Hide menu

Embedded Security

2015HT

Status Archive
School National Graduate School in Computer Science (CUGS)
Division ESLAB
Owner Zebo Peng

  Log in  




Course plan

Lectures

20 hours organized in three days

Recommended for

PhD students interesting in security issues for embedded systems

The course was last given

New course

Goals

This course provides application perspectives on cryptography. This is a course for students interested in hardware and software design in industry i.e. real-world security applications. The course is devoted to the state-of-art in cryptographic hardware and embedded systems. The students will learn about implementation techniques as well as about hardware security of the cryptographic devices. An important aspect is to learn about numerous pervasive applications of security running on extremely constrained platforms such as mobile phones, RFID tags etc.

Prerequisites

Basic knowledge in embedded systems

Contents

• Introduction to cryptography and embedded security
• Modular arithmetic & finite fields for cryptography including software and hardware realizations of those
• Implementation perspectives on:
- Symmetric-key primitives: block ciphers DES and AES, hash functions
- Public-Key Cryptography: RSA and Elliptic Curve Cryptography
- Lightweight block Ciphers for RFIDs
• Secure implementations of cryptographic primitives
• Physical attacks on cryptographic algorithms
• Cryptographic accelerators for Public-Key Cryptography
• Advanced topics i.e. software/hardware co-design for cryptography, secure architectures, TRNGs etc.

Organization

The course consists of the lecture part and the assignment/project part. The lecture part will be given in the form of intensive lectures in three days. The students will then be given some assignments or projects to work on with some practical aspects of the course contents.

Literature

The following two books will be considered as background material: Niels Ferguson, Bruce Schneier, Tadayoshi Kohno: Cryptography Engineering: Design Principles and Practical Applications, Wiley 2012.
Stefan Mangard, Elisabeth Oswald and Thomas Popp: Power Analysis Attacks -
Revealing the Secrets of Smartcards, Springer, 2007.

In addition, a list of papers will be provided in the class.

Lecturers

The lectures will be given by Prof. Lejla Batina, Radboud University Nijmegen, The Netherlands

Examiner

Zebo Peng and Petru Eles

Examination

The exam will be in the form of assignments/projects.

Credit

6 ECTS credits

Organized by

ESLAB

Comments


Page responsible: Director of Graduate Studies