Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security of Embedded Systems 9.1.2010: Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.

Similar presentations


Presentation on theme: "Information Security of Embedded Systems 9.1.2010: Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer."— Presentation transcript:

1 Information Security of Embedded Systems 9.1.2010: Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST

2 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20102 Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentification 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods

3 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20103 Public Key Cryptosystems

4 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20104 General Idea

5 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20105 Asymmetric Cryptosystems

6 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20106 Danger of Spoofing!

7 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20107 RSA (1978) http://people.csail.mit.edu/rivest/Rsapaper.pdf

8 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20108 RSA Preliminaries

9 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20109

10 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201010 RSA Key Generation

11 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201011

12 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201012 Keys in RSA

13 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201013 Sending Messages from A to B

14 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201014

15 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201015 Correctness of RSA

16 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201016 Euler’s theorem

17 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201017 Lemmas for Euler’s Theorem

18 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201018 Proof of Lemma3

19 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201019 Proof of Euler’s Theorem

20 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201020

21 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201021 Algorithms for the Implementation

22 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201022 Primality Test: Rabin-Miller

23 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201023 Encoding / Decoding

24 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201024 Security of RSA

25 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201025 Latest News http://de.wikinews.org/wiki/RSA-Veschl%C3%BCsselung_mit_768_Bit_geknackt

26 13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201026 Latest News http://de.wikinews.org/wiki/RSA-Veschl%C3%BCsselung_mit_768_Bit_geknackt


Download ppt "Information Security of Embedded Systems 9.1.2010: Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer."

Similar presentations


Ads by Google