Jdi na navigaci předmětu


Computer Security

topics are valid since SFE in June 2021

MIE-PB-1SPA attack on the RSA and AES cipher implementations, the influence of the cipher algorithm. Comparison of the Square-and-Multiply and Montgomery ladder algorithms for exponentiation in RSA.MIE-HWB.16
MIE-PB-2Differential power analysis, countermeasures. Impact of operations, data, and noise of the implemented cipher on measured power signal.MIE-HWB.16
MIE-PB-3Design of physically uncloneable functions (PUF) and true random number generators (TRNG) resistant against attacks.MIE-HWB.16
MIE-PB-4Linear cryptanalysis, linear approximation of S-boxes, linear approximation function, key bit extraction.MIE-KRY.16
MIE-PB-5Differential cryptanalysis, S-box analysis, differential approximation function, key bit extraction. Algebraic cryptanalysis - basic principles.MIE-KRY.16
MIE-PB-6Types of side channels, timing attacks. Meet-in-the-middle attacks. Attacks on message formatting and padding.MIE-KRY.16
MIE-PB-7Quantum cryptography. Eavesdropping detection in the BB84 protocol.MIE-KRY.16
MIE-PB-8Discrete logarithm - Diffie-Hellman and ElGamal protocol, Babystep-giantstep and Pohling-Hellman algorithms, Pollard’s rho method, Index calculusMIE-MKY.16
MIE-PB-9Elliptic curves - elliptic curves over real numbers and Galois fields, projective plane, principle of MOV algorithm.MIE-MKY.16
MIE-PB-10The Border Gateway Protocol, details, rules, and applications in real networks.MIE-MTI.16
MIE-PB-11IPv6 architecture, technology, and protocols.MIE-MTI.16
MIE-PB-12Importance and utilization of application binary interface in reverse engineering.MIE-REV.16
MIE-PB-13Code flow analysis. Prologue, epilogue, and function body. Program entry point.MIE-REV.16
MIE-PB-14Disassembling: linear sweep and recursive traversal. Obfuscation techniques.MIE-REV.16
MIE-PB-15Debuggers and debugging. Breakpoints. Defense against debugging.MIE-REV.16
MIE-PB-16Security weaknesses of computer networks and communication protocols, securing protocols and computer networksMIE-SIB.16
MIE-PB-17Encrypted network protocols and attacks against them, identity certificates.MIE-SIB.16
MIE-PB-18Detection of network attacks and anomalies, intrusion prevention, statistical aspects of intrusion detection.MIE-SIB.16
MIE-PB-19Behavioral analysis of computer network traffic, detection and identification of network anomalies.MIE-SIB.16
MIE-PB-20Security layers in information systems: rules and policies for computers, operating systems, and networks.MIE-SYB.16
MIE-PB-21Creation and management of cryptographic keys and certificates.MIE-SYB.16

📄 The table is available also in CSV (semicolon-separated values). 🔙 History of changes is on GitLab.