NIE-PB
Computer Security
topics are valid since SFE in June 2024
Label | Topic | Course |
---|---|---|
NIE-PB-1 | Simple power analysis (SPA) on the RSA and AES cipher implementations, influence of the cipher algorithm. Comparison of the Square-and-Multiply and Montgomery ladder algorithms for exponentiation in RSA. | NIE-HWB |
NIE-PB-2 | Differential power analysis (DPA), countermeasures. Impact of operations, data, and noise of the implemented cipher on measured power signal. | NIE-HWB |
NIE-PB-3 | Design of physically uncloneable functions (PUF) and true random number generators (TRNG) resistant against attacks. | NIE-HWB |
NIE-PB-4 | Linear cryptanalysis, linear approximation of S-boxes, linear approximation function, key bit extraction. | NIE-KRY |
NIE-PB-5 | Differential cryptanalysis, S-box analysis, differential approximation function, key bit extraction. Algebraic cryptanalysis - basic principles. | NIE-KRY |
NIE-PB-6 | Types of side channels, timing attacks. Meet-in-the-middle attacks. Attacks on message formatting and padding. | NIE-KRY |
NIE-PB-7 | Quantum cryptography. Eavesdropping detection in the BB84 protocol. | NIE-KRY |
NIE-PB-8 | Discrete logarithm - Diffie-Hellman and ElGamal protocol, Babystep-giantstep and Pohling-Hellman algorithms, Pollard’s rho method, Index calculus | NIE-MKY |
NIE-PB-9 | Elliptic curves - elliptic curves over real numbers and Galois fields, projective plane, principle of MOV algorithm. | NIE-MKY |
NIE-PB-10 | Cryptographic protocols: identification and authentication protocols, secret sharing, key establishment protocols. | NIE-AIB |
NIE-PB-11 | Malware analysis – data types for static and dynamic analysis, machine learning based detection methods. | NIE-AIB |
NIE-PB-12 | Reverse engineering analysis of object-oriented programs. Structures and classes, inheritance, polymorphism, runtime type information. | NIE-REV |
NIE-PB-13 | Code flow analysis. Prologue, epilogue, and function body. Program entry point. | NIE-REV |
NIE-PB-14 | Disassembling: linear sweep and recursive traversal. Obfuscation techniques. | NIE-REV |
NIE-PB-15 | Debuggers and debugging. Breakpoints. Defense against debugging. | NIE-REV |
NIE-PB-16 | Security weaknesses of computer networks and communication protocols, securing protocols and computer networks | NIE-SIB |
NIE-PB-17 | Encrypted network protocols and attacks against them, identity certificates. | NIE-SIB |
NIE-PB-18 | Detection of network attacks and anomalies, intrusion prevention, statistical aspects of intrusion detection. | NIE-SIB |
NIE-PB-19 | Methods of active defense in computer networks and systems, incident response and security testing using simulated attacks. | NIE-SIB |
NIE-PB-20 | Basic methods of forensic analysis, forensic images, data carving. Forensic artifacts in operating systems (MS Windows, Linux). | NIE-SBF |
NIE-PB-21 | Authentication and authentication protocols. Multifactor authentication. Kerberos protocol. | NIE-SBF |
📄 The table is available also in CSV (semicolon-separated values). 🔙 History of changes is on GitLab.