course: Cryptography on Hardware-based Platforms
- teaching methods:
- lecture with tutorials
- Moodle, computer based presentation, black board and chalk
- responsible person:
- Prof. Dr.-Ing. Tim Güneysu
- Prof. Dr.-Ing. Tim Güneysu (ETIT), B. Sc. Johannes Mono (ETIT), M. Sc. Jan Richter-Brockmann (ETIT)
- offered in:
- winter term
dates in winter term
- start: Friday the 30.10.2020
- lecture Fridays: from 12:15 to 13.45 o'clock in Online
- tutorial Fridays: from 14:15 to 15.45 o'clock in Online
All statements pertaining to examination modalities (for the summer/winter term of 2020) are given with reservations. Changes due to new requirements from the university will be announced as soon as possible.
|Form of exam:||written|
|Registration for exam:||FlexNow|
|description of exam:|
Termin findet wie geplant statt
Participants are expected to learn the concepts of practically relevant hardware development via abstract hardware design languages (VHDL) and the simulation of hardware circuits on FPGAs. They will master standard techniques of hardware-related processor development and will be able to implement symmetric and asymmetric ciphers on modern FPGA systems.
Cryptographic systems impose high requirements on small processors and embedded devices due to their complexity. The lecture examines essential problem that developer are confronted with, like achieving a high data throughput while keeping the hardware cost low.
This lecture covers the most interesting aspects of the implementation of current cryptographic schemes in practical hardware systems. It deals with cryptosystems like the block cipher AES, the hash function SHA-1, as well as asymmetric systems like RSA and ECC. Furthermore, specific hardware requirements will be discussed, like the generation of true random numbers (TRNG) and the application of physically unclonable functions (PUF).
The efficient implementation of these cryptosystems, especially in terms of ptimization for high performance, on modern FPGAs will be discussed and realized in practical exercises with the help of the hardware description language VHDL.
Additional content as well as the practical exercises are offered in a moodle course.
Participants should be well grounded in: 1. Essentials of cryptography and data security 2. Basic knowledge about digital technology
Literature: Rodriguez-Henriquez F., Saqib, N.A., DiazÂPerez A., Koc, C.K.: Cryptographic Algorithms on Reconfigurable Hardware, Springer Verlag, ISBN: 0-387-33883-7 Additional literature will be found in the lecture notes.