Download presentation
Presentation is loading. Please wait.
1
Information Security of Embedded Systems 9.1.2010: Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST
2
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20102 Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentification 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods
3
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20103 Public Key Cryptosystems
4
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20104 General Idea
5
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20105 Asymmetric Cryptosystems
6
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20106 Danger of Spoofing!
7
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20107 RSA (1978) http://people.csail.mit.edu/rivest/Rsapaper.pdf
8
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20108 RSA Preliminaries
9
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20109
10
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201010 RSA Key Generation
11
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201011
12
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201012 Keys in RSA
13
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201013 Sending Messages from A to B
14
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201014
15
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201015 Correctness of RSA
16
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201016 Euler’s theorem
17
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201017 Lemmas for Euler’s Theorem
18
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201018 Proof of Lemma3
19
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201019 Proof of Euler’s Theorem
20
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201020
21
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201021 Algorithms for the Implementation
22
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201022 Primality Test: Rabin-Miller
23
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201023 Encoding / Decoding
24
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201024 Security of RSA
25
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201025 Latest News http://de.wikinews.org/wiki/RSA-Veschl%C3%BCsselung_mit_768_Bit_geknackt
26
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201026 Latest News http://de.wikinews.org/wiki/RSA-Veschl%C3%BCsselung_mit_768_Bit_geknackt
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.