|
At the end of the course students can
- explain how smartcards and RFID tags work, and explain their security objectives, and the hardware, software, principles, and techniques used to achieve these;
- explain currently known attacks on smartcards and associated countermeasures;
- build a simple smartcard application from scratch, incl. the associated protocol design and key management;
- carry out SPA and DPA attacks on smartcards.
|
|
This course focuses on smartcard and RFID tags as prime examples of secure hardware in common in use today. Smartcards are typically used for the secure storage of data, especially cryptographic keys, and for security-critical operations, including cryptographic operations, using this data, in bank cards, electronic passports, mobile phone SIMs, or as trusted elements in larger computers. Given their widespread usage and the security interests at stake, techniques for attacks and defensive are highly evolved for smartcards, probably more so than for any other type of computing system.
This course treats all aspects of smartcards, incl. hardware, communication standards, and software, the security objectives these are meant to provide, and attack techniques and countermeasures, especially side-channel attacks.
|
| | You are expected to have good knowledge of standard cryptography and have some Java programming skills. |
| The course will be evaluated on the basis of the project work and assignments. |
| |
|
|
 This course is an optional course in the TRU/e cyber security master specialisation. |
Topics: • Smartcards & RFID: hardware, operating systems, software, ISO7816, ISO14443; • Attacks (logical attacks, side-channel attacks, fault injection, invasive attacks) and countermeasures; • Side-channel analysis: SPA, DPA; • The JavaCard smartcard platform, secure coding of JavaCard applications; • Sample applications, such as banking/EMV, e-passports, ov-chipkaart, GSM SIMs. |
The course will be evaluated on the basis of the project work and assignments. |
You are expected to have good knowledge of standard cryptography and have some Java programming skills. |
| | Required materialsTo be announcedLiterature will be made available through the course webpage. |
 |
| Instructional modes Course occurrence 
 | Exam Q4 
 | Excursion 
 | Lecture 
 | Practical computer training Attendance Mandatory |  | Yes |

 | Project 
 | Resit Exam Q4 
 | Zelfstudie 
 |
| Tests Final gradeTest weight |  | 1 |
Opportunities |  | Block KW4, Block KW4 |
 |
|
| |