+ All Categories
Home > Documents > Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger...

Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger...

Date post: 26-Mar-2015
Category:
Upload: jocelyn-callahan
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
20
Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST
Transcript
Page 1: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

Information Security of Embedded Systems

9.1.2010: Design of Secure Systems

Prof. Dr. Holger SchlingloffInstitut für Informatik

undFraunhofer FIRST

Page 2: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 2

Structure

1. Introductory example2.Embedded systems

engineering1. definitions and terms2. design principles

3.Foundations of security1. threats, attacks, measures2. construction of safe

systems

4.Design of secure systems1. design challenges2. safety modelling and

assessment3. cryptographic algorithms

5. Communication of embedded systems

1. remote access2. sensor networks

6. Algorithms and measures

1. digital signatures2. key management3. authentification4. authorization

7. Formal methods for security

1. protocol verification2. logics and proof

methods

Page 3: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 3

Recap –Security Assessment

• Common Criteria general model catalogue of recommendations: threats, goals, requirements guideline on evaluation methodology and process (EAL)

Page 4: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 4

Cryptology

Page 5: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 5

Cryptosystems

Page 6: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 6

Page 7: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 7

Stream Cyphers and Block Cyphers

Page 8: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 8

Cryptanalysis

Page 9: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 9

Attack Models

Page 10: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 10

Cypher Classification

Page 11: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 11

Page 12: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 12

Page 13: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 13

Page 14: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 14

DES, Data Encryption Standard

Page 15: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 15

Page 16: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 16

AES, Advanced Encryption Standard

Page 17: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 17

AES rounds

Page 18: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 18

Page 19: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 19

Implementations

Page 20: Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 20

Evaluating Block Cyphers


Recommended