Information Security of Embedded Systems 9.1.2010: Public Key Cryptosystems, Communication Prof. Dr....
-
date post
19-Dec-2015 -
Category
Documents
-
view
215 -
download
0
Transcript of Information Security of Embedded Systems 9.1.2010: Public Key Cryptosystems, Communication Prof. Dr....
Information Security of Embedded Systems
9.1.2010: Public Key Cryptosystems, Communication
Prof. Dr. Holger SchlingloffInstitut für Informatik
undFraunhofer FIRST
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 2
Structure
1. Introductory example2.Embedded systems
engineering1. definitions and terms2. design principles
3.Foundations of security1. threats, attacks, measures2. construction of safe
systems
4.Design of secure systems1. design challenges2. safety modelling and
assessment3. cryptographic algorithms
5. Communication of embedded systems
1. remote access2. sensor networks
6. Algorithms and measures
1. digital signatures2. key management3. authentification4. authorization
7. Formal methods for security
1. protocol verification2. logics and proof
methods
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 3
Public Key Cryptosystems
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 4
General Idea
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 5
Asymmetric Cryptosystems
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 6
Danger of Spoofing!
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 7
RSA (1978)
http://people.csail.mit.edu/rivest/Rsapaper.pdf
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 8
RSA Preliminaries
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 9
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 10
RSA Key Generation
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 11
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 12
Keys in RSA
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 13
Sending Messages from A to B
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 14
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 15
Correctness of RSA
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 16
Euler’s theorem
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 17
Lemmas for Euler’s Theorem
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 18
Proof of Lemma3
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 19
Proof of Euler’s Theorem
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 20
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 21
Algorithms for the Implementation
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 22
Primality Test: Rabin-Miller
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 23
Encoding / Decoding
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 24
Security of RSA
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 25
Latest News
http://de.wikinews.org/wiki/RSA-Veschl%C3%BCsselung_mit_768_Bit_geknackt
13.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 26
Latest News
http://de.wikinews.org/wiki/RSA-Veschl%C3%BCsselung_mit_768_Bit_geknackt