Course detail
ICT Security 3
FEKT-YICT3Acad. year: 2018/2019
The course deals with the security of embedded systems, smart devices and side-channel cryptanalysis. In particular, these topics are included: authentication systems, authentication tokens (basic types, attacks on smart cards, RFID tags), hardware security modules (HSM), programmable smart cards (.NET Cards, Java Cards, MULTOS cards), the security of smart devices (smartphones, smart watches), security systems using embedded devices (single-chip devices, microcontrollers, sensors), lightweight cryptography for compute-constrained devices, side-channel cryptanalysis, countermeasures against side-channel attacks, reverse engineering, software security (source code security) and safety assessment methodologies.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
2. Authentication systems and technologies
3. Authentication tokens and hardware security modules (types of objects, attacks on smart cards, RFID tags, HSM, SAM)
4. Programmable chip cards (.NET cards, Java Cards, the MULTOS platform)
5. Security with smart devices
6. Security with single-chip devices (microcontrollers, sensors)
7. Security in telematics and embedded systems
8. Cryptography for computationally constrained devices
9. Side channel cryptanalysis - Introduction
10. Side channel cryptanalysis - power analysis
11 Side channel cryptanalysis - countermeasures
12. Reverse engineering and software security (basic methods of reverse engineering, source code security, API)
13. Methodology for security assessment
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
MANGARD, Stefan a OSWALD, Elisabeth a POPP, Thomas: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Secaucus, NJ, USA:Springer-Verlag New York, Inc., 2007, ISBN 0387308571.
PETERS, Eric: Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits. Springer Publishing Company, 2013, ISBN 1461467829
RANKL, Wolfgang a Wolfgang EFFING. Smart Card Handbook. Munich: John Wiley & Sons, 2010. 4. ISBN 978-0-470-74367-6.
STALLINGS, William. Cryptography and Network Security. 4th edition. [s.l.] : [s.n.], 2006. 592 s. ISBN 0131873164.
Recommended reading
Classification of course in study plans