Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger...

Preview:

Citation preview

Information Security of Embedded Systems

9.1.2010: Design of Secure Systems

Prof. Dr. Holger SchlingloffInstitut für Informatik

undFraunhofer FIRST

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 2

Structure

1. Introductory example2.Embedded systems

engineering1. definitions and terms2. design principles

3.Foundations of security1. threats, attacks, measures2. construction of safe

systems

4.Design of secure systems1. design challenges2. safety modelling and

assessment3. cryptographic algorithms

5. Communication of embedded systems

1. remote access2. sensor networks

6. Algorithms and measures

1. digital signatures2. key management3. authentification4. authorization

7. Formal methods for security

1. protocol verification2. logics and proof

methods

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 3

Recap –Security Assessment

• Common Criteria general model catalogue of recommendations: threats, goals, requirements guideline on evaluation methodology and process (EAL)

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 4

Cryptology

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 5

Cryptosystems

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 6

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 7

Stream Cyphers and Block Cyphers

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 8

Cryptanalysis

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 9

Attack Models

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 10

Cypher Classification

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 11

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 12

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 13

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 14

DES, Data Encryption Standard

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 15

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 16

AES, Advanced Encryption Standard

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 17

AES rounds

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 18

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 19

Implementations

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 20

Evaluating Block Cyphers

Recommended