Sécurité, Cryptologie et Codage des Systèmes d’Information
Security, Cryptology and Coding of Information Systems
History / Organization / Calendar
Objective
Content : 2 possible « tracks »:
« M2 P » SCCI : « M2R SCCI »
Yet:
• « SAFE » : cursus en apprentissage, enseigné en Français
Some examples of Master thesis
Grenoble University
Context - Objective
Context : expansion of networks and distributed applications
Confidentiality, Authentication, Integrity, Non-repudiation
Various applications and professional skills:
Enterprise specialised in security: solutions providers (hardware, software, smartcard, …);
security audit, …
Specialized department of a company : bank, e-business, telecom, video, tv, …
Information system within a company: network/system administration
Formation spécialisée en 1 an conjointe UJF – INP (Grenoble Univ.) Institut Fourier et Ensimag
Objective : formation of experts in security and coding technologies
Cryptology : mathematical protocols
(RSA, AES, ECC…)
Security: software/hardware (network, system, integraton)
Applications : watermarking, multimedia, smartcard, …
Directed to profession (M2P) or to research (M2R)
Brief history &
Organization
Master UJF-IPG Cryptologie, Sécurité, Codage de l’Information
(2001…) Sept 2003: first promotion:17 graduate students
Up to Sept 2010: 198 graduated students (99 IPG, 99 UJF); 230 expected in 2011.
From Sept 2007: international M2P – program taught in English
M2 Security, Cryptology and Coding of Information Systems
Gathers French and English speaking students (2 groups of students)
From Sept 2008: part of MOSIG International Master
Director UJF/IF : Philippe.Elbaz-Vincent@ujf-grenoble.fr
Co-director INP/ENSIMAG: Jean-Louis.Roch@imag.fr
From Sept 2011: 2 academic programs: M2R and M2P SCCI
http://www-ufrima.imag.fr/ue_filiere.php3?filiere=M2RCRYPTO&id=739&lang=en
http://www-ufrima.imag.fr/spip.php?article49
http://www-fourier.ujf-grenoble.fr/enseignement/spip.php?rubrique19
From Sept 2011: can be attended as a standard track for ENSIMAG students
« Grenoble-INP » semestre à choix
Academic calendar:
M2R : sept-january : courses / Feb-june: Master thesis
M2P : sept-march: courses / April-sept: Master thesisr thesis)
mid-June: mid-term presentation and mid-September: Master thesis defense
M2- P Mosig SCCI (M2-P) Organization / Credits
27 ECTS Thèse de Master
3 ECTS UE Transversal (Anglais/Français/Histoire des sciences, ….)
30 ECTS “scientifique/technique”
15 ECTS Tronc commun
12 ECTS Spécialisation au choix: “info” ou “math”
3 ECTS = UE au choix (2 proposés, ouvert Master)
General schedule for a 6 ECTS scientific module
36h lectures (in English)
+ 24h “training” in ½ group: TP/ Exercises/ Complements
1 group taight in English + 1 group taught in French
Security, Cryptology and Coding of Information Systems
Content / Credits for the Master degree
Security, Cryptology and Coding of Information Systems
Content / Credits for the Master degree
Non-elective Core Courses 18 ECTS ECTS Teaching teams
Security models: proofs, protocols and politics 6 Autreau, Lafourcade, Roch Symmetric and asymmetric cryptology – PKI 6 Dumas, Elbaz-Vincent
System administration and network security 3 Denneulin, Wagner, Marchand
English or French 3 Pool Langues
Choose one of the two following elective 12 ECTS Elective A. Security of systems and infrastructures Advanced security of system and networks
Hardware and embedded secure architectectures Distributed algorithms and fault-tolerance
Deployment of a secure grid infrastructure
3 3 3 3
Wagner, Castellucia Leveugle
Quéma, Anghel Denneulin, Wagner Elective B. Cryptology, coding and multimedia
appl.
Advanced cryptology: elliptic curves and cryptanalysis Multimedia applications and watermarking
Error correcting codes and fault-tolerance
6 3 3
Elbaz-Vincent, Leprévost, Gillard Cayre, Ebrahimi, Bas
Roch, Patchichkine, Brossier
Choose one of the two following elective 3 ECTS
Elective 1. Smart card security, certification and norms 3 Autreau, Canovas, Potet
Elective 2. Quantum cryptography, biometrics, pairings 3 Arrighi, Elbaz-Vincent
Parcours M2R
Security and Cryptology
Formation à la recherche en SECR
Travail individuel (lectures, no “training”, assignments)
1 ECTS = 24 H work = 6h lectures + 18h individual homework
Aspects fondamentaux, aussi bien math que info
Common core: 24 ECTS
Security models: proofs, protocols and politics [6 ECTS]
Symmetric and asymmetric cryptology – PKI [6 ECTS]
System and Network Security [6 ECTS]
• System administration and network security
• Advanced security of system and networks
Advanced cryptology:elliptic curves and cryptanalysis [6 ECTS]
Elective. 6 ECTS
Either: [6 ECTS]
•
Smart card security, certification and norms [3 ECTS]
•
Quantum cryptography, biometrics, pairings [3 ECTS]
Or elective course in the M2 MI [6 ECTS]
• Requires validation by the program director
Examples of Master thesis
Integration of zero-knowledge authentication on smart card [C-S]
Secure server for SIP telecommunications [INRIA]
Integration of strong authentication in an information system [British Telecom]
Management of identity for printer access [Helwett-Packard, Germany]
Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble]
Conception et réalisation d’un composant de sécurité [Ministère Défense, Paris]
Analysis and deployment of a confidential data service [Solucom, Nantes]
Integration of biometrics in crypto protocols [SAGEM, Paris]
Hidden channel attacks [SAGEM, Paris]
Windows CardSpace components in a smart card [Gemalto, La Ciotat]
Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat]
Lightweight electronic signature [Dictao, Paris]
Wireless infrastructure for emergency comm. [Wisecomm, Germany]
Secure and anonymous communication on internet [UL, Luxembourg]
Test of crypto-secure random generators [LTSI, Lyon]
Security analysis of a medical data protection scheme [Philips, Eindhoven]
Supervision of the CEA computer infrastructure [CEA, Grenoble]
Security analysis of images watermarking [GIPSA, Grenoble]
Security audit of the SCADA platform [Atos Origin, Grenoble]
….