Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2019/2020

Hardware Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BI-HWB Z,ZK 5 2P+2C Czech
Lecturer:
Jiří Buček (guarantor), Róbert Lórencz (guarantor)
Tutor:
Jiří Buček (guarantor), Róbert Lórencz (guarantor), Filip Kodýtek
Supervisor:
Department of Information Security
Synopsis:

The course deals with hardware resources used to ensure security of computer systems including embedded ones. The students become familiar with the operating principles of cryptographic modules, the security features of modern processors, and storage media protection through encryption. They will gain knowledge about vulnerabilities of HW resources, including side-channel attacks and tampering with hardware during manufacture. Students will have an overview of contact and contactless smart card technology including applications and related topics for multi-factor authentication (biometrics). Students will understand the problems of effective implementation of ciphers.

Requirements:

basics of computer security and cryptography, programming

Syllabus of lectures:

1. Hardware cryptographic modules, key storage.

2. Security features of processor architectures.

3. Encryption of storage media.

4. Side-channel attacks (power analysis, timing attack, electromagnetic analysis).

5. Smart cards (applications: digital signature, authentication).

6. Contactless cards, RFID, NFC.

7. Trusted HW design, forgery.

8. Hardware Trojans.

9. Physically unclonable functions (PUF) and true random number generators (TRNG).

10. Biometrics.

11. Effective implementation of ciphers.

12. Security of embedded systems (e.g., automobiles)."

Syllabus of tutorials:

1. Introduction to Java Card programming

2. Loading applets into cards, PIN excercise

3. Hashing operations, communication with PC

4. Digital signature on smart card

5. Basics of differential power analysis

6. Polynomial arithmetic (seminar)

7. Simple AES-128 implementation

8. Optimizing AES for 32bit platforms

9. AES acceleration using dedicated instructions (AES-NI)

10. Testing AES on an ARM microcontroller

11. Finishing AES tasks

12. PUF circuit response analysis"

Study Objective:

Students will understand hardware tools to ensure the security of computer systems including smart card technologies and efficient implementation of ciphers. They also get an overview of vulnerabilities of HW resources.

Study materials:

[1] Mangard, S. - Oswald, E. - Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security), Springer-Verlag New York, 2007, 0387308571,

[2] Rankl, W. - Effing, W.: Smart Card Handbook, 4th Edition, John Wiley &; Sons, Inc., New York, 1997, 978-0-470-74367-6,

[3] Tuyls, P. - Skoric, B. - Kevenaar, T.: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag New York, 2007, 1846289831, "

Note:
Time-table for winter semester 2019/2020:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomTH:A-s135
Buček J.
14:30–16:00
(lecture parallel1)
Thákurova 7 (FSv-budova A)
As135
Fri
Thu
roomTH:A-1142
Buček J.
14:30–16:00
(lecture parallel1
parallel nr.101)

Thákurova 7 (FSv-budova A)
Apple lab
roomTH:A-1142
Buček J.
16:15–17:45
(lecture parallel1
parallel nr.102)

Thákurova 7 (FSv-budova A)
Apple lab
Fri
Time-table for summer semester 2019/2020:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2019-09-23
For updated information see http://bilakniha.cvut.cz/en/predmet3459606.html