Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2018/2019

Hardware Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
MI-HWB.16 Z,ZK 5 2+2 Czech
Lecturer:
Jiří Buček, Róbert Lórencz (guarantor)
Tutor:
Jiří Buček, Róbert Lórencz (guarantor), Martin Novotný
Supervisor:
Department of Information Security
Synopsis:

The course provides the knowledge needed for the analysis and design of computer systems security solutions. Students get an overview of safeguards against abuse of the system using hardware means. They will be able to safely use and integrate hardware components into systems and test them for resistance to attacks.

Students will gain knowledge about the cryptographic accelerators, PUF, random number generators, smart cards, biometric devices, and devices for internal security functions of the computer.

Requirements:
Syllabus of lectures:

1. Design of hardware security modules.

2. Cryptographic accelerators.

3. HW resources for authentication operations.

4. Utilization of sensor data for security.

5. Types of side channels, the impact of technology and architecture.

6. Power and electromagnetic side-channel analysis, power analysis.

7. Differential power analysis.

8. Defense against side-channel attacks.

9. Resistance to tampering - monitors of physical parameters.

10. Securing code execution (trusted platform), security storage.

11. HW malware - detection and prevention, fault injection.

12. Protection of intellectual property, protection of FPGA bitstream.

13. Design of PUF & TRNG.

Syllabus of tutorials:
Study Objective:

The course provides the knowledge needed for the analysis and design of computer systems security solutions. Students get an overview of safeguards against abuse of the system using hardware means. They will be able to safely use and integrate hardware components into systems and test them for resistance to attacks.

Students will gain knowledge about the cryptographic accelerators, PUF, random number generators, smart cards, biometric devices, and devices for internal security functions of the computer.

Study materials:

1. Menezes, A. - Oorschot, P. - Vanstone, S.: Handbook of Applied Cryptography. CRC Press. 1996. 0849385237.

2. Paar, C. - Pelzl, J.: Understanding Cryptography. Springer. 2010. 978-3-642-04100-6.

3. Rankl, W. - Effing, W.: Smart Card Handbook (3rd Edition). Wiley. 2004. 978-0-470-85669-7.

4. Anderson, R. J.: Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition). Wiley. 2008. 978-0-470-06852-6.

5. Vacca, J. R.: Biometric Technologies and Verification Systems. Elsevier. 2007. 978-0-7506-7967.

6. Ecks, M.: Smartcard development with JavaCard and the OpenCard Framework: A feasibility study. VDM Verlag Dr. Müller. 2008. 3836499894.

Note:
Time-table for winter semester 2018/2019:
Time-table is not available yet
Time-table for summer semester 2018/2019:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
Fri
roomTH:A-942
Buček J.
12:45–14:15
(lecture parallel1)
Thákurova 7 (FSv-budova A)
roomTH:A-1048
Buček J.
14:30–16:00
(lecture parallel1
parallel nr.101)

Thákurova 7 (FSv-budova A)
Servitova laborka
Thu
Fri
The course is a part of the following study plans:
Data valid to 2019-03-19
For updated information see http://bilakniha.cvut.cz/en/predmet4671406.html