Module Number: EI71073
Duration: 1 Semester
Occurence: Summer semester
Number of ECTS: 5
Professor in charge: Georg Sigl
Considering the learning objectives, the exam is split into the following parts:
- Course work: The students show that they are familiar with Microcontrollers and their practical capability to apply the post
-quantum cryptography by realizing a protected and optimized implementation of a post
-quantum cryptographic algorithm for a Microcontroller. The design must be processed and documented in groups.
- The capability to apply security countermeasures to post-quantum cryptographic implementations and to apply optimization techniques to post
-quantum cryptographic implementations is shown in an 30-minute presentation on the project with subsequent discussion.
For individual evaluation, each student must keep a lab diary regarding the task developed in the laboratory. The presentation contributes to the final grade by 50%.
- The understanding regarding the basic concepts of post-quantum cryptography and the vulnerabilities of post-quantum cryptography implementations are examined during an oral examination. This contributes to the final grade by 50%.
Good knowledge of Microcontroller programming, basics on security like it is teached in the lecture Embedded Systems and Security The following modules (or equivalent modules) should be passed before taking the course: - Angewandte Kryptologie
- Smartcard lab It is recommended but not mandatory to take the following modules additionally:
- Secure Implementation of Cryptographic Algorithms
The topics presented in the class are:
1) Introductory lecture
2) Quantum computing
3) Post-quantum security: General concepts
4) Lattice based Post-quantum: NTRU
5) Lattice based Post-quantum: LWE
6) Secure implementation and evaluation
7) Optimizations: Low-power, performance, memory footprint In the laboratory part of the module, students provide protected implementations of post-quantum cryptography on a microcontroller. This implementation should be optimized for low-power, performance or memory footprint in a second step. This practical work is carried out in groups.
At the end of this module, students
1) are able to understand the basic concepts of post-quantum cryptography;
2) are familiar with Microcontroller programming;
3) understand the vulnerabilities of post-quantum cryptography implementations;
4) can apply security countermeasures to post-quantum cryptographic implementations; and
5) can apply optimization techniques to post-quantum cryptographic implementations.
Teacher-centered teaching with discussions in the lecture and in the introduction to the laboratory part. - Self-study in groups with supervision of tutors and advisors in the laboratory part.
The following media forms are used: - Lectures (PowerPoint) - Laboratory notes with description of tasks and tool environments, coarse sketch of system concept - Individual discussions with advisor
Jeffrey Hoffstein, Jill Pipher, and J.H. Silverman. 2008. An Introduction to Mathematical Cryptography (1 ed.). Springer Publishing Company, Incorporated.
Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen. 2008. Post Quantum Cryptography (1st ed.). Springer Publishing Company, Incorporated.