Logo ČVUT
ČESKÉ VYSOKÉ UČENÍ TECHNICKÉ V PRAZE
STUDIJNÍ PLÁNY
2024/2025

Embedded Security

Předmět není vypsán Nerozvrhuje se
Kód Zakončení Kredity Rozsah Jazyk výuky
NIE-BVS Z,ZK 5 2P+2C anglicky
Garant předmětu:
Přednášející:
Cvičící:
Předmět zajišťuje:
katedra číslicového návrhu
Anotace:

Students gain basic knowledge in selected topics of cryptography and cryptanalysis. The course focuses particularly on efficient implementations of cryptographic primitives in hardware and software (in embedded systems). Students gain a good overview of functionality of (hardware) cryptographic accelerators, smart cards, and resources for securing internal functions of computer systems.

Požadavky:

Basic fundamentals of cryptography.

Basic fundamentals of digital design.

Knowledge of VHDL or C.

Osnova přednášek:

1. Embedded Systems with Cryptographic Features, SmartCards.

2. Attacks on Cryptographic Systems I: Differential Power Analysis.

3. Introduction to Elliptic Curve Cryptography (ECC).

4. ECC, Arithmetics over GF(p), Montgomery Domain.

5. ECC, Arithmetics over GF(2^m) with Polynomial Basis Representation.

6. ECC, Arithmetics over GF(2^m) with Normal Basis Representation.

7. (Pseudo)Random Number Generators in Embedded Systems.

8. Efficient Exponentiation.

9.Efficient Implementation of RSA, Efficient Multiplication.

10. Attacks on Cryptographic Systems II: Time-Memory Trade-Off (TMTO) Tables Attacks.

11. Attacks on Cryptographic Systems III: Guess-and-Determine Attack.

12. Attacks on Cryptographic Systems iV: Side-Channel and Fault-Injection Attacks.

Osnova cvičení:

1. Implementation of a symmetric cipher in an FPGA or a microcontroller.

2. Differential Power Analysis

3. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.

4. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.

5. RSA.

Cíle studia:

Students will gain basic knowledge in selected chapters of cryptography and cryptanalysis. Emphasis is placed on the effective implementation of cryptographic primitives in hardware and software (embedded systems), which students will verify on specific laboratory tasks.

Students will gain knowledge about the function of (hardware) accelerators of cryptographic operations, smart cards and means for securing the internal functions of the computer.

In addition, the course deals with some selected attacks on cryptographic systems, thanks to which students will gain knowledge about some potential risks of cryptographic systems and will be better able to face them.

Studijní materiály:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.

2. Paar, C., Pelzl, J. „Understanding Cryptography“. Springer, 2010, ISBN 978-3-642-04100-6

3. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 047085668-8.

4. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 978-0-470-06852-6.

5. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978-0-7506-7967.

6. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.

7. Rak, R., Matyáš, V., Říha, Z., ''Biometrie a identita člověka ve forenzních a komerčních aplikacích'', Grada, 2008, ISBN: 978-80-247-2365-5.

Poznámka:
Další informace:
Pro tento předmět se rozvrh nepřipravuje
Předmět je součástí následujících studijních plánů:
Platnost dat k 16. 6. 2024
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/cs/predmet6625106.html