Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BIK-HWB.21 Hardware Security Extent of teaching: 14KP+4KC
Instructor: Buček J. Completion: Z,ZK
Department: 18106 Credits: 5 Semester: Z

Annotation:
The course deals with hardware resources used to ensure security of computer systems including embedded ones. Students become familiar with the operating principles of cryptographic modules, security features of modern processors, and storage media protection through encryption. They will gain knowledge about vulnerabilities of HW resources, including side-channel attacks and tampering with hardware during manufacture. Students will have an overview of contact and contactless smart card technology including applications and related topics for multi-factor authentication (biometrics). Students will understand methods of efficient implementations of ciphers.

Lecture syllabus:
1. HW cryptographic modules, key storage.
2. Security elements of processor architectures.
3. Smart cards and tokens: Architectures and systems.
4. Smart cards and tokens: Authentication protocols.
5. Smart cards and tokens: RFID, Near Field Communication.
6. Methods of side channel attacks (power analysis, timing attack, electromagnetic analysis).
7. Storage encryption algorithms, introduction to polynomial arithmetic.
8. Efficient cipher implementation, AES cipher.
9. Physical unclonable functions.
10. True random and pseudorandom number generators.
11. Introduction to biometric identification methods.
12. Security of embedded devices, vulnerabilities of modern processors.
13. Trusted hardware design, hardware trojans.

Seminar syllabus:
1. Java Card programming - basic communication, encryption, digital signature
2. Side channel channel attack - fundamentals of differential power analysis
3. AES cipher - basic implementation, optimization for 32-bit platform, use of dedicated instructions (AES-NI)

Literature:
1. Mangard S., Oswald E., Popp T. : Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007. ISBN 387308571.
2. Tuyls P., Skoric B., Kevenaar T. : Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, 2007. ISBN 1846289831.
3. Bhunia S., Tehranipoor M. : Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, 2018. ISBN 9780128124772.
4. Rankl W., Effing W. : Smart Card Handbook (4th Edition). John Wiley & Sons, 2010. ISBN 978-0-470-74367-6.

Requirements:
Basics of computer security and cryptography, programming.

https://courses.fit.cvut.cz/BI-HWB/

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BIK-SPOL.21 Unspecified Branch/Specialisation of Study VO 5
BIK-PS.21 Computer Networks and Internet 2021 (in Czech) V 5
BIK-IB.21 Information Security 2021 (in Czech) PS 5


Page updated 16. 4. 2024, semester: Z/2024-5, L/2021-2, Z,L/2022-3, Z/2019-20, L/2023-4, L/2019-20, L/2020-1, Z/2021-2, Z/2023-4, Z/2020-1, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška