Information Security of Embedded Systems : Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST
Embedded Security © Prof. Dr. H. Schlingloff Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentification 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods
Embedded Security © Prof. Dr. H. Schlingloff Public Key Cryptosystems
Embedded Security © Prof. Dr. H. Schlingloff General Idea
Embedded Security © Prof. Dr. H. Schlingloff Asymmetric Cryptosystems
Embedded Security © Prof. Dr. H. Schlingloff Danger of Spoofing!
Embedded Security © Prof. Dr. H. Schlingloff RSA (1978)
Embedded Security © Prof. Dr. H. Schlingloff RSA Preliminaries
Embedded Security © Prof. Dr. H. Schlingloff 20109
Embedded Security © Prof. Dr. H. Schlingloff RSA Key Generation
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff Keys in RSA
Embedded Security © Prof. Dr. H. Schlingloff Sending Messages from A to B
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff Correctness of RSA
Embedded Security © Prof. Dr. H. Schlingloff Euler’s theorem
Embedded Security © Prof. Dr. H. Schlingloff Lemmas for Euler’s Theorem
Embedded Security © Prof. Dr. H. Schlingloff Proof of Lemma3
Embedded Security © Prof. Dr. H. Schlingloff Proof of Euler’s Theorem
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff Algorithms for the Implementation
Embedded Security © Prof. Dr. H. Schlingloff Primality Test: Rabin-Miller
Embedded Security © Prof. Dr. H. Schlingloff Encoding / Decoding
Embedded Security © Prof. Dr. H. Schlingloff Security of RSA
Embedded Security © Prof. Dr. H. Schlingloff Latest News
Embedded Security © Prof. Dr. H. Schlingloff Latest News