Title:

Cryptography Implementation

Code:KID
Ac.Year:ukončen 2008/2009 (Not opened)
Term:Winter
Curriculums:
ProgrammeBranchYearDuty
CSE-PHD-4DVI4-Elective
Language:Czech
Completion:examination
Type of
instruction:
Hour/semLecturesSem. ExercisesLab. exercisesComp. exercisesOther
Hours:390004
 ExaminationTestsExercisesLaboratoriesOther
Points:1000000
Guarantee:Cvrček Daniel, doc. Ing., Ph.D., DITS
Faculty:Faculty of Information Technology BUT
Department:Department of Intelligent Systems FIT BUT
 
Learning objectives:
  Students are introduced cryptographic mechanisms and their implementations. The goal is to acquire knowledge about cryptography (algorithms as well as protocols). Attention will be given to flaws  during their implementations and possibilities to attack real-world implementations of cryptographic algorithms arising from specific properties of physical realisations.
Description:
  Introduction to cryptography, real-world (commercial) use / exploitation of cryptography, types of device used for running cryptographic mechanisms and protocols, descriptions of fundamental (not only) electrical properties of IT devices. Analysis of cryptographic algorithms, classification of cryptographic mechanisms according to typical implementation flaws. Statistical  processing of information obtained from real devices, possible usage of the information, estimating information value of covert channels. Countermeasures - how to eliminate covert channels, economical requirements of cryptography implementations.

Knowledge and skills required for the course:
  Operating systems, assemblers, algebra, number theory, network protocols.
Learning outcomes and competences:
  Overview of practical issues and problems of using cryptographic mechanisms in real-world systems.
Syllabus of lectures:
 
  1. Intro to cryptography
  2. Cryptographic devices
  3. Programming cryptographic devices
  4. Electrical characteristics and properties of IT devices
  5. SW properties - covert channels
  6. Classification of crypto algorithms
  7. Analysis of cryptographic algorithms/protocols
  8. Statistical processing of covert channel data I
  9. Statistical processing of covert channel data II
  10. Estimating information value of covert channels
  11. Countermeasures - eliminating covert channels I
  12. Countermeasures - eliminating covert channels II
  13. Economical requirements of crypto implementations
Syllabus - others, projects and individual work of students:
 
  1. statistical processing of covert channel data.
Fundamental literature:
 
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography,  CRC Press Series on Discrete Mathematics and Its Applications,   Hardcover, 816 pages, CRC Press, 1997.
  • Bond, M.: Understanding Security APIs, June 2004, Phd Thesis, University of Cambridge
  • Skorobogatov, S.: Semi-invasive attacks - A new approach to hardware security analysis, April 2005, Phd Thesis, University of Cambridge
Study literature:
 
  • papers from IEEE CCS Symposium, Fast Software Encryption, ESORICS, ... conferences, related to the subject
Controlled instruction:
  Elaboration and viva of project, presentation of selected conference paper(s).