Code: NIE-BVS |
Embedded Security |
Lecturer: Dr.-Ing. Martin Novotný |
Weekly load: 2P+2C |
Completion: A, EX |
Department: 18103 |
Credits: 5 |
Semester: S |
- Description:
-
Students gain basic knowledge in selected topics of cryptography and cryptanalysis. The course focuses particularly on efficient implementations of cryptographic primitives in hardware and software (in embedded systems). Students gain a good overview of functionality of (hardware) cryptographic accelerators, smart cards, and resources for securing internal functions of computer systems.
- Contents:
-
1. Embedded Systems with Cryptographic Features, SmartCards.
2. Attacks on Cryptographic Systems I: Differential Power Analysis.
3. Introduction to Elliptic Curve Cryptography (ECC).
4. ECC, Arithmetics over GF(p), Montgomery Domain.
5. ECC, Arithmetics over GF(2^m) with Polynomial Basis Representation.
6. ECC, Arithmetics over GF(2^m) with Normal Basis Representation.
7. (Pseudo)Random Number Generators in Embedded Systems.
8. Efficient Exponentiation.
9.Efficient Implementation of RSA, Efficient Multiplication.
10. Attacks on Cryptographic Systems II: Time-Memory Trade-Off (TMTO) Tables Attacks.
11. Attacks on Cryptographic Systems III: Guess-and-Determine Attack.
12. Attacks on Cryptographic Systems iV: Side-Channel and Fault-Injection Attacks.
- Seminar contents:
-
1. Implementation of a symmetric cipher in an FPGA or a microcontroller.
2. Differential Power Analysis
3. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.
4. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.
5. RSA.
- Recommended literature:
-
1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.
2. Paar, C., Pelzl, J. "Understanding Cryptography". Springer, 2010, ISBN 978-3-642-04100-6
3. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 047085668-8.
4. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 978-0-470-06852-6.
5. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978-0-7506-7967.
6. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.
- Keywords:
- cryptography, cryptanalysis, embedded systems, SmartCards, FPGA
Abbreviations used:
Semester:
- W ... winter semester (usually October - February)
- S ... spring semester (usually March - June)
- W,S ... both semesters
Mode of completion of the course:
- A ... Assessment (no grade is given to this course but credits are awarded. You will receive only P (Passed) of F (Failed) and number of credits)
- GA ... Graded Assessment (a grade is awarded for this course)
- EX ... Examination (a grade is awarded for this course)
- A, EX ... Examination (the award of Assessment is a precondition for taking the Examination in the given subject, a grade is awarded for this course)
Weekly load (hours per week):
- P ... lecture
- C ... seminar
- L ... laboratory
- R ... proseminar
- S ... seminar