTS] Cours cryptologie avancée [spécialité math, 6 ECTS] 1 cours au choix dans le Master [6 ECTS]

A priori lié soit à la”spécialité”: info / math-app /math

M2R: Uniquement les cours obligatoires (pas les training) Mais travail personnel/assignments supplémentaires pour les M2R

Et évaluation différenciée (assignments et examen spécifique M2R) Possibilité aux étudiants M2R de suivre les training en “auditeur libre” ? (pas une

contrainte au niveau horaire) Cours terminés en janvier, projet final soutenu en juin