ET4012 Embedded Systems Security Syllabus:

ET4012 Embedded Systems Security Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

1. To introduce the fundamentals related to Cryptography and Data Security
2. To teach the mathematical foundations for Cryptography.
3. To impart knowledge about Embedded Cryptography and Data Protection Protocols
4. To make them understand the practical aspects of Embedded System Security.
5. To involve the students in Discussions/Tutorials/Programming to familiarize the concepts for improved employability skills.

UNIT I BACKGROUND AND INTRODUCTION

Computer and Network Security Concepts: Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services – Security Mechanisms – Fundamentals of Security Design Principles – Attack Surfaces and Attack Trees – A Model for Network Security. Introduction to Number Theory: Divisibility and the Division Algorithm – The Euclidean Algorithm – Modular Arithmetic – Prime Numbers – Fermet’s and Euler’s Theorems – Testing for Primality – The Chinese Remainder Theorem – Discrete Logarithms.

UNIT II SYMMETRIC CIPHERS

Classical Encryption Techniques: Symmetric Cipher Model – Substitution Techniques – Transposition Techniques. Block Ciphers and the Data Encryption Standard (DES): Traditional Block Cipher Structure – The Data Encryption Standard – A DES Example – Strength of DES. Advanced Encryption Standard: Finite Field Arithmetic – AES Structure – AES Transformation Functions – AES Key Expansion – An AES Example – AES Implementation.

UNIT III EMBEDDED SYSTEMS SECURITY

Embedded Security Trends – Security Policies – Security Threats. System Software Considerations: The Role of Operating System – Microkernel versus Monolithic – Core Embedded OS Security Requirements – Access Control and Capabilities – Hypervisors and System Virtualization – I/O Virtualization – Remote Management – Assuring Integrity of the TCB.

UNIT IV EMBEDDED CRYPTOGRAPHY AND DATA PROTECTION PROTOCOLS

The One-time Pad – Cryptographic Modes – Block Ciphers – Authenticated Encryption – Public Key Cryptography – Key Agreement – Public Key Authentication – Elliptic Curve Cryptography – Cryptographic Hashes – Message Authentication Codes – Random Number Generation – Key Management for Embedded Systems – Cryptographic Certifications. Data Protection Protocols for Embedded Systems: Data-in-Motion Protocols – Data-at-Rest Protocols. Emerging Applications: Embedded Network Transactions – Automotive Security – Secured Android.

UNIT V PRACTICAL EMBEDDED SYSTEM SECURITY

Network Communications Protocols and Built-in Security – Security Protocols and Algorithms – The Secured Socket Layer – Embedded Security – Wireless – Application-Layer and Client/Server Protocols – Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems – Hardward Based Security.

TOTAL: 45 PERIODS

COURSE OUTCOMES:

At the end of this course, the students will have the ability to
CO1: Explain the significance of Security.
CO2: Understand the major concepts and techniques related to Cryptography.
CO3: Demonstrate thorough knowledge about the aspects of Embedded System Security.
CO4: Delivers insight onto role of Security Aspects during Data Transfer and Communication.
CO5: Applying the Security Algorithms for Real-time Applications.

REFERENCES:

1. “Cryptography and Network Security Principles and Practice”, 7th Edition – Global Edition, William Stallings, Pearson Education Limited, 2017.
2. “Embedded Systems Security – Practical Methods for Safe and Secure Software and Systems
Development”, David Kleidermacher and Mike Kleidermacher, Newnes (an imprint of Elsevier), 2012.
3. “Practical Embedded Security – Building Secure Resource-Constrained Systems”, Timothy Stapko, Newnes (an imprint of Elsevier), 2008.