This course is taught by Lejla Batina and Erik Poll, with Niels Samwel organising the JavaCard smart group project, and Kostas Papagiannopoulos organising the side-channel lab sessions. The course is part of the TRU/e Master.
Because this course has moved from the autumn semester to the spring semester, there was a ad-hoc solution for Kerckhoffs students who still wanted to take the course in the autumn of 2015.
Hardware plays a role in securing some computer systems. Currently, this is most obviously the case for smartcards and RFID cards, for which there is a long history of attacks and countermeasures.
The focus of this course is on smartcards as prime example of secure hardware, incl. a project to develop a working smartcard application, and lab sessions to experiment with side-channel attacks.
Magnetic stripe cards, smartcards, and RFID tags. Smartcard hardware and communication. Contact and contactless cards. Memory and microprocessor cards. Smartcard operating systems (basic file OS, MULTOS, modern JavaCard OS). Attacks (logical, physical, side channel, fault injection, ...) and countermeasures. Defensive programming.
As an exercise, you will have to build a working system using programmable smartcards we provide. This will involve thinking about security requirements and threats, overall design incl. key management and protocols, and getting all this to work on actual hardware.