- You learn about embedding cryptographic algorithms into security products i.e. embedded devices such as smart cards, mobile phones, RFID tags etc.
- You learn about cryptographic implementation on various platforms such as micro controllers, GPUs, FPGAs, etc.
- You learn the difference of implementations of security from secure implementations
- You learn how to implement a cipher on constrained platform i.e. a microcontroller and on an FPGA platform
- You learn the practical side-channel cryptanalysis of various crypto implementations
|
|
This course provides application perspectives on cryptography. This is a course for students interested in hardware and software design in industry i.e. real-world security applications. The course is devoted to the state-of-art in cryptographic hardware and embedded systems. The students will learn about implementation techniques as well as about cryptanalysis of the cryptographic devices. An important aspect is to learn about numerous pervasive applications of security running on extremely constrained platforms such as mobile phones, RFID tags, contactless cards etc. requiring special so-call lightweight cryptography. The Kerckhoffs Master course Cryptography 1 is helpful but not mandatory. |
|