1 / 12

Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

Grenoble University. Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems. Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who’s who. Context - Objective.

tejana
Download Presentation

Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Grenoble University Sécurité, Cryptologie et Codage des Systèmes d’InformationSecurity, Cryptology and Coding of Information Systems • Context • General presentation • 1. Academic program, calendar • 2. Lectures/Tutoring organization • Administration, registration: who’s who

  2. Context - Objective • Context : expansion of networks and distributed applications • Confidentiality, Authentication, Integrity, Non-repudiation • Various applications and professional skills: • Enterprise specialised in security: solutions providers (hardware, software, smartcard, …); security audit, … • Specialized department of a company : bank, e-business, telecom, video, tv, … • Information system within a company: network/system administration Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ.)Institut Fourier et Ensimag + Dépt Telecom • Objective : formation of experts in security and coding technologies • Cryptology : mathematical protocols (RSA, AES, ECC…) • Security: software/hardware (network, system, integraton) • Applications : watermarking, multimedia, smartcard, … • M2P : Directed to profession: sept-feb=lectures / march-sept internship/thesis

  3. Brief history & organization • Master UJF-INPG Cryptologie, Sécurité, Codage de l’Information (2001…) • Sept 2003: first promotion: 17 graduate students • 148 graduate students up to sept 2009 (24 en sept 2008) • From Sept 2007: international M2P – program taught in english • From sept 2008: part of MOSIG International Master; From sept 2009: new calendar • M2P Security, Cryptology and Coding of Information Systems • 2009-20010: 50 students: 14 ENSIMAG / 25 Institut Fourier / 11 Emirati (intl. coop) • Gathers French and English speaking students (2 groups of students) • Director UJF/IF : Philippe.Elbaz-Vincent@ujf-grenoble.fr • Co-director INP/ENSIMAG: Jean-Louis.Roch@imag.fr • Web: • http://www-ufrima.imag.fr/spip.php?article49 • http://www-fourier.ujf-grenoble.fr/enseignement/spip.php?rubrique19

  4. Calendar 2009-2010 Academic calendar: • mid-Sept -> March: courses (level 3) (Rem: 2 weeks optional pretraining early sept) • April -> September 30: (level 4)full-time internship (Master thesis) • mid-june: mid-term presentation, + “PFE ingénieur” for ENSIMAG students • mid-september: Master thesis defense • Validation: by “level” (~semester) • Mark ≥ 10/20=50% to level 3 (courses) • No mark < 7 in global units • Mark ≥ 10/20=50% to level 4 (thesis/project)

  5. Organisation M2 Mosig SCCI (M2-P) • 27 ECTS Master thesis • 3 ECTS UE Transversal (English / French / … ) • 30 ECTS “scientific/technology” • 15 ECTS Common Core • 12 ECTS Elective Specialization in Security (“math” or “info”) • 3 ECTS = electve unit (2 proposed, but yet open to all units proposed in Grenoble M2 Math-Info)

  6. Security, Cryptology and Coding of Information Systems M2 SCCI – 2009/2010

  7. Examples of Master thesis • Integration of zero-knowledge authentication on smart card [C-S] • Secure server for SIP telecommunications [INRIA] • Integration of strong authentication in an information system [British Telecom] • Management of identity for printer access [Helwett-Packard, Germany] • Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] • Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris] • Analysis and deployment of a confidential data service [Solucom, Nantes] • Integration of biometrics in crypto protocols [SAGEM, Paris] • Hidden channel attacks [SAGEM, Paris] • Windows CardSpace components in a smart card [Gemalto, La Ciotat] • Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat] • Lightweight electronic signature [Dictao, Paris] • Wireless infrastructure for emergency comm. [Wisecomm, Germany] • Secure and anonymous communication on internet [UL, Luxembourg] • Test of crypto-secure random generators [LTSI, Lyon] • Security analysis of a medical data protection scheme [Philips, Eindhoven] • Supervision of the CEA computer infrastructure [CEA, Grenoble] • Security analysis of images watermarking [GIPSA, Grenoble] • Security audit of the SCADA platform [Atos Origin, Grenoble] • ….

  8. Organization of courses • 1 ECTS Scientific Unit = 10h attendency M2P • 3 ECTS = 30H classes / 45H practical work + Homework • 18h lectures in English (~ 2 slots de 1h30 / week) • + 12h “training” in ½-group: TP/ Exercises/complts • given twice: 1 group in English + 1 group in French • => for each unit, choose either French or English, once! • Courses slots of 1.30 hours per week per student: • 8h-9h30 / 9h45- 11h15 / 11h30-13h • 13h30/15 / 15h15-16h45 / 17h-18h30 • Additional tutoring (office hours) • on request: see your professors

  9. Elèves-ingénieur(double-inscription) • Programme = M2 + Cours ingénierie additionnels • Anglais suivi à l’ENSIMAG (+ 2eme langue) • Cours « smart card security » + NTC (ou dans le M2 MI) • module « projet professionnel » constitué : • -  de la soutenance de stage 2A. • -  du REX, le 1er octobre pm (retour d'expériences sur les stages) • un cours au choix: • dans le module «environnement et culture » : les lundi après 16h30 • Ou dans le module « sciences et pratiques du management » (les 21, 22 et 23) (négociation partenariale, management de l'innovation, Les essentiels du management, Gestion de projet • PFE (juin) + Thèse Master (sept) • + Sport, 3eme langue, …

  10. Contacts and links • Academic supervisors: • Director (UJF) Philippe Elbaz-Vincent Philippe.Elbaz-Vincent@ujf-grenoble.fr • Co-director (INP) Jean-Louis Roch Jean-Louis.Roch@imag.fr • Administration: registration, timetable, … • UJF: Sylviane El Gares Sylviane.Elgares@ujf-grenoble.fr • INP / ENSIMAG: Elena Leibowitch Elena.Leibowitch@imag.fr • Links • Planning, timetable: ADEhttp://ade52-inpg.grenet.fr/ade/custom/modules/plannings/direct_planning.jsp?projectId=58&login=voirIMATEL&password=imatel&resources=895&days=0,1,2,3,4&displayConfId=6 • Kiosk: https://intranet.ensimag.fr/KIOSK/MasterCSCI/ • M2P SCCI http://www-fourier.ujf-grenoble.fr/enseignement/-Master-M2P-S-C-C-I.html • MOSIG http://mosig.imag.fr/MainEn/Grenoble • ENSIMAG http://www.ensimag.fr

  11. M2 courses • Common core: cryptology and security [15 ECTS] • Models for security • Symmetric and asymmetric cryptology - PKI infrastructures • System administration and network security • Elective specialization [12 ECTS] : choose one between • Security of Information Systems [12 ECTS] • Advanced system and network security • Secure hardware architecture • Distributed algorithms and fault-tolerance • Secure infrastructure deployment project • Cryptology, coding and multimedia applications [12 ECTS] • Advanced cryptology: elliptic curves, cryptanalysis • Multimedia applications, watermarking • Coding and fault-tolerance • Elective course unit [3 ECTS] : choose one between • Smart card security; audit and normalization [3 ECTS] • New trends in cryptology: quantum, biometrics, pairings [3 ECTS] • Master thesis [30 ECTS] • Note: early september: Specific optional introduction courses • Math [group theory,arithmetics]; linux & programming ; information systems [UML]

  12. Propositionparcours R crypto • Formation à la recherche en SCCI • Aspects fondamentaux, aussi bien math que info • 2 cours tronc commun (12 ECTS) • Cours sécurité système et réseau avancée [spécialité info, 6 ECTS] • Cours cryptologie avancée [spécialité math, 6 ECTS] • 1 cours au choix dans le Master [6 ECTS] • A priori lié soit à la”spécialité”: info / math-app /math • M2R: Uniquement les cours obligatoires (pas les training) • Mais travail personnel/assignments supplémentaires pour les M2R • Et évaluation différenciée (assignments et examen spécifique M2R) • Possibilité aux étudiants M2R de suivre les training en “auditeur libre” ? (pas une contrainte au niveau horaire) • Cours terminés en janvier, projet final soutenu en juin

More Related