Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

NI-BVS Embedded Security Extent of teaching: 2P+2C
Instructor: Novotný M. Completion: Z,ZK
Department: 18103 Credits: 5 Semester: L

Annotation:
Students gain basic knowledge in selected topics of cryptography and cryptanalysis. The course focuses particularly on efficient implementations of cryptographic primitives in hardware and software (in embedded systems). Students gain a good overview of functionality of (hardware) cryptographic accelerators, smart cards, and resources for securing internal functions of computer systems.

Lecture syllabus:
1. Embedded Systems with Cryptographic Features, SmartCards.
2. Attacks on Cryptographic Systems I: Differential Power Analysis.
3. Introduction to Elliptic Curve Cryptography (ECC).
4. ECC, Arithmetics over GF(p), Montgomery Domain.
5. ECC, Arithmetics over GF(2^m) with Polynomial Basis Representation.
6. ECC, Arithmetics over GF(2^m) with Normal Basis Representation.
7. (Pseudo)Random Number Generators in Embedded Systems.
8. Efficient Exponentiation.
9. Efficient Implementation of RSA, Efficient Multiplication.
10. Attacks on Cryptographic Systems II: Time-Memory Trade-Off (TMTO) Tables Attacks.
11. Attacks on Cryptographic Systems III: Guess-and-Determine Attack.
12. Attacks on Cryptographic Systems iV: Side-Channel and Fault-Injection Attacks.

Seminar syllabus:
1. Implementation of a symmetric cipher in an FPGA or a microcontroller.
2. Differential Power Analysis
3. Elliptic Curve Cryptography (ECC). Point addition over elliptic curve; its implementation in the FPGA or the microcontroller.
4. Diffie-Hellman key exchange over elliptic curve (ECDH); its implementation in the FPGA or the microcontroller.
5. RSA.

Literature:
1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.
2. Paar, C., Pelzl, J. "Understanding Cryptography". Springer, 2010, ISBN 978-3-642-04100-6
3. Rankl, W., Effing W. ''Smart Card Handbook''. Third Edition, Wiley, ISBN 047085668-8.
4. Ross J. Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'', Second Edition, Wiley, 2008, ISBN 978-0-470-06852-6.
5. John R. Vacca, ''Biometric Technologies and Verification Systems'', Elsevier, 2007, ISBN: 978-0-7506-7967.
6. Ecks, M., ''Smartcard development with JavaCard and the OpenCard Framework: A feasibility study'', VDM Verlag Dr. Müller, 2008, ISBN: 3836499894.

Requirements:
Basic fundamentals of cryptography. Basic fundamentals of digital design. Knowledge of VHDL or C.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
NI-MI.2020 Managerial Informatics V 2
NI-TI.2018 Computer Science V 2
NI-SP.2020 System Programming V 2
NI-SP.2023 System Programming V 2
NIE-DBE.2023 Digital Business Engineering VO 2
NI-PB.2020 Computer Security V 2
NI-TI.2023 Computer Science V 2
NI-TI.2020 Computer Science V 2
NI-NPVS.2020 Design and Programming of Embedded Systems PS 2
NI-WI.2020 Web Engineering V 2
NI-SPOL.2020 Unspecified Branch/Specialisation of Study VO 2
NI-PSS.2020 Computer Systems and Networks V 2
NI-SI.2020 Software Engineering (in Czech) V 2
NI-ZI.2020 Knowledge Engineering V 2
NI-SPOL.2020 Unspecified Branch/Specialisation of Study PS 2


Page updated 24. 4. 2024, semester: Z/2020-1, Z/2019-20, Z/2023-4, Z/2021-2, L/2022-3, Z/2024-5, L/2019-20, Z/2022-3, L/2020-1, L/2021-2, L/2023-4, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška