S - PowerPoint PPT Presentation

About This Presentation
Title:

S

Description:

Grenoble University History / Organization / Calendar Objective Content : 2 possible tracks : M2 P SCCI : M2R SCCI Yet: – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 8
Provided by: RogerM175
Category:
Tags: knowledge | proofs | zero

less

Transcript and Presenter's Notes

Title: S


1
Sécurité, Cryptologie et Codage des Systèmes
dInformationSecurity, Cryptology and Coding of
Information Systems
Grenoble University
  • History / Organization / Calendar
  • Objective
  • Content 2 possible  tracks 
  •  M2 P  SCCI  M2R SCCI   
  • Yet
  •  SAFE  cursus en apprentissage, enseigné en
    Français
  • Some examples of Master thesis

2
Context - Objective
  • Context expansion of networks and distributed
    applications
  • Confidentiality, Authentication, Integrity,
    Non-repudiation
  • Various applications and professional skills
  • Enterprise specialised in security solutions
    providers (hardware, software, smartcard, )
    security audit,
  • Specialized department of a company bank,
    e-business, telecom, video, tv,
  • Information system within a company
    network/system administration
  • Formation spécialisée en 1 an conjointe UJF INP
    (Grenoble Univ.) Institut Fourier et
    Ensimag
  • Objective formation of experts in security and
    coding technologies
  • Cryptology mathematical protocols (RSA, AES,
    ECC)
  • Security software/hardware (network, system,
    integraton)
  • Applications watermarking, multimedia,
    smartcard,
  • Directed to profession (M2P) or to research (M2R)

3
Brief history Organization
  • Master UJF-IPG Cryptologie, Sécurité, Codage de
    lInformation (2001)
  • Sept 2003 first promotion17 graduate students
  • Up to Sept 2010 198 graduated students (99 IPG,
    99 UJF) 230 expected in 2011.
  • From Sept 2007 international M2P program
    taught in English
  • M2 Security, Cryptology and Coding of Information
    Systems
  • Gathers French and English speaking students (2
    groups of students)
  • From Sept 2008 part of MOSIG International
    Master
  • Director UJF/IF Philippe.Elbaz-Vincent_at_ujf-gre
    noble.fr
  • Co-director INP/ENSIMAG Jean-Louis.Roch_at_imag.fr
  • From Sept 2011 2 academic programs M2R and M2P
    SCCI
  • http//www-ufrima.imag.fr/ue_filiere.php3?filiere
    M2RCRYPTOid739langen
  • http//www-ufrima.imag.fr/spip.php?article49
  • http//www-fourier.ujf-grenoble.fr/enseignement/sp
    ip.php?rubrique19
  • From Sept 2011 can be attended as a standard
    track for ENSIMAG students
  •  Grenoble-INP  semestre à choix
  • Academic calendar
  • M2R sept-january courses / Feb-june Master
    thesis

4
M2- P Mosig SCCI (M2-P) Organization / Credits
  • 27 ECTS Thèse de Master
  • 3 ECTS UE Transversal (Anglais/Français/Histoire
    des sciences, .)
  • 30 ECTS scientifique/technique
  • 15 ECTS Tronc commun
  • 12 ECTS Spécialisation au choix info ou
    math
  • 3 ECTS UE au choix (2 proposés, ouvert Master)
  • General schedule for a 6 ECTS scientific module
  • 36h lectures (in English)
  • 24h training in ½ group TP/ Exercises/
    Complements
  • 1 group taight in English 1 group taught in
    French

5
Security, Cryptology and Coding of Information
SystemsContent / Credits for the Master degree
Non-elective Core Courses 18 ECTS ECTS Teaching teams
Security models proofs, protocols and politics 6 Autreau, Lafourcade, Roch
Symmetric and asymmetric cryptology PKI 6 Dumas, Elbaz-Vincent
System administration and network security 3 Denneulin, Wagner, Marchand
English or French 3 Pool Langues
Choose one of the two following elective 12 ECTS
Elective A. Security of systems and infrastructuresAdvanced security of system and networksHardware and embedded secure architectectures Distributed algorithms and fault-toleranceDeployment of a secure grid infrastructure 33 33 Wagner, CastelluciaLeveugleQuéma, AnghelDenneulin, Wagner
Elective B. Cryptology, coding and multimedia appl. Advanced cryptology elliptic curves and cryptanalysisMultimedia applications and watermarkingError correcting codes and fault-tolerance 6 33 Elbaz-Vincent, Leprévost, Gillard Cayre, Ebrahimi, Bas Roch, Patchichkine, Brossier
Choose one of the two following elective 3 ECTS
Elective 1. Smart card security, certification and norms 3 Autreau, Canovas, Potet
Elective 2. Quantum cryptography, biometrics, pairings 3 Arrighi, Elbaz-Vincent
6
Parcours M2R Security and Cryptology
  • Formation à la recherche en SECR
  • Travail individuel (lectures, no training,
    assignments)
  • 1 ECTS 24 H work 6h lectures 18h individual
    homework
  • Aspects fondamentaux, aussi bien math que info
  • Common core 24 ECTS
  • Security models proofs, protocols and politics
    6 ECTS
  • Symmetric and asymmetric cryptology PKI 6
    ECTS
  • System and Network Security 6 ECTS
  • System administration and network security
  • Advanced security of system and networks
  • Advanced cryptologyelliptic curves and
    cryptanalysis 6 ECTS
  • Elective. 6 ECTS
  • Either 6 ECTS
  • Smart card security, certification and norms 3
    ECTS
  • Quantum cryptography, biometrics, pairings 3
    ECTS
  • Or elective course in the M2 MI 6 ECTS
  • Requires validation by the program director

7
Examples of Master thesis
  • Integration of zero-knowledge authentication on
    smart card C-S
  • Secure server for SIP telecommunications INRIA
  • Integration of strong authentication in an
    information system British Telecom
  • Management of identity for printer access
    Helwett-Packard, Germany
  • Reconfiguraton of a secure infrastructure
    France-Telecom, Grenoble
  • Conception et réalisation dun composant de
    sécurité Ministère Défense, Paris
  • Analysis and deployment of a confidential data
    service Solucom, Nantes
  • Integration of biometrics in crypto protocols
    SAGEM, Paris
  • Hidden channel attacks SAGEM, Paris
  • Windows CardSpace components in a smart card
    Gemalto, La Ciotat
  • Secure loading of jar in JavaCard3.0 Gemalto, La
    Ciotat
  • Lightweight electronic signature Dictao, Paris
  • Wireless infrastructure for emergency comm.
    Wisecomm, Germany
  • Secure and anonymous communication on internet
    UL, Luxembourg
  • Test of crypto-secure random generators LTSI,
    Lyon
  • Security analysis of a medical data protection
    scheme Philips, Eindhoven
  • Supervision of the CEA computer infrastructure
    CEA, Grenoble
  • Security analysis of images watermarking GIPSA,
    Grenoble
  • Security audit of the SCADA platform Atos
    Origin, Grenoble
Write a Comment
User Comments (0)
About PowerShow.com