120 likes | 283 Views
Grenoble University. Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems. Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who’s who. Context - Objective.
E N D
Grenoble University Sécurité, Cryptologie et Codage des Systèmes d’InformationSecurity, Cryptology and Coding of Information Systems • Context • General presentation • 1. Academic program, calendar • 2. Lectures/Tutoring organization • Administration, registration: who’s who
Context - Objective • Context : expansion of networks and distributed applications • Confidentiality, Authentication, Integrity, Non-repudiation • Various applications and professional skills: • Enterprise specialised in security: solutions providers (hardware, software, smartcard, …); security audit, … • Specialized department of a company : bank, e-business, telecom, video, tv, … • Information system within a company: network/system administration Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ.)Institut Fourier et Ensimag + Dépt Telecom • Objective : formation of experts in security and coding technologies • Cryptology : mathematical protocols (RSA, AES, ECC…) • Security: software/hardware (network, system, integraton) • Applications : watermarking, multimedia, smartcard, … • M2P : Directed to profession: sept-feb=lectures / march-sept internship/thesis
Brief history & organization • Master UJF-INPG Cryptologie, Sécurité, Codage de l’Information (2001…) • Sept 2003: first promotion: 17 graduate students • 148 graduate students up to sept 2009 (24 en sept 2008) • From Sept 2007: international M2P – program taught in english • From sept 2008: part of MOSIG International Master; From sept 2009: new calendar • M2P Security, Cryptology and Coding of Information Systems • 2009-20010: 50 students: 14 ENSIMAG / 25 Institut Fourier / 11 Emirati (intl. coop) • Gathers French and English speaking students (2 groups of students) • Director UJF/IF : Philippe.Elbaz-Vincent@ujf-grenoble.fr • Co-director INP/ENSIMAG: Jean-Louis.Roch@imag.fr • Web: • http://www-ufrima.imag.fr/spip.php?article49 • http://www-fourier.ujf-grenoble.fr/enseignement/spip.php?rubrique19
Calendar 2009-2010 Academic calendar: • mid-Sept -> March: courses (level 3) (Rem: 2 weeks optional pretraining early sept) • April -> September 30: (level 4)full-time internship (Master thesis) • mid-june: mid-term presentation, + “PFE ingénieur” for ENSIMAG students • mid-september: Master thesis defense • Validation: by “level” (~semester) • Mark ≥ 10/20=50% to level 3 (courses) • No mark < 7 in global units • Mark ≥ 10/20=50% to level 4 (thesis/project)
Organisation M2 Mosig SCCI (M2-P) • 27 ECTS Master thesis • 3 ECTS UE Transversal (English / French / … ) • 30 ECTS “scientific/technology” • 15 ECTS Common Core • 12 ECTS Elective Specialization in Security (“math” or “info”) • 3 ECTS = electve unit (2 proposed, but yet open to all units proposed in Grenoble M2 Math-Info)
Security, Cryptology and Coding of Information Systems M2 SCCI – 2009/2010
Examples of Master thesis • Integration of zero-knowledge authentication on smart card [C-S] • Secure server for SIP telecommunications [INRIA] • Integration of strong authentication in an information system [British Telecom] • Management of identity for printer access [Helwett-Packard, Germany] • Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] • Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris] • Analysis and deployment of a confidential data service [Solucom, Nantes] • Integration of biometrics in crypto protocols [SAGEM, Paris] • Hidden channel attacks [SAGEM, Paris] • Windows CardSpace components in a smart card [Gemalto, La Ciotat] • Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat] • Lightweight electronic signature [Dictao, Paris] • Wireless infrastructure for emergency comm. [Wisecomm, Germany] • Secure and anonymous communication on internet [UL, Luxembourg] • Test of crypto-secure random generators [LTSI, Lyon] • Security analysis of a medical data protection scheme [Philips, Eindhoven] • Supervision of the CEA computer infrastructure [CEA, Grenoble] • Security analysis of images watermarking [GIPSA, Grenoble] • Security audit of the SCADA platform [Atos Origin, Grenoble] • ….
Organization of courses • 1 ECTS Scientific Unit = 10h attendency M2P • 3 ECTS = 30H classes / 45H practical work + Homework • 18h lectures in English (~ 2 slots de 1h30 / week) • + 12h “training” in ½-group: TP/ Exercises/complts • given twice: 1 group in English + 1 group in French • => for each unit, choose either French or English, once! • Courses slots of 1.30 hours per week per student: • 8h-9h30 / 9h45- 11h15 / 11h30-13h • 13h30/15 / 15h15-16h45 / 17h-18h30 • Additional tutoring (office hours) • on request: see your professors
Elèves-ingénieur(double-inscription) • Programme = M2 + Cours ingénierie additionnels • Anglais suivi à l’ENSIMAG (+ 2eme langue) • Cours « smart card security » + NTC (ou dans le M2 MI) • module « projet professionnel » constitué : • - de la soutenance de stage 2A. • - du REX, le 1er octobre pm (retour d'expériences sur les stages) • un cours au choix: • dans le module «environnement et culture » : les lundi après 16h30 • Ou dans le module « sciences et pratiques du management » (les 21, 22 et 23) (négociation partenariale, management de l'innovation, Les essentiels du management, Gestion de projet • PFE (juin) + Thèse Master (sept) • + Sport, 3eme langue, …
Contacts and links • Academic supervisors: • Director (UJF) Philippe Elbaz-Vincent Philippe.Elbaz-Vincent@ujf-grenoble.fr • Co-director (INP) Jean-Louis Roch Jean-Louis.Roch@imag.fr • Administration: registration, timetable, … • UJF: Sylviane El Gares Sylviane.Elgares@ujf-grenoble.fr • INP / ENSIMAG: Elena Leibowitch Elena.Leibowitch@imag.fr • Links • Planning, timetable: ADEhttp://ade52-inpg.grenet.fr/ade/custom/modules/plannings/direct_planning.jsp?projectId=58&login=voirIMATEL&password=imatel&resources=895&days=0,1,2,3,4&displayConfId=6 • Kiosk: https://intranet.ensimag.fr/KIOSK/MasterCSCI/ • M2P SCCI http://www-fourier.ujf-grenoble.fr/enseignement/-Master-M2P-S-C-C-I.html • MOSIG http://mosig.imag.fr/MainEn/Grenoble • ENSIMAG http://www.ensimag.fr
M2 courses • Common core: cryptology and security [15 ECTS] • Models for security • Symmetric and asymmetric cryptology - PKI infrastructures • System administration and network security • Elective specialization [12 ECTS] : choose one between • Security of Information Systems [12 ECTS] • Advanced system and network security • Secure hardware architecture • Distributed algorithms and fault-tolerance • Secure infrastructure deployment project • Cryptology, coding and multimedia applications [12 ECTS] • Advanced cryptology: elliptic curves, cryptanalysis • Multimedia applications, watermarking • Coding and fault-tolerance • Elective course unit [3 ECTS] : choose one between • Smart card security; audit and normalization [3 ECTS] • New trends in cryptology: quantum, biometrics, pairings [3 ECTS] • Master thesis [30 ECTS] • Note: early september: Specific optional introduction courses • Math [group theory,arithmetics]; linux & programming ; information systems [UML]
Propositionparcours R crypto • Formation à la recherche en SCCI • Aspects fondamentaux, aussi bien math que info • 2 cours tronc commun (12 ECTS) • Cours sécurité système et réseau avancée [spécialité info, 6 ECTS] • Cours cryptologie avancée [spécialité math, 6 ECTS] • 1 cours au choix dans le Master [6 ECTS] • A priori lié soit à la”spécialité”: info / math-app /math • M2R: Uniquement les cours obligatoires (pas les training) • Mais travail personnel/assignments supplémentaires pour les M2R • Et évaluation différenciée (assignments et examen spécifique M2R) • Possibilité aux étudiants M2R de suivre les training en “auditeur libre” ? (pas une contrainte au niveau horaire) • Cours terminés en janvier, projet final soutenu en juin