- You learn about embedding cryptographic algorithms into security products i.e. embedded devices such as smart cards, mobile phones, RFID tags etc.
- You learn about cryptographic implementation on various platforms such as microcontrollers, ASICs, FPGAs, etc.
- You learn the difference of implementations of security from secure implementations
- You learn how to implement a crypto algorithm on a constrained platform i.e. microcontroller and on an FPGA platform
- You learn about physical attacks (side-channel and faults) on public-key cryptosystems
|
|
This course provides application perspectives on cryptography. This is a course for students interested in hardware and software design in industry i.e. real-world security applications. The course is devoted to the state-of-art in cryptographic hardware and embedded systems. The students will learn about implementation techniques as well as about cryptanalysis of the cryptographic devices. An important aspect is to learn about numerous pervasive applications of security running on extremely constrained platforms such as mobile phones, RFID tags, contactless cards etc. requiring special so-call lightweight cryptography.
The TRU/e Master course Cryptography 1 is helpful but not mandatory.
|
|
|
BSc course Security
BSc course Introduction to Cryptography |
|
2 practical assignments and homework. |
|
|