Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BI-HWB Hardware Security Extent of teaching: 2P+2C
Instructor: Buček J., Lórencz R. Completion: Z,ZK
Department: 18106 Credits: 5 Semester: Z

Annotation:
The course deals with hardware resources used to ensure security of computer systems including embedded ones. The students become familiar with the operating principles of cryptographic modules, the security features of modern processors, and storage media protection through encryption. They will gain knowledge about vulnerabilities of HW resources, including side-channel attacks and tampering with hardware during manufacture. Students will have an overview of contact and contactless smart card technology including applications and related topics for multi-factor authentication (biometrics). Students will understand the problems of effective implementation of ciphers.

Lecture syllabus:
1. Hardware cryptographic modules, key storage.
2. Security features of processor architectures.
3. Encryption of storage media.
4. Side-channel attacks (power analysis, timing attack, electromagnetic analysis).
5. Smart cards (applications: digital signature, authentication).
6. Contactless cards, RFID, NFC.
7. Trusted HW design, forgery.
8. Hardware Trojans.
9. Physically unclonable functions (PUF) and true random number generators (TRNG).
10. Biometrics.
11. Effective implementation of ciphers.
12. Security of embedded systems (e.g., automobiles).

Seminar syllabus:
1. Introduction to Java Card programming
2. Loading applets into cards, PIN excercise
3. Hashing operations, communication with PC
4. Digital signature on smart card
5. Basics of differential power analysis
6. Polynomial arithmetic (seminar)
7. Simple AES-128 implementation
8. Optimizing AES for 32bit platforms
9. AES acceleration using dedicated instructions (AES-NI)
10. Testing AES on an ARM microcontroller
11. Finishing AES tasks
12. PUF circuit response analysis

Literature:
[1] Mangard, S. - Oswald, E. - Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security), Springer-Verlag New York, 2007, 0387308571,
[2] Rankl, W. - Effing, W.: Smart Card Handbook, 4th Edition, John Wiley &; Sons, Inc., New York, 1997, 978-0-470-74367-6,
[3] Tuyls, P. - Skoric, B. - Kevenaar, T.: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag New York, 2007, 1846289831,

Requirements:
Fundamentals of computer security and cryptography, programming

Informace o předmětu a výukové materiály naleznete na https://moodle-vyuka.cvut.cz/course/search.php?search=BI-HWB.
Na tento předmět navazuje v magisterském studiu předmět Hardwarová bezpečnost.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BI-ISM.2015 Information Systems and Management V 5
BI-WSI-PG.2015 Web and Software Engineering V 5
BI-BIT.2015 Computer Security and Information technology PO 5
BI-WSI-SI.2015 Web and Software Engineering V 5
BI-WSI-WI.2015 Web and Software Engineering V 5
BI-PI.2015 Computer engineering V 5
BI-TI.2015 Computer Science V 5
BI-ZI.2018 Knowledge Engineering V 5
BI-BIT.2015 Computer Security and Information technology V 5
BI-SPOL.2015 Unspecified Branch/Specialisation of Study VO 3


Page updated 20. 4. 2024, semester: L/2023-4, L/2020-1, L/2022-3, L/2021-2, Z/2019-20, Z/2022-3, Z/2020-1, Z/2023-4, L/2019-20, Z/2021-2, Z/2024-5, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška