Go to:
Logótipo
You are in:: Start > CC4077

Security and Applications in Trusted Hardware

Code: CC4077     Acronym: CC4077     Level: 400

Keywords
Classification Keyword
OFICIAL Computer Science

Instance: 2022/2023 - 2S Ícone do Moodle

Active? Yes
Responsible unit: Department of Computer Science
Course/CS Responsible: Master in Information Security

Cycles of Study/Courses

Acronym No. of Students Study Plan Curricular Years Credits UCN Credits ECTS Contact hours Total Time
M:ERSI 0 Official Study Plan since 2021_M:ERSI 1 - 6 42 162
M:SI 27 Study plan since 2020/2021 1 - 6 42 162

Teaching language

Suitable for English-speaking students

Objectives

The syllabus will provide the student the knowledge about security and applications in trusted hardware. The different systems and approaches studied will provide choice and comparison points on how to tackle security issues. Students should have acquired a thorough knowledge about the different types of technologies currently available for smartcards or other type of security hardware, which can nowadays be employed in a solution of integrated security (authentication, digital signature, encryption) for telecommunications systems or more comprehensive information systems, including the web.

Learning outcomes and competences

Get a comprehensive and integrated view of the technologies currently employed in security solutions based on trusted hardware, including "smart cards", “cryptographic tokens", “Hardware Security Modules” and “Trusted Platform Module”.
Perform a detailed analysis of applications and actual cases of paradigmatic use of these technologies in the security of information systems and telecommunications, including mobile and international banking systems.
To know the process of developing applications for the JavaCard platform and standard methods of accessing cryptographic hardware connected to off-the-shelf computers.
Integration of cryptographic hardware into secure applications.

Working method

Presencial

Program

 Introduction to smartcards and their applications

 Multi-applicational platforms and operating systems for smartcards

Smartcard security

Hardware Security Modules and their applications

Trusted Platform Module and its applications

RFID and wireless technologies.

Access to cryptographic hardware (PKCS 11 and 15 standards and libraries)

Development environments and integration of trusted hardware in secure applications

Mandatory literature

Keith E. Mayes; Smart cards, tokens, security and applications. ISBN: 978-3-319-50498-8
Ross J. Anderson; Security engineering. ISBN: 0-471-38922-6

Teaching methods and learning activities

Lectures addressed in detail concepts essential for understanding the role currently played by trusted hardware in the security of information systems and telecommunications mass current. Students will also be exposed to development cycles that lead to proper integration of trusted hardware in authentication systems, digital signature and encryption of an information system and telecommunications.

Evaluation Type

Distributed evaluation with final exam

Assessment Components

designation Weight (%)
Exame 50,00
Trabalho prático ou de projeto 30,00
Trabalho laboratorial 20,00
Total: 100,00

Amount of time allocated to each course unit

designation Time (hours)
Elaboração de projeto 30,00
Estudo autónomo 60,00
Frequência das aulas 42,00
Trabalho laboratorial 30,00
Total: 162,00

Eligibility for exams

Minimal mark of 10 in all assessment components.

Calculation formula of final grade

Assessment will be performed via distributed grading with a final test.

Final grading formula: grade of the practical assignment * 0.3 + grade of the tutorials * 0.2 + grade of the final test * 0.5.

Observations

Juri: Manuel Barbosa e Rolando Martins
Recommend this page Top
Copyright 1996-2024 © Faculdade de Ciências da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z  I Guest Book
Page created on: 2024-10-06 at 16:12:08 | Acceptable Use Policy | Data Protection Policy | Complaint Portal