Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024
UPOZORNĚNÍ: Jsou dostupné studijní plány pro následující akademický rok.

Hardware Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
NI-HWB Z,ZK 5 2P+2C Czech
Garant předmětu:
Jiří Buček
Lecturer:
Jiří Buček, Róbert Lórencz
Tutor:
Jiří Buček
Supervisor:
Department of Information Security
Synopsis:

The course provides the knowledge needed for the analysis and design of computer systems security solutions. Students get an overview of safeguards against abuse of the system using hardware means. They will be able to safely use and integrate hardware components into systems and test them for resistance to attacks.

Students will gain knowledge about the cryptographic accelerators, PUF, random number generators, smart cards, biometric devices, and devices for internal security functions of the computer.

Requirements:

Basics of computer security and cryptography, programming

Syllabus of lectures:

1. Design of hardware security modules.

2. Types of side channels, sources of information transmitted by the side channel.

3. Measurement methods of physical quantities of side channels.

4. Differential power analysis (DPA).

5. Influence of algorithm and technology on side channels, SPA.

6. Countermeasures against side channel attacks - hiding, masking.

7. Second order differential power analysis.

8. Methods of accelerating cryptographic operations.

9. Tamper resistance.

10. Fault attacks, fault injection.

11. Secure design of true random number generators (TRNG).

12. Secure design of physically unclonable functions (PUF).

13. Hardware malware: detection and prevention, trusted manufacturing.

Syllabus of tutorials:

1. Introduction to measurement with oscilloscope and smart card

2. Measurement with oscilloscope, data transfer to PC

3. Differential power analysis

4. DPA - power models, evaluation methods

5. Trace alignment and compression

6. Attacking countermeasures - hiding in time

7. Attacking hiding in time

8. Analysis of correlation with instructions

9. Analysis of correlation with instructions

10. Attacking masking

11. Task finalization

12. Task finalization, credit

Study Objective:

Students will understand the problems of security hardware devices in computer systems. They will be able to perform certain hardware attacks and design countermeasures against them.

Study materials:

1. Bhunia, S. - Tehranipoor, M. : Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, 2018. ISBN 9780128124772.

2. Paar, C. - Pelzl, J. : Understanding Cryptography. Springer, 2010. ISBN 978-3-642-04100-6.

3. Anderson, R. J. : Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition). Wiley, 2008. ISBN 978-0-470-06852-6.

4. Ecks, M. : Smartcard Development with JavaCard and the OpenCard Framework: A feasibility study. VDM Verlag Dr. Muller, 2007. ISBN 3836499894.

5. Rankl, W. - Eng, W. : Smart Card Handbook (3rd Edition). Wiley, 2004. ISBN 978-0-470-85669-7.

6. Menezes, A. - Oorschot, P. - Vanstone, S. : Handbook of Applied Cryptography. CRC Press, 1996. ISBN 0849385237.

Note:
Further information:
https://courses.fit.cvut.cz/NI-HWB/
Time-table for winter semester 2023/2024:
Time-table is not available yet
Time-table for summer semester 2023/2024:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomTH:A-s134
Buček J.
11:00–12:30
(lecture parallel1)
Thákurova 7 (budova FSv)
As134
roomTH:A-1158
Buček J.
14:30–16:00
(lecture parallel1
parallel nr.101)

Thákurova 7 (budova FSv)
RFID laboratoř
roomTH:A-1158
Buček J.
16:15–17:45
(lecture parallel1
parallel nr.102)

Thákurova 7 (budova FSv)
RFID laboratoř
Wed
Thu
Fri
The course is a part of the following study plans:
Data valid to 2024-05-28
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6117606.html