Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST
Embedded Security © Prof. Dr. H. Schlingloff Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentification 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods
Embedded Security © Prof. Dr. H. Schlingloff Recap –Security Assessment Common Criteria general model catalogue of recommendations: threats, goals, requirements guideline on evaluation methodology and process (EAL)
Embedded Security © Prof. Dr. H. Schlingloff Cryptology
Embedded Security © Prof. Dr. H. Schlingloff Cryptosystems
Embedded Security © Prof. Dr. H. Schlingloff 20106
Embedded Security © Prof. Dr. H. Schlingloff Stream Cyphers and Block Cyphers
Embedded Security © Prof. Dr. H. Schlingloff Cryptanalysis
Embedded Security © Prof. Dr. H. Schlingloff Attack Models
Embedded Security © Prof. Dr. H. Schlingloff Cypher Classification
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff DES, Data Encryption Standard
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff AES, Advanced Encryption Standard
Embedded Security © Prof. Dr. H. Schlingloff AES rounds
Embedded Security © Prof. Dr. H. Schlingloff
Embedded Security © Prof. Dr. H. Schlingloff Implementations
Embedded Security © Prof. Dr. H. Schlingloff Evaluating Block Cyphers