Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2025/2026

Embedded Security

The course is not on the list Without time-table
Code Completion Credits Range Language
ANI-BVS Z,ZK 5 2P+2C Czech
Course guarantor:
Lecturer:
Tutor:
Supervisor:
Department of Digital Design
Synopsis:

Students gain basic knowledge in selected topics of cryptography and cryptanalysis. The course focuses particularly on efficient implementations of cryptographic primitives in hardware and software (in embedded systems). Students gain a good overview of functionality of (hardware) cryptographic accelerators, smart cards, and resources for securing internal functions of computer systems.

Requirements:
Syllabus of lectures:

1. Embedded Systems with Cryptographic Features, SmartCards.

2. Attacks on Cryptographic Systems I: Correlation Power Analysis.

3. Introduction to Elliptic Curve Cryptography (ECC).

4. ECC, Arithmetics over GF(p), Montgomery Domain.

5. ECC, Arithmetics over GF(2^m) with Polynomial Basis Representation.

6. ECC, Arithmetics over GF(2^m) with Normal Basis Representation.

7. (Pseudo)Random Number Generators in Embedded Systems.

8. Efficient Exponentiation.

9. Efficient Implementation of RSA, Efficient Multiplication.

10. Attacks on Cryptographic Systems II: Brute-Force attacks, Meet-in-the-Middle Attack.

11. Attacks on Cryptographic Systems II: Time-Memory Trade-Off (TMTO) Tables Attacks.

12. Attacks on Cryptographic Systems III: Guess-and-Determine Attack.

13. Attacks on Cryptographic Systems IV: Side-Channel and Fault-Injection Attacks.

Syllabus of tutorials:

1. Implementation of a symmetric cipher in an FPGA or a microcontroller.

2. Differential Power Analysis

3. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.

4. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.

5. RSA.

Study Objective:
Study materials:

1. Paar, C.: Implementation of Cryptographic Schemes 1. Ruhr-University Bochum, 2015. ISBN xxxx.

2. Paar, C.: Implementation of Cryptographic Schemes 2. Ruhr-University Bochum, 2012. ISBN xxxx.

3. Deschamps, J. P. - Imana, J. L. - Sutter, G. D.: Hardware Implementation of Finite-Field Arithmetic. McGraw Hill, 2009. ISBN 978-0-0715-4581-5.

4. Brooks, C.J. - Grow, C. - Craig, P. - Short, D.: Cybersecurity Essentials, 1st Edition. Sybex, 2018. ISBN 978-1119362395.

5. Menezes, A.J. - van Oorschot, P.C. - Vanstone, S.A.: Handbook of Applied Cryptography. CRC press, 2018. ISBN 9780429466335.

Note:
Further information:
https://courses.fit.cvut.cz/NI-BVS/index.html
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2025-12-06
For updated information see http://bilakniha.cvut.cz/en/predmet1254088884505.html