Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BIK-HWB Hardware Security Extent of teaching: 14KP+4KC
Instructor: Buček J., Lórencz R. Completion: Z,ZK
Department: 18106 Credits: 5 Semester: Z

Annotation:
The course deals with hardware resources used to ensure security of computer systems including embedded ones. The students become familiar with the operating principles of cryptographic modules, the security features of modern processors, and storage media protection through encryption. They will gain knowledge about vulnerabilities of HW resources, including side-channel attacks and tampering with hardware during manufacture. Students will have an overview of contact and contactless smart card technology including applications and related topics for multi-factor authentication (biometrics). Students will understand the problems of effective implementation of ciphers.

Lecture syllabus:
1. Hardware cryptographic modules, key storage.
2. Security features of processor architectures.
3. Encryption of storage media.
4. Side-channel attacks (power analysis, timing attack, electromagnetic analysis).
5. Smart cards (applications: digital signature, authentication).
6. Contactless cards, RFID, NFC.
7. Trusted HW design, forgery.
8. Hardware Trojans.
9. Physically unclonable functions (PUF) and true random number generators (TRNG).
10. Biometrics.
11. Effective implementation of ciphers.
12. Security of embedded systems (e.g., automobiles).

Seminar syllabus:
1. Java Card programming - basic communication, encryption, digital signature
2. Side channel channel attack - fundamentals of differential power analysis
3. AES cipher - basic implementation, optimization for 32-bit platform, use of dedicated instructions (AES-NI)

Literature:
[1] Mangard, S. - Oswald, E. - Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security), Springer-Verlag New York, 2007, 0387308571,
[2] Rankl, W. - Effing, W.: Smart Card Handbook, 4th Edition, John Wiley &; Sons, Inc., New York, 1997, 978-0-470-74367-6,
[3] Tuyls, P. - Skoric, B. - Kevenaar, T.: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag New York, 2007, 1846289831.

Requirements:

Informace o předmětu a výukové materiály naleznete na https://moodle-vyuka.cvut.cz/course/search.php?search=BIK-HWB

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BIK-BIT.2015 Computer Security and Information technology PO 5
BIK-BIT.2020 Computer Security and Information technology PO 5
BIK-WSI-SI.2015 Web and Software Engineering V 5
BIK-PV.21 Computer Systems and Virtualization 2021 (in Czech) V 5
BIK-SPOL.2015 Unspecified Branch/Specialisation of Study VO 5
BIK-SI.21 Software Engineering 2021 (in Czech) V 5


Page updated 28. 3. 2024, semester: Z/2023-4, L/2019-20, L/2022-3, Z/2019-20, Z/2022-3, L/2020-1, L/2023-4, Z/2020-1, Z,L/2021-2, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška