Security and Hardware
Code  Completion  Credits  Range  Language 

MIBHW  Z,ZK  4  2+2  Czech 
 Lecturer:
 Tutor:
 Supervisor:
 Department of Digital Design
 Synopsis:

Students gain a basic knowledge in selected topics of cryptography and cruptanalysis. The module focuses particularly on elliptic curve cryptography, and on contemporary attacks on cryptographic systems. Students gain a good overview of the functionality of (hardware) cryptographic accelerators, (pseudo)random number generators, smart cards, and resources for securing of internal functions of computer systems.
 Requirements:

Basic fundamentals of cryptography.
Basic fundamentals of digital design.
Knowledge of VHDL or C.
 Syllabus of lectures:

1. BruteForce Attacks
2. TimeMemory TradeOff Attacks.
3. Sidechannel attacks.
4. Elliptic Curve Cryptography.
5. Efficient Implementation of Binary Field and Prime Filed Operations.
6. (Pseudo)random Number Generators.
7. Smart Cards.
 Syllabus of tutorials:

1. Implementation of a chosen cipher in a FPGA or a microcontroller.
2. Side channel attack  key retrieval by means of differential power analysis (DPA)
3. Side channel attack  key retrieval by means of differential power analysis (DPA)
4. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.
5. DiffieHellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.
 Study Objective:

The module introduces students into the area of security of computer systems using hardware and provides knowledge needed for analysis and design of computer system security.
 Study materials:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.
2. Paar, C., Pelzl, J. „Understanding Cryptography“. Springer, 2010, ISBN 9783642041006
3. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 0470856688.
4. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 9780470068526.
5. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978075067967.
6. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.
 Note:
 Further information:
 No timetable has been prepared for this course
 The course is a part of the following study plans:

 Specialization System Programming, Presented in Czech, Version 2014, 2015 (elective course)
 Specialization Web Engineering, Presented in Czech, for Students who Enrolled in 2014 and 2015 (elective course)
 Knowledge Engineering, in Czech, Presented in Czech, for Students who Enrolled in 2015 (elective course)
 Master Informatics, Presented in Czech, Version for Students who Enrolled in 2015 (VO, elective course)
 Specialization Web and Software Engineering, in Czech, Version 2016, 2017 and 2018 (elective course)