Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2018/2019

Security and Hardware

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
MIE-BHW.16 Z,ZK 5 2+2
Lecturer:
Martin Novotný (guarantor)
Tutor:
Martin Novotný (guarantor)
Supervisor:
Department of Digital Design
Synopsis:

Students gain a basic knowledge in selected topics of cryptography and cryptanalysis. The module focuses particularly on elliptic curve cryptography, and on contemporary attacks on cryptographic systems. Students gain a good overview of the functionality of (hardware) cryptographic accelerators, random number generators, smart cards, and resources for securing of internal functions of computer systems.

Requirements:
Syllabus of lectures:

1. Smart Cards.

2. Efficient Implementation of RSA.

3. Efficient Exponentiation.

4. (2) Implementation of Prime Fields Operations.

5. (2) Implementation of Binary Fields Operations.

6. Implementation of General Fields Operations.

7. (2) Elliptic Curve Cryptography.

8. Brute-Force Attacks

9. Time-Memory Trade-Off Attacks.

Syllabus of tutorials:

1. Implementation of a chosen symmetric cipher in a FPGA or a microcontroller.

2. RSA.

3. Digital signature.

4. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.

5. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.

Study Objective:

The module introduces students into the area of security of computer systems using hardware and provides knowledge needed for analysis and design of computer system security.

Study materials:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.

2. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 047085668-8.

3. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 978-0-470-06852-6.

4. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978-0-7506-7967.

5. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.

Note:
Time-table for winter semester 2018/2019:
Time-table is not available yet
Time-table for summer semester 2018/2019:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomTH:A-1247
Novotný M.
11:00–12:30
(lecture parallel1)
Thákurova 7 (FSv-budova A)
seminární místnost
roomTH:A-1048
Novotný M.
18:00–19:30
(lecture parallel1
parallel nr.101)

Thákurova 7 (FSv-budova A)
Servitova laborka
Fri
Thu
Fri
The course is a part of the following study plans:
Data valid to 2019-03-23
For updated information see http://bilakniha.cvut.cz/en/predmet4719406.html