Du hittar kurs-PM för nyare kursomgångar på sidan Kurs-PM.
Headings denoted with an asterisk ( * ) is retrieved from the course syllabus version Spring 2024
Content and learning outcomes
Course contents
Physical attacks and "tamper resistance"
Side-channel attacks and countermeasures
Introduction to lightweight cryptography
Security for smart card and radio frequency identification tags (RFID-tags)
Design for physical unclonable functions (PUFs) and true random number generators
Personal integrity in the Internet-of-Things era
Intended learning outcomes
Having passed the course, the student shall be able to
describe state-of-the-art hardware security techniques and justify their applications and limitations
describe how the safety is guaranteed in an illustrating application
describe the threats against a system from hardware perspective and available countermeasures and apply the knowledge to choose an appropriate set of countermeasures for a certain threat assessment.
analyse and make a critical balance between the performance, cost and safety of the system and illustrate compromises that are available for design engineers of electronic and embedded systems
explain the need of hardware security primitives and justify advantages and disadvantages with the different primitives and choose an appropriate primitive for a specific application
use the knowledge to build a small electronic or embedded system for increased safety and explain how the safety is guaranteed in the system.
Preparations before course start
Literature
No information inserted
Support for students with disabilities
Students at KTH with a permanent disability can get support during studies from Funka:
LABA - Laboratory work, 2.5 credits, Grading scale: P, F
PROA - Project, 1.0 credits, Grading scale: P, F
TENA - Written exam, 4.0 credits, Grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Ethical approach
All members of a group are responsible for the group's work.
In any assessment, every student shall honestly disclose any help received and sources used.
In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.