Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024
UPOZORNĚNÍ: Jsou dostupné studijní plány pro následující akademický rok.

Embedded Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
NI-BVS Z,ZK 5 2P+2C Czech
Garant předmětu:
Martin Novotný
Lecturer:
Martin Novotný
Tutor:
Martin Novotný
Supervisor:
Department of Digital Design
Synopsis:

Students gain basic knowledge in selected topics of cryptography and cryptanalysis. The course focuses particularly on efficient implementations of cryptographic primitives in hardware and software (in embedded systems). Students gain a good overview of functionality of (hardware) cryptographic accelerators, smart cards, and resources for securing internal functions of computer systems.

Requirements:

Basic fundamentals of cryptography.

Basic fundamentals of digital design.

Knowledge of VHDL or C.

Syllabus of lectures:

1. Embedded Systems with Cryptographic Features, SmartCards.

2. Attacks on Cryptographic Systems I: Differential Power Analysis.

3. Introduction to Elliptic Curve Cryptography (ECC).

4. ECC, Arithmetics over GF(p), Montgomery Domain.

5. ECC, Arithmetics over GF(2^m) with Polynomial Basis Representation.

6. ECC, Arithmetics over GF(2^m) with Normal Basis Representation.

7. (Pseudo)Random Number Generators in Embedded Systems.

8. Efficient Exponentiation.

9.Efficient Implementation of RSA, Efficient Multiplication.

10. Attacks on Cryptographic Systems II: Time-Memory Trade-Off (TMTO) Tables Attacks.

11. Attacks on Cryptographic Systems III: Guess-and-Determine Attack.

12. Attacks on Cryptographic Systems iV: Side-Channel and Fault-Injection Attacks.

Syllabus of tutorials:

1. Implementation of a symmetric cipher in an FPGA or a microcontroller.

2. Differential Power Analysis

3. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.

4. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.

5. RSA.

Study Objective:

The module introduces students into the area of security of computer systems using hardware and provides knowledge needed for analysis and design of computer system security.

Study materials:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.

2. Paar, C., Pelzl, J. „Understanding Cryptography“. Springer, 2010, ISBN 978-3-642-04100-6

3. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 047085668-8.

4. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 978-0-470-06852-6.

5. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978-0-7506-7967.

6. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.

Note:
Time-table for winter semester 2023/2024:
Time-table is not available yet
Time-table for summer semester 2023/2024:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomTH:A-1048
Novotný M.
11:00–12:30
(lecture parallel1)
Thákurova 7 (budova FSv)
Servitova laborka
roomTH:A-1048
Novotný M.
14:30–16:00
(lecture parallel1
parallel nr.101)

Thákurova 7 (budova FSv)
Servitova laborka
roomTH:A-1048
Novotný M.
16:15–17:45
(lecture parallel1
parallel nr.102)

Thákurova 7 (budova FSv)
Servitova laborka
Wed
Thu
Fri
The course is a part of the following study plans:
Data valid to 2024-05-29
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6071706.html