Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024
UPOZORNĚNÍ: Jsou dostupné studijní plány pro následující akademický rok.

Security and Hardware

The course is not on the list Without time-table
Code Completion Credits Range Language
MIE-BHW.16 Z,ZK 5 2P+2C English
Garant předmětu:
Lecturer:
Tutor:
Supervisor:
Department of Digital Design
Synopsis:

Students gain a basic knowledge in selected topics of cryptography and cryptanalysis. The module focuses particularly on elliptic curve cryptography, and on contemporary attacks on cryptographic systems. Students gain a good overview of the functionality of (hardware) cryptographic accelerators, random number generators, smart cards, and resources for securing of internal functions of computer systems.

Requirements:
Syllabus of lectures:

1. Smart Cards.

2. Efficient Implementation of RSA.

3. Efficient Exponentiation.

4. (2) Implementation of Prime Fields Operations.

5. (2) Implementation of Binary Fields Operations.

6. Implementation of General Fields Operations.

7. (2) Elliptic Curve Cryptography.

8. Brute-Force Attacks

9. Time-Memory Trade-Off Attacks.

Syllabus of tutorials:

1. Implementation of a chosen symmetric cipher in a FPGA or a microcontroller.

2. RSA.

3. Digital signature.

4. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.

5. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.

Study Objective:

The module introduces students into the area of security of computer systems using hardware and provides knowledge needed for analysis and design of computer system security.

Study materials:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.

2. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 047085668-8.

3. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 978-0-470-06852-6.

4. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978-0-7506-7967.

5. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.

Note:
Further information:
https://courses.fit.cvut.cz/MI-BHW/en/index.html
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2024-03-27
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet4719406.html