Faculty of Information Technology, BUT

Course details

Cryptography Implementation

KID Acad. year 2007/2008 Winter semester

Course is not open in this year
Close
Introduction to cryptography, real-world (commercial) use / exploitation of cryptography, types of device used for running cryptographic mechanisms and protocols, descriptions of fundamental (not only) electrical properties of IT devices. Analysis of cryptographic algorithms, classification of cryptographic mechanisms according to typical implementation flaws. Statistical  processing of information obtained from real devices, possible usage of the information, estimating information value of covert channels. Countermeasures - how to eliminate covert channels, economical requirements of cryptography implementations.

Guarantor

Language of instruction

Czech

Completion

Examination

Time span

39 hrs lectures, 4 hrs projects

Assessment points

100 exam

Department

Lecturer

Subject specific learning outcomes and competences

Overview of practical issues and problems of using cryptographic mechanisms in real-world systems.

Learning objectives

Students are introduced cryptographic mechanisms and their implementations. The goal is to acquire knowledge about cryptography (algorithms as well as protocols). Attention will be given to flaws  during their implementations and possibilities to attack real-world implementations of cryptographic algorithms arising from specific properties of physical realisations.

Prerequisite kwnowledge and skills

Operating systems, assemblers, algebra, number theory, network protocols.

Study literature

  • papers from IEEE CCS Symposium, Fast Software Encryption, ESORICS, ... conferences, related to the subject

Fundamental literature

  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography,  CRC Press Series on Discrete Mathematics and Its Applications,   Hardcover, 816 pages, CRC Press, 1997.
  • Bond, M.: Understanding Security APIs, June 2004, Phd Thesis, University of Cambridge
  • Skorobogatov, S.: Semi-invasive attacks - A new approach to hardware security analysis, April 2005, Phd Thesis, University of Cambridge

Syllabus of lectures

  1. Intro to cryptography
  2. Cryptographic devices
  3. Programming cryptographic devices
  4. Electrical characteristics and properties of IT devices
  5. SW properties - covert channels
  6. Classification of crypto algorithms
  7. Analysis of cryptographic algorithms/protocols
  8. Statistical processing of covert channel data I
  9. Statistical processing of covert channel data II
  10. Estimating information value of covert channels
  11. Countermeasures - eliminating covert channels I
  12. Countermeasures - eliminating covert channels II
  13. Economical requirements of crypto implementations

Syllabus - others, projects and individual work of students

  1. statistical processing of covert channel data.

Controlled instruction

Elaboration and viva of project, presentation of selected conference paper(s).

Course inclusion in study plans

Back to top