Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua

Hardware Cryptography

Major: Cyber Security
Code of Subject: 6.125.02.E.170
Credits: 3
Department: Information Security
Lecturer: Associate Professor, Ph.D. Sovyn Yaroslav
Semester: 8 семестр
Mode of Study: денна
Learning outcomes:
1. Effectively implement cryptographic primitives, algorithms and protocols based on x86-64 microprocessors and microcontrollers using hardware crypto accelerators and vector SIMD extensions of the command system.
2. Know the features of lightweight cryptography for the Internet of Things and be able to implement appropriate algorithms on devices with disabilities.
3. Evaluate and conduct attacks through third-party channels to implement cryptographic algorithms in global information networks and embedded systems.
4. To turn cryptographic software and hardware into resistant to implementation attacks.
5. Be able to design, program and test typical specialized information security devices using cryptographic algorithms.
6. Know the basic ways of implementation and testing of real microprocessor-based random number generators in information and communication systems.
7. Be able to develop two-factor authentication software in cyber-physical systems.
Required prior and related subjects:
Prerequisites:
Cryptography and shorthand
Microprocessors in systems of technical protection of information
Programming Technologies, Part 1
Digital signal processing
Summary of the subject:
The discipline is devoted to the study of applications of microprocessors and microcontrollers for general purpose for solving typical problems of information protection in information and communication systems. The course deals with the theoretical and practical aspects of implementing cryptographic algorithms (Kalina, AES, GOST 28147-89), including lightweight (ChaCha20, Speck), focused on systems with limited resources, such as wireless sensor networks, Internet of Things, etc. The ways of increasing the speed through the use of hardware and software crypto accelerators are analyzed. The course also addresses attacks on implementation of crypto algorithms in embedded systems, which are now much more effective than classical cryptanalysis. Approaches to creating authentication tokens based on TOTP and HOTP algorithms are studied, as well as the necessary cryptographic primitives and microcontroller hardware to implement them. The issues of construction and operation of crypto-stable and true random number generators for deterministic microprocessor systems, as well as the evaluation of random sequence quality based on FIPS 140-2 and NIST STS test sets are covered.
Recommended Books:
1. Cryptographic Engineering / [editor Koc C.K]. - New York: Springer Science + Business Media, 2009. - 522 p.
2. Power Analysis Attacks: Revealing the Secrets of Smart Cards / Mangard S., Oswald E., Popp T. - Berlin: Springer-Verlag, 2007. - 338 p.
3. Secure Integrated Circuits and Systems / [editor Ingrid M.R. Verbauwhede]. - New York: Springer Science + Business Media, 2010. - 246 p.
4. Panasenko SP Encryption algorithms. Special reference book. - St. Petersburg: BHC-Petersburg, 2009. - 576 p.
5. Advanced DPA Theory and Practice / E. Peeters - New York: Springer Science + Business Media, 2013 - 139 p. - ISBN 978-1-4614-6782-3.
Assessment methods and criteria:
1. Laboratory work (60%)
2. Control work (30%)
3. Interviews during individual counseling sessions (10%)