Download presentation
Presentation is loading. Please wait.
Published byJocelyn Callahan Modified over 11 years ago
1
Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST
2
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20102 Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentification 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods
3
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20103 Recap –Security Assessment Common Criteria general model catalogue of recommendations: threats, goals, requirements guideline on evaluation methodology and process (EAL)
4
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20104 Cryptology
5
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20105 Cryptosystems
6
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20106
7
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20107 Stream Cyphers and Block Cyphers
8
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20108 Cryptanalysis
9
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20109 Attack Models
10
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201010 Cypher Classification
11
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201011
12
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201012
13
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201013
14
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201014 DES, Data Encryption Standard
15
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201015
16
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201016 AES, Advanced Encryption Standard
17
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201017 AES rounds
18
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201018
19
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201019 Implementations
20
6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201020 Evaluating Block Cyphers
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.