Date post: | 26-Mar-2015 |
Category: |
Documents |
Upload: | jocelyn-callahan |
View: | 214 times |
Download: | 0 times |
Information Security of Embedded Systems
9.1.2010: Design of Secure Systems
Prof. Dr. Holger SchlingloffInstitut für Informatik
undFraunhofer FIRST
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 2
Structure
1. Introductory example2.Embedded systems
engineering1. definitions and terms2. design principles
3.Foundations of security1. threats, attacks, measures2. construction of safe
systems
4.Design of secure systems1. design challenges2. safety modelling and
assessment3. cryptographic algorithms
5. Communication of embedded systems
1. remote access2. sensor networks
6. Algorithms and measures
1. digital signatures2. key management3. authentification4. authorization
7. Formal methods for security
1. protocol verification2. logics and proof
methods
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 3
Recap –Security Assessment
• Common Criteria general model catalogue of recommendations: threats, goals, requirements guideline on evaluation methodology and process (EAL)
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 4
Cryptology
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 5
Cryptosystems
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 6
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 7
Stream Cyphers and Block Cyphers
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 8
Cryptanalysis
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 9
Attack Models
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 10
Cypher Classification
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 11
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 12
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 13
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 14
DES, Data Encryption Standard
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 15
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 16
AES, Advanced Encryption Standard
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 17
AES rounds
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 18
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 19
Implementations
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 20
Evaluating Block Cyphers