context general presentation 1. academic program, calendar 2. lectures/tutoring organization

12
2008-2009 Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who’s who Grenoble University

Upload: tejana

Post on 19-Mar-2016

56 views

Category:

Documents


0 download

DESCRIPTION

Grenoble University. Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems. Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who’s who. Context - Objective. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Sécurité, Cryptologie et Codage des Systèmes d’InformationSecurity, Cryptology and Coding of Information Systems

Context

General presentation1. Academic program, calendar2. Lectures/Tutoring organization

Administration, registration: who’s who

Grenoble University

Page 2: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Context - Objective Context : expansion of networks and distributed applications

Confidentiality, Authentication, Integrity, Non-repudiation

Various applications and professional skills: Enterprise specialised in security: solutions providers (hardware, software, smartcard, …);

security audit, … Specialized department of a company : bank, e-business, telecom, video, tv, … Information system within a company: network/system administration

Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ.) Institut Fourier et Ensimag + Dépt Telecom

Objective : formation of experts in security and coding technologies Cryptology : mathematical protocols (RSA, AES, ECC…) Security: software/hardware (network, system, integraton) Applications : watermarking, multimedia, smartcard, …

M2P : Directed to profession: sept-feb=lectures / march-sept internship/thesis

Page 3: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Brief history & organization Master UJF-INPG Cryptologie, Sécurité, Codage de l’Information (2001…)

Sept 2003: first promotion: 17 graduate students 148 graduate students up to sept 2009 (24 en sept 2008) From Sept 2007: international M2P – program taught in english From sept 2008: part of MOSIG International Master; From sept 2009: new calendar

M2P Security, Cryptology and Coding of Information Systems 2009-20010: 50 students: 14 ENSIMAG / 25 Institut Fourier / 11 Emirati (intl. coop) Gathers French and English speaking students (2 groups of students) Director UJF/IF : [email protected] Co-director INP/ENSIMAG: [email protected] Web:

http://www-ufrima.imag.fr/spip.php?article49 http://www-fourier.ujf-grenoble.fr/enseignement/spip.php?rubrique19

Page 4: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Calendar 2009-2010

Academic calendar:

mid-Sept -> March: courses (level 3) (Rem: 2 weeks optional pretraining early sept)

April -> September 30: (level 4)full-time internship (Master thesis) mid-june: mid-term presentation,

+ “PFE ingénieur” for ENSIMAG students mid-september: Master thesis defense

Validation: by “level” (~semester) Mark ≥ 10/20=50% to level 3 (courses)

No mark < 7 in global units Mark ≥ 10/20=50% to level 4 (thesis/project)

Page 5: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Organisation M2 Mosig SCCI (M2-P)

27 ECTS Master thesis 3 ECTS UE Transversal (English / French / … ) 30 ECTS “scientific/technology”

15 ECTS Common Core 12 ECTS Elective Specialization in Security (“math” or “info”) 3 ECTS = electve unit (2 proposed, but yet open to all units

proposed in Grenoble M2 Math-Info)

Page 6: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Security, Cryptology and Coding of Information SystemsM2 SCCI – 2009/2010

Non-elective Core Courses 18 ECTS ECTS Teaching teams

- Security models: proofs, protocols and politics 6 Autreau, Lafourcade, Roch

- Symmetric and asymmetric cryptology – PKI 6 Fousse, Elbaz-Vincent

- System administration and network security 3 Denneulin, Wagner, Marchand

- English or French 3 Pool Langues

Choose one of the two following elective 12 ECTS

Elective A. Security of systems and infrastructures- Advanced security of system and networks- Hardware and embedded secure architectectures - Distributed algorithms and fault-tolerance- Deployment of a secure grid infrastructure

3333

Wagner, CastelluciaLeveugleQuéma, AnghelDenneulin, Wagner

Elective B. Cryptology, coding and multimedia - Advanced cryptology:elliptic curves, cryptanalysis- Multimedia applications and watermarking- Error correcting codes and fault-tolerance

633

Elbaz-Vincent, Leprévost, GillardCayre, Ebrahimi, Bas Pernet; Patchichkine, Brossier

Choose one of the two following elective 3 ECTS- Elective 1. Smart card security, certif. and norms 3 Autreau, Buzon

- Elective 2. New trends in cryptography 3 Perdrix, Malha, Mainguet, Elbaz-Vincent

Page 7: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Examples of Master thesis Integration of zero-knowledge authentication on smart card [C-S] Secure server for SIP telecommunications [INRIA] Integration of strong authentication in an information system [British Telecom] Management of identity for printer access [Helwett-Packard, Germany] Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris] Analysis and deployment of a confidential data service [Solucom, Nantes] Integration of biometrics in crypto protocols [SAGEM, Paris] Hidden channel attacks [SAGEM, Paris] Windows CardSpace components in a smart card [Gemalto, La Ciotat] Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat] Lightweight electronic signature [Dictao, Paris] Wireless infrastructure for emergency comm. [Wisecomm, Germany] Secure and anonymous communication on internet [UL, Luxembourg] Test of crypto-secure random generators [LTSI, Lyon] Security analysis of a medical data protection scheme [Philips, Eindhoven] Supervision of the CEA computer infrastructure [CEA, Grenoble] Security analysis of images watermarking [GIPSA, Grenoble] Security audit of the SCADA platform [Atos Origin, Grenoble] ….

Page 8: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Organization of courses 1 ECTS Scientific Unit = 10h attendency M2P

3 ECTS = 30H classes / 45H practical work + Homework 18h lectures in English (~ 2 slots de 1h30 / week) + 12h “training” in ½-group: TP/ Exercises/complts

given twice: 1 group in English + 1 group in French => for each unit, choose either French or English, once!

Courses slots of 1.30 hours per week per student: 8h-9h30 / 9h45- 11h15 / 11h30-13h 13h30/15 / 15h15-16h45 / 17h-18h30

Additional tutoring (office hours) on request: see your professors

Page 9: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Elèves-ingénieur(double-inscription) Programme = M2 + Cours ingénierie additionnels

Anglais suivi à l’ENSIMAG (+ 2eme langue) Cours « smart card security » + NTC (ou dans le M2 MI) module « projet professionnel » constitué :

-  de la soutenance de stage 2A. -  du REX, le 1er octobre pm (retour d'expériences sur les stages)

un cours au choix: dans le module «environnement et culture » : les lundi après 16h30 Ou dans le module « sciences et pratiques du management » (les 21, 22 et 23) (négociation

partenariale, management de l'innovation, Les essentiels du management, Gestion de projet

PFE (juin) + Thèse Master (sept) + Sport, 3eme langue, …

Page 10: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Contacts and links Academic supervisors:

Director (UJF) Philippe Elbaz-Vincent [email protected] Co-director (INP) Jean-Louis Roch [email protected]

Administration: registration, timetable, … UJF: Sylviane El Gares [email protected] INP / ENSIMAG: Elena Leibowitch [email protected]

Links Planning, timetable: ADE

http://ade52-inpg.grenet.fr/ade/custom/modules/plannings/direct_planning.jsp?projectId=58&login=voirIMATEL&password=imatel&resources=895&days=0,1,2,3,4&displayConfId=6

Kiosk: https://intranet.ensimag.fr/KIOSK/MasterCSCI/ M2P SCCI http://www-fourier.ujf-grenoble.fr/enseignement/-Master-M2P-S-C-C-I.html MOSIG http://mosig.imag.fr/MainEn/Grenoble ENSIMAG http://www.ensimag.fr

Page 11: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

M2 courses Common core: cryptology and security [15 ECTS]

• Models for security • Symmetric and asymmetric cryptology - PKI infrastructures• System administration and network security

Elective specialization [12 ECTS] : choose one between Security of Information Systems [12 ECTS]

• Advanced system and network security• Secure hardware architecture• Distributed algorithms and fault-tolerance• Secure infrastructure deployment project

Cryptology, coding and multimedia applications [12 ECTS]• Advanced cryptology: elliptic curves, cryptanalysis• Multimedia applications, watermarking• Coding and fault-tolerance

Elective course unit [3 ECTS] : choose one between• Smart card security; audit and normalization [3 ECTS]• New trends in cryptology: quantum, biometrics, pairings [3 ECTS]

Master thesis [30 ECTS]

Note: early september: Specific optional introduction courses Math [group theory,arithmetics]; linux & programming ; information systems [UML]

Page 12: Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

2008-2009

Propositionparcours R crypto

Formation à la recherche en SCCI Aspects fondamentaux, aussi bien math que info

2 cours tronc commun (12 ECTS) Cours sécurité système et réseau avancée [spécialité info, 6 ECTS] Cours cryptologie avancée [spécialité math, 6 ECTS] 1 cours au choix dans le Master [6 ECTS]

A priori lié soit à la”spécialité”: info / math-app /math

M2R: Uniquement les cours obligatoires (pas les training) Mais travail personnel/assignments supplémentaires pour les M2R

Et évaluation différenciée (assignments et examen spécifique M2R) Possibilité aux étudiants M2R de suivre les training en “auditeur libre” ? (pas une

contrainte au niveau horaire) Cours terminés en janvier, projet final soutenu en juin