Code: NIE-HWB |
Hardware Security |
Lecturer: Ing. Jiųķ Buček Ph.D. |
Weekly load: 2P+2C |
Completion: A, EX |
Department: 18106 |
Credits: 5 |
Semester: S |
- Description:
-
The course provides the knowledge needed for the analysis and design of computer systems security solutions. Students get an overview of safeguards against abuse of the system using hardware means. They will be able to safely use and integrate hardware components into systems and test them for resistance to attacks.
Students will gain knowledge about the cryptographic accelerators, PUF, random number generators, smart cards, biometric devices, and devices for internal security functions of the computer.
- Contents:
-
1. Design of hardware security modules.
2. Types of side channels, sources of information transmitted by the side channel.
3. Measurement methods of physical quantities of side channels.
4. Differential power analysis (DPA).
5. Influence of algorithm and technology on side channels, SPA.
6. Countermeasures against side channel attacks - hiding, masking.
7. Second order differential power analysis.
8. Methods of accelerating cryptographic operations.
9. Tamper resistance.
10. Error attacks, fault injection.
11. Secure design of true random number generators (TRNG).
12. Secure design of physically unclonable functions (PUF).
13. Hardware malware: detection and prevention, trusted manufacturing.
- Seminar contents:
-
1. Introduction to measurement with oscilloscope and smart card
2. Measurement with oscilloscope, data transfer to PC
3. Differential power analysis
4. DPA - power models, evaluation methods
5. Trace alignment and compression
6. Attacking countermeasures - hiding in time
7. Attacking hiding in time
8. Analysis of correlation with instructions
9. Analysis of correlation with instructions
10. Attacking masking
11. Task finalization
12. Task finalization, credit
- Recommended literature:
-
1. Menezes, A. - Oorschot, P. - Vanstone, S.: Handbook of Applied Cryptography. CRC Press. 1996. 0849385237.
2. Paar, C. - Pelzl, J.: Understanding Cryptography. Springer. 2010. 978-3-642-04100-6.
3. Rankl, W. - Effing, W.: Smart Card Handbook (3rd Edition). Wiley. 2004. 978-0-470-85669-7.
4. Anderson, R. J.: Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition). Wiley. 2008. 978-0-470-06852-6.
5. Vacca, J. R.: Biometric Technologies and Verification Systems. Elsevier. 2007. 978-0-7506-7967.
6. Ecks, M.: Smartcard development with JavaCard and the OpenCard Framework: A feasibility study. VDM Verlag Dr. Müller. 2008. 3836499894.
Abbreviations used:
Semester:
- W ... winter semester (usually October - February)
- S ... spring semester (usually March - June)
- W,S ... both semesters
Mode of completion of the course:
- A ... Assessment (no grade is given to this course but credits are awarded. You will receive only P (Passed) of F (Failed) and number of credits)
- GA ... Graded Assessment (a grade is awarded for this course)
- EX ... Examination (a grade is awarded for this course)
- A, EX ... Examination (the award of Assessment is a precondition for taking the Examination in the given subject, a grade is awarded for this course)
Weekly load (hours per week):
- P ... lecture
- C ... seminar
- L ... laboratory
- R ... proseminar
- S ... seminar