Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Security and Hardware

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
MI-BHW Z,ZK 4 2+1 Czech
Lecturer:
Róbert Lórencz (gar.), Martin Novotný
Tutor:
Jiří Buček, Martin Novotný
Supervisor:
Department of Computer Systems
Synopsis:

Students gain a basic knowledge in selected topics of cryptography and cruptanalysis. The module focuses particularly on elliptic curve cryptography, and on contemporary attacks on cryptographic systems. Students gain a good overview of the functionality of (hardware) cryptographic accelerators, random number generators, smart cards, and resources for securing of internal functions of computer systems.

Requirements:

Basic fundamentals of cryptography.

Basic fundamentals of digital design.

Knowledge of VHDL or C.

Syllabus of lectures:

1. Brute-Force Attacks

2. Time-Memory Trade-Off Attacks.

3. Side-channel attacks.

4. Elliptic Curve Cryptography.

5. Efficient Implementation of Binary Field and Prime Filed Operations.

6. (Pseudo)random Number Generators.

7. Smart Cards.

Syllabus of tutorials:

1. Implementation of a chosen cipher in a FPGA or a microcontroller.

2. Implementation of a brute-force attack on the chosen cipher.

3. Side channel attack - key retrieval by means of differential power analysis (DPA)

4. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.

5. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.

Study Objective:

The module introduces students into the area of security of computer systems using hardware and provides knowledge needed for analysis and design of computer system security.

Study materials:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.

2. Paar, C., Pelzl, J. „Understanding Cryptography“. Springer, 2010, ISBN 978-3-642-04100-6

3. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 047085668-8.

4. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 978-0-470-06852-6.

5. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978-0-7506-7967.

6. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.

Note:
Further information:
https://edux.fit.cvut.cz/courses/MI-BHW/
Time-table for winter semester 2011/2012:
Time-table is not available yet
Time-table for summer semester 2011/2012:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
roomT9:345
Novotný M.
Buček J.

16:15–17:45
ODD WEEK

(lecture parallel1
parallel nr.103)

Dejvice
NBFIT HW ucebna
roomT9:345
Novotný M.
Buček J.

16:15–17:45
EVEN WEEK

(lecture parallel1
parallel nr.104)

Dejvice
NBFIT HW ucebna
Tue
Fri
Thu
Fri
roomT9:349
Novotný M.
Lórencz R.

11:00–12:30
(lecture parallel1)
Dejvice
NBFIT místnost
roomT9:345
Novotný M.
Buček J.

12:45–14:15
ODD WEEK

(lecture parallel1
parallel nr.101)

Dejvice
NBFIT HW ucebna
roomT9:345
Novotný M.
Buček J.

12:45–14:15
EVEN WEEK

(lecture parallel1
parallel nr.102)

Dejvice
NBFIT HW ucebna
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet1435706.html