Entrance hall of the ICMS Workshop

Information Security: Design Fundamentals and Selected Research Topics

Nov 16, 2009 - Nov 18, 2009

14 India Street, Edinburgh

 

This course is  hosted by the International Centre for Mathematical Sciences (ICMS) and supported by Bridging the Gaps .

 

Course Aim
To introduce participants to the design fundamentals of security systems and a number of contemporary research subjects on security technology.

Learning Outcomes
After attending the course, participants are expected to understand modern security design techniques as well as the objectives of state-of-the-art research on security technology and mechanisms.

Pre-requisites
Basic EE-CS level is sufficient. Basic knowledge of discrete mathematics and number theory would be helpful, but not essential.

Presenter: Professor Wael Adi
Institute of Computer and Communication Network
Engineering, Technical University of Braunschweig, Germany
w.adi@tu-bs.de

Presenter Biography
Prof. Adi obtained a Ph.D. (Dr.-Ing) Degree in Computer Engineering in 1979 followed by a Postdoc research position to obtain Habilitation degree (Ass. Prof.) in “Computer Engineering” from the Technical University of Braunschweig in Germany. In 2002, he was appointed as a Full Professor at the same University where he is currently researching a wide range of problems including physical security, clone-resistant architectures, IPR protection for VLSI design cores, robot security, vehicular security, e-Money, e-Voting and error correction technology.
Prof. Adi holds 18 European/US patents and has published over 50 conference/journal papers in the area of information security. He has over 20 years experience as industrial consultant for companies such as Siemens, Bosch Telecom, German Telecom, Philips/Valvo and Volkswagen. He has recently served in the 3rd Generation ETSI-European mobile standardization for security and physical layer working groups on mobile security and channel coding.

A link to talks can be found here.

Arrangements

Registration
If you would like to attend this workshop please complete the application form. You will receive an e-mail, by 12 November, confirming your place.

Venue
The course will take place at ICMS, 14 India Street, the birthplace of James Clerk Maxwell. 

The seminar room at 14 India Street has whiteboards, 2 overhead projectors, a data projector and laptop. If you are a Speaker, we ask that you use our ICMS laptop for your presentation which you may bring on a memory stick or CD.

Wireless access is available throughout the building. There are also 4 public PCs which may be used at any time for internet access and to check email.

Travel to ICMS
For information and advice about travel to Edinburgh and finding ICMS, please follow the link entitled 'Information for Visitors' at the top right of the webpage. A map of the city centre showing the location of ICMS is available here .

Accommodation
You are asked to reserve your own accommodation if you require this.

A list of Edinburgh accommodation of various sorts and prices is detailed below

The Walton Hotel, 79 Dundas Street, Edinburgh EH3 6SD

+44 (0)131 556 1137 - www.waltonhotel.com - enquiries@waltonhotel.com

Ballantrae West End Hotel, 6 Grosvenor Crescent, Edinburgh EH12 5EP
+44 (0) 131 225 7033 - http://www.ballantraewestend.co.uk/ - westend@ballantraehotel.co.uk

Ardenlee Guesthouse, 9 Eyre Place, Edinburgh EH3 5ES
+44 (0)131 556 2838 - www.ardenlee.co.uk - info@ardenleeguesthouse.com

The Dene, 7 Eyre Place, Edinburgh EH3 5ES
+44 (0)131 556 2700 - www.deneguesthouse.com - deneguesthouse@yahoo.co.uk

Edinburgh Central Youth Hostel, 9 Haddington Place, Off Leith Walk, Edinburgh, EH7 4AL
+44 (0)131 534 2090 - http://www.syha.org.uk/SYHA/Web/Site/Hostels/EdinburghCentral.asp

Other accommodation can be found at this link

Refreshments
Tea and coffee will be provided during the course.

Programme

Monday 16 November 2009

  Secret-Key Systems (Design Fundamentals 1)
09.00 - 10.30 Introduction, historical overview
10.30 - 11.00 Tea/coffee
11.00 - 13.00 Basic mathematical tools for crypto-techniques
13.00 - 14.00 Lunch break
14.00 - 15.15 Secret-key systems, Security Theory
15.15 - 15.45 Tea/Coffee
15.45 - 17.00 Design principles of contemporary stream and block ciphers


Tuesday 17 November 2009

  Public-key Systems (Design Fundamentals 2)
09.00 - 10.30 Public-key systems
10.30 - 11.00 Tea/coffee
11.00 - 13.00 Design principles of Diffie-Hellman key-exchange system
13.00 - 14.00 Lunch break
14.00 - 15.15 RSA, ElGamal, Rabin, EC and Knapsack public key techniques
15.15 - 15.45 Tea/Coffee
15.45 - 17.00 Identification, uniqueness and physical security


Wednesday 18 November 2009

  Fundamental Security Techniques and Research Topics
09.00 - 10.30 Cryptographic protocols and standards Network security techniques
10.30 - 11.00 Tea/coffee
11.00 - 13.00 Unclonable and clone-resistant identification Unknown secret physical functions
13.00 - 14.00 Lunch break
14.00 - 15.15 VLSI Design-core security in reconfigurable hardware
15.15 - 15.45 Tea/Coffee
15.45 - 17.00 Special vehicular security mechanisms Secured cash systems

Participants

Name Institution
ALsehly, Firas University of Edinburgh
Benkrid, Khaled University of Edinburgh
Chakraborty, Chiranjit University of Edinburgh
Hopson, Ben University of Edinburgh
Köppe, Thomas University of Edinburgh
O'Carroll, Liam University of Edinburgh
Santhanam, Rahul University of Edinburgh
Tanner, Jared University of Edinburgh
Taylor, Graeme University of Edinburgh
Tian, Xiang University of Edinburgh
Zoe, O'Connor Heriot-Watt University