Embedded Security
| Code | Completion | Credits | Range | Language |
|---|---|---|---|---|
| ANI-BVS | Z,ZK | 5 | 2P+2C | Czech |
- Course guarantor:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Digital Design
- Synopsis:
-
Students gain basic knowledge in selected topics of cryptography and cryptanalysis. The course focuses particularly on efficient implementations of cryptographic primitives in hardware and software (in embedded systems). Students gain a good overview of functionality of (hardware) cryptographic accelerators, smart cards, and resources for securing internal functions of computer systems.
- Requirements:
- Syllabus of lectures:
-
1. Embedded Systems with Cryptographic Features, SmartCards.
2. Attacks on Cryptographic Systems I: Correlation Power Analysis.
3. Introduction to Elliptic Curve Cryptography (ECC).
4. ECC, Arithmetics over GF(p), Montgomery Domain.
5. ECC, Arithmetics over GF(2^m) with Polynomial Basis Representation.
6. ECC, Arithmetics over GF(2^m) with Normal Basis Representation.
7. (Pseudo)Random Number Generators in Embedded Systems.
8. Efficient Exponentiation.
9. Efficient Implementation of RSA, Efficient Multiplication.
10. Attacks on Cryptographic Systems II: Brute-Force attacks, Meet-in-the-Middle Attack.
11. Attacks on Cryptographic Systems II: Time-Memory Trade-Off (TMTO) Tables Attacks.
12. Attacks on Cryptographic Systems III: Guess-and-Determine Attack.
13. Attacks on Cryptographic Systems IV: Side-Channel and Fault-Injection Attacks.
- Syllabus of tutorials:
-
1. Implementation of a symmetric cipher in an FPGA or a microcontroller.
2. Differential Power Analysis
3. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.
4. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.
5. RSA.
- Study Objective:
- Study materials:
-
1. Paar, C.: Implementation of Cryptographic Schemes 1. Ruhr-University Bochum, 2015. ISBN xxxx.
2. Paar, C.: Implementation of Cryptographic Schemes 2. Ruhr-University Bochum, 2012. ISBN xxxx.
3. Deschamps, J. P. - Imana, J. L. - Sutter, G. D.: Hardware Implementation of Finite-Field Arithmetic. McGraw Hill, 2009. ISBN 978-0-0715-4581-5.
4. Brooks, C.J. - Grow, C. - Craig, P. - Short, D.: Cybersecurity Essentials, 1st Edition. Sybex, 2018. ISBN 978-1119362395.
5. Menezes, A.J. - van Oorschot, P.C. - Vanstone, S.A.: Handbook of Applied Cryptography. CRC press, 2018. ISBN 9780429466335.
- Note:
- Further information:
- https://courses.fit.cvut.cz/NI-BVS/index.html
- No time-table has been prepared for this course
- The course is a part of the following study plans: