Zoek
English
  Studiegidsen 2013-2014
Radboud UniversiteitStudiegidsenFaculteit der Natuurwetenschappen, Wiskunde en Informatica > Master Computing Science

Cryptographic Engineering 

(Vakcode)
Course ID
NWI-IMC039
(Studiepunten)
Credits
6
(Periode)
Scheduled
tweede semester
Collegerooster opvragen
SWS / PersoonlijkRooster
Introduction (Inleiding)
Building on the bachelor “Security” course and the course on cryptographic protocols, this course provides application perspectives on cryptography. This is a course for students interested in hardware and software design in industry i.e. real-world security applications. The course is devoted to the state-of-art in cryptographic hardware and embedded systems. The students will learn about implementation techniques as well as about cryptanalysis of the cryptographic devices. An important aspect is to learn about numerous pervasive applications of security running on extremely constrained platforms such as mobile phones, RFID tags, contactless cards etc. requiring special so-call lightweight cryptography.

Objectives (Leerdoelen)
1.    You learn about embedding cryptographic algorithms into security products i.e. embedded devices such as smart cards, mobile phones, RFID tags etc.
2.    You learn about cryptographic implementation on special platforms such as GPUs, FPGAs, PS3 etc.
3.    You learn the difference of implementations of security from secure implementations
4.    You learn how to implement a cipher on constrained platform i.e. a microcontroller
5.    You learn the practical cryptanalysis of several proprietary RFID protocols and ciphers

Subjects (Onderwerpen)
•    Modular arithmetic & finite fields for cryptography
•     Software and hardware realizations of modular arithmetic & finite fields
•    Implementation perspectives on:
- Symmetric-key primitives: block ciphers DES and AES, hash functions
- Public-Key Cryptography: RSA and Elliptic Curve Cryptography
- Lightweight block Ciphers for RFIDs
•    Secure implementations of cryptographic primitives
•    Special platforms for cryptography
•    Cryptographic accelerators for Public-Key Cryptography
•    Introduction to Proxmark, a versatile tool for RFID security research

Study investment (Studielastverdeling)
  • 16 hrs guided group project work
  • 32 hrs lecture
  • 6 hrs problem session
  • 64 hrs individual study period
Teaching methods (Toelichting werkvormen)


The course consists of 8 lectures and 8 practical sessions dedicated to two practical assignments.

Practical assignments:
•    Implementation of a block cipher or a hash function on an 8-bit AVR controller
- Programming language: C/ASM
- Development environment and an implementation skeleton are provided
- Different optimization goals are chosen i.e. max throughput or min code size
•    Cryptanalysis with Proxmark
- Getting familiar with the Proxamark tool
- design and implementation of the tag emulation functionality on Proxmark
 

Examination (Toetsvorm)
1-2 practical assignments and written exam.
Pre-requisites (Vereiste voorkennis)
BSc course Security
Literature (Literatuur)
A reading list will be provided in the class.