1 / 7

History / Organization / Calendar Objective Content : 2 possible « tracks »:

Grenoble University. Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems. History / Organization / Calendar Objective Content : 2 possible « tracks »: « M2 P » SCCI : « M2R SCCI »   Yet:

tawny
Download Presentation

History / Organization / Calendar Objective Content : 2 possible « tracks »:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Grenoble University Sécurité, Cryptologie et Codage des Systèmes d’InformationSecurity, Cryptology and Coding of Information Systems • History / Organization / Calendar • Objective • Content : 2 possible « tracks »: • « M2 P » SCCI :« M2R SCCI »   • Yet: • « SAFE » : cursus en apprentissage, enseigné en Français • Some examples of Master thesis

  2. Context - Objective • Context : expansion of networks and distributed applications • Confidentiality, Authentication, Integrity, Non-repudiation • Various applications and professional skills: • Enterprise specialised in security: solutions providers (hardware, software, smartcard, …); security audit, … • Specialized department of a company : bank, e-business, telecom, video, tv, … • Information system within a company: network/system administration Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ.)Institut Fourier et Ensimag • Objective : formation of experts in security and coding technologies • Cryptology : mathematical protocols (RSA, AES, ECC…) • Security: software/hardware (network, system, integraton) • Applications : watermarking, multimedia, smartcard, … • Directed to profession (M2P) or to research (M2R)

  3. Brief history & Organization • Master UJF-IPG Cryptologie, Sécurité, Codage de l’Information (2001…) • Sept 2003: first promotion:17 graduate students • Up to Sept 2010: 198 graduated students (99 IPG, 99 UJF); 230 expected in 2011. • From Sept 2007: international M2P – program taught in English • M2 Security, Cryptology and Coding of Information Systems • Gathers French and English speaking students (2 groups of students) • From Sept 2008: part of MOSIG International Master • Director UJF/IF : Philippe.Elbaz-Vincent@ujf-grenoble.fr • Co-director INP/ENSIMAG: Jean-Louis.Roch@imag.fr • From Sept 2011: 2 academic programs: M2R and M2P SCCI • http://www-ufrima.imag.fr/ue_filiere.php3?filiere=M2RCRYPTO&id=739&lang=en • http://www-ufrima.imag.fr/spip.php?article49 • http://www-fourier.ujf-grenoble.fr/enseignement/spip.php?rubrique19 • From Sept 2011: can be attended as a standard track for ENSIMAG students • « Grenoble-INP » semestre à choix • Academic calendar: • M2R : sept-january : courses / Feb-june: Master thesis • M2P : sept-march: courses / April-sept: Master thesisr thesis) • mid-June: mid-term presentation and mid-September: Master thesis defense

  4. M2- P Mosig SCCI (M2-P) Organization / Credits • 27 ECTS Thèse de Master • 3 ECTS UE Transversal (Anglais/Français/Histoire des sciences, ….) • 30 ECTS “scientifique/technique” • 15 ECTS Tronc commun • 12 ECTS Spécialisation au choix: “info” ou “math” • 3 ECTS = UE au choix (2 proposés, ouvert Master) • General schedule for a 6 ECTS scientific module • 36h lectures (in English) • + 24h “training” in ½ group: TP/ Exercises/ Complements • 1 group taight in English + 1 group taught in French

  5. Security, Cryptology and Coding of Information SystemsContent / Credits for the Master degree

  6. Parcours M2R Security and Cryptology • Formation à la recherche en SECR • Travail individuel (lectures, no “training”, assignments) • 1 ECTS = 24 H work = 6h lectures + 18h individual homework • Aspects fondamentaux, aussi bien math que info • Common core: 24 ECTS • Security models: proofs, protocols and politics [6 ECTS] • Symmetric and asymmetric cryptology – PKI [6 ECTS] • System and Network Security [6 ECTS] • System administration and network security • Advanced security of system and networks • Advanced cryptology:elliptic curves and cryptanalysis [6 ECTS] • Elective. 6 ECTS • Either: [6 ECTS] • Smart card security, certification and norms [3 ECTS] • Quantum cryptography, biometrics, pairings [3 ECTS] • Or elective course in the M2 MI [6 ECTS] • Requires validation by the program director

  7. Examples of Master thesis • Integration of zero-knowledge authentication on smart card [C-S] • Secure server for SIP telecommunications [INRIA] • Integration of strong authentication in an information system [British Telecom] • Management of identity for printer access [Helwett-Packard, Germany] • Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] • Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris] • Analysis and deployment of a confidential data service [Solucom, Nantes] • Integration of biometrics in crypto protocols [SAGEM, Paris] • Hidden channel attacks [SAGEM, Paris] • Windows CardSpace components in a smart card [Gemalto, La Ciotat] • Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat] • Lightweight electronic signature [Dictao, Paris] • Wireless infrastructure for emergency comm. [Wisecomm, Germany] • Secure and anonymous communication on internet [UL, Luxembourg] • Test of crypto-secure random generators [LTSI, Lyon] • Security analysis of a medical data protection scheme [Philips, Eindhoven] • Supervision of the CEA computer infrastructure [CEA, Grenoble] • Security analysis of images watermarking [GIPSA, Grenoble] • Security audit of the SCADA platform [Atos Origin, Grenoble] • ….

More Related