Context
This presentation is the property of its rightful owner.
Sponsored Links
1 / 1

Cryptography for the Security of Embedded Systems PowerPoint PPT Presentation


  • 50 Views
  • Uploaded on
  • Presentation posted in: General

Context. Basic Principles. Ambient Intelligence: more and more miniaturized computing circuits are bec oming ubiquitous, including smart cards (for banking, GSM, UMTS, pay-TV, ID-cards or electronic passports applications), RFID tags, personal digital assistants, MP3 readers, etc. :

Download Presentation

Cryptography for the Security of Embedded Systems

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Cryptography for the security of embedded systems

Context

Basic Principles

  • Ambient Intelligence: more and more miniaturized computing circuits are becoming ubiquitous, including smart cards (for banking, GSM, UMTS, pay-TV, ID-cards or electronic passports applications), RFID tags, personal digital assistants, MP3 readers, etc.:

  • Revisit the three main paradigms of cryptology: encryption, electronic signature and authentication, in the context of embedded systems, and to focus on the special case of executable codes..

Scientific Goals

  • Confidentiality of Executable Code:

    • Further study of recent attack models, taking into account the physical nature of computations within embedded systems.

    • Rigorous study of the « code obfuscation » concept: analysis of the cryptographic strength, proposal of new schemes.

  • Code Integrity and authenticity:

    • Architectures for externalized code.

    • Study of their security, by extending if needed already existing cryptographic protocols (which have often been designed for static objects and not for dynamic objects).

  • Security Proofs and Formal Methods:

    • Applications of « proof carrying code » methods for a potentially malicious code.

    • More generally, define and implement specification tools that include security policies in the context of distributed systems.

Applications

Partners

  • Improving the security of smart card based applications: define a secure environment for « big size » complex application.

  • Application of code obfuscation to intellectual property protection for software, especially through the use of « watermarking » systems.

  • Realization of a secure platform (hardware and software) based on a « smart card network » (grid, network, mobile network, etc).

  • PRiSM Laboratory (Versailles St-Quentin- en-Yvelines University): expertise in multivariate cryptography, cryptanalysis, block ciphers, physical attacks, elliptic curve cryptography, hash functions.

  • LaBRI (Bordeaux 1 University): expertise in formal methods and software architecture.

  • LIENS (École normale supérieure): expertise in evaluation of cryptographic mechanisms.

Outputs and Expected Results

  • Physical attacks against embedded systems: publication of new results and countermeasures.

  • Code obfuscation: modelization, analysis of existing solutions and proposal of new schemes.

  • Modelization of security requirements when the executable code is implemented in an external device (e.g. a terminal). Study of new induced threats, and design of new strategies to thwart them.

  • Dissemination of new obtained results: academic publications, participation to international confrences, demonstrations of new architectures.

  • Organization of a workshop in 2009, on « Cryptography for the Security of Embedded Systems ».

    www.labri.fr/~ly/cryscoe

Cryptography for the Security of Embedded Systems

  • PHYSICAL ATTACKS

  • CODE OBFUSCATION

  • CODE EXTERNALIZATION

    A « mobile » code has to be carried together with a proof that it satisfies a security policy. The embedded system (« host ») only has to check the proof.

Project Contact : Pr. Louis Goubin Laboratoire PRiSM – Université de Versailles St-Quentin-en-Yvelines

45 avenue des Etats-Unis – 78035 Versailles Cedex – France

Tél : +33.1.39.25.43.29 [email protected]


  • Login