Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2025/2026

Embeded SeCurity

The course is not on the list Without time-table
Code Completion Credits Range
PI-ESC ZK 4 3C
Course guarantor:
Lecturer:
Tutor:
Supervisor:
Department of Information Security
Synopsis:

Familiarization of students with the theoretical and practical aspects of embedded security.

Design methods of hardware cryptographic primitives for embedded systems. Understanding of the origin of vulnerabilities when designing digital circuits for embedded systems. Methods of elimination of these vulnerabilities.

Requirements:
Syllabus of lectures:
Syllabus of tutorials:

Design tools and their properties in terms of vulnerabilities.

TRNG design and testing.

PUF design and testing.

PUF and TRNG statistical models.

Sources of entropy in FPGA ans ASIC technologies

SPA, DPA, etc.

Hardware trojan horses.

Detection and countermeasures against HW trojan horses.

Study Objective:

Familiarization of students with the theoretical and practical aspects of embedded security.

Design methods of hardware cryptographic primitives for embedded systems. Understanding of the origin of vulnerabilities when designing digital circuits for embedded systems. Methods of elimination of these vulnerabilities.

Study materials:
Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2025-03-14
For updated information see http://bilakniha.cvut.cz/en/predmet5681406.html