Hardware Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
BIK-HWB | Z,ZK | 5 | 14KP+4KC | Czech |
- Garant předmětu:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Information Security
- Synopsis:
-
The course deals with hardware resources used to ensure security of computer systems including embedded ones. The students become familiar with the operating principles of cryptographic modules, the security features of modern processors, and storage media protection through encryption. They will gain knowledge about vulnerabilities of HW resources, including side-channel attacks and tampering with hardware during manufacture. Students will have an overview of contact and contactless smart card technology including applications and related topics for multi-factor authentication (biometrics). Students will understand the problems of effective implementation of ciphers.
- Requirements:
- Syllabus of lectures:
-
1. Hardware cryptographic modules, key storage.
2. Security features of processor architectures.
3. Encryption of storage media.
4. Side-channel attacks (power analysis, timing attack, electromagnetic analysis).
5. Smart cards (applications: digital signature, authentication).
6. Contactless cards, RFID, NFC.
7. Trusted HW design, forgery.
8. Hardware Trojans.
9. Physically unclonable functions (PUF) and true random number generators (TRNG).
10. Biometrics.
11. Effective implementation of ciphers.
12. Security of embedded systems (e.g., automobiles).
- Syllabus of tutorials:
-
1. Java Card programming - basic communication, encryption, digital signature
2. Side channel channel attack - fundamentals of differential power analysis
3. AES cipher - basic implementation, optimization for 32-bit platform, use of dedicated instructions (AES-NI)
- Study Objective:
-
Students will understand hardware tools to ensure the security of computer systems including smart card technologies and efficient implementation of ciphers. They also get an overview of vulnerabilities of HW resources.
- Study materials:
-
[1] Mangard, S. - Oswald, E. - Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security), Springer-Verlag New York, 2007, 0387308571,
[2] Rankl, W. - Effing, W.: Smart Card Handbook, 4th Edition, John Wiley &; Sons, Inc., New York, 1997, 978-0-470-74367-6,
[3] Tuyls, P. - Skoric, B. - Kevenaar, T.: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag New York, 2007, 1846289831.
- Note:
- Further information:
- https://moodle-vyuka.cvut.cz/course/search.php?search=BIK-HWB
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Bachelor program Informatics, unspecified branch, in Czech, part-time, 2015 – 2021 (VO)
- Bachelor branch Security and Information Technology, in Czech, part-time, 2015 - 2019 (compulsory course of the specialization)
- Bachelor branch Web and Software Engineering, spec. Software Engin., in Czech, part-time, 2015–2020 (elective course)
- Bachelor specialization Software Engineering, part-time, in Czech, 2021 (elective course)
- Bachelor specialization Computer Systems and Virtualization, part-time, in Czech, 2021 (elective course)
- Bachelor branch Security and Information Technology, part-time, in Czech, 2020 (compulsory course of the specialization)