Smart University Home Programs > Cryptographic Engineering for Embedded Devices
Embedded Devices
1 Day
Sophia, Lund
Cryptographic Engineering for Embedded Devices
Efficient and secure implementations of cryptographic algorithms are at the core of almost every ICT application. The future internet will be a heterogeneous collection of computing devices: RFID tags, sensor nodes, smart dust at one end, cloud computing at the other end, with portable devices such as cell phones or ipads in the middle. In this course we will look at efficient and secure implementations of cryptographic algorithms for the heterogeneous platforms supporting this future internet. We consider platforms that range from tiny ASICs, reconfigurable FPGAs, embedded micro-controllers, general purpose machines to multi-core processors. Implementations need to be efficient for the given platform and secure at the same time. Most important here is security against passive side-channel attacks and active fault attacks.

Training's objectives
The goal is to present an overview of techniques to implement cryptography in embedded systems. We will cover both hardware (full implementation and co-processors) and software issues. The goal is to give a high level view of the security architecture and to explain how one can develop specific components: what are the tradeoffs, and what one can one expect for a state-of-the art implementation. We expect familiarity with the basic concepts of cryptography (a short article with the required background can be provided upon request to prepare for the course).  We require also some elementary background on software and hardware design.

Who should attend?
IT developers and architects, Security/IT managers, project managers, researchers and academics.

Key topics
Applied cryptography - cryptanalysis - how to use cryptography well

9.00 - 10.45 am
Implementations of symmetric cryptography
(block ciphers, modes of operation, hash functions, stream ciphers)

11.00 - 12.30 pm
Implementations of public key algorithms
(RSA, ECC, HECC, pairings)

2.00 - 3.30 pm
Introduction to side-channel attacks and countermeasures
(simple and differential power analysis, fault attacks, other attacks, countermeasures)

3.45 - 5.00 pm
How to build a secure embedded processor?
(memory protection, boot protection, RNG, PUFs, RFID protocols, distance bounding)


Module designed and coordinated by Ingrid Verbauwhede, professor at the Katholieke Universiteit Leuven (Belgium)
View the new program
From €240 (excl. vat)

  To register