Computer Methods of Data Protection Devices Hign-Level Design

Major: Security of Information and Communication Systems
Code of subject: 7.125.01.E.028
Credits: 4.00
Department: Information Technology Security
Lecturer: prof. Viktor Melnyk
Semester: 2 семестр
Mode of study: денна
Learning outcomes: • Knowledge of techniques of symmetric block encryption processor Intellectual Property Cores design. • Knowledge of basic approaches to create configurable application-specific processors Intellectual Property Cores. • Knowledge of technology of Intellectual Property Cores automatic generation. • Knowledge of technology of application-specific processors Intellectual Property Cores automated high-level design from the algorithm to the Register-Transfer Level. • Ability to design, simulate and debug separate blocks of electronic devices using behavioral description, structural description and the description at Register-Transfer Level with VHDL hardware description language, using modern computers and dedicated computer-aided design tools. • Knowledge of computer systems on a chip design methodology. • Understanding perspective areas of activity in the field of high performance computing means design.
Required prior and related subjects: Prerequisites: • Circuitry, • Computer systems architecture, • Applied cryptology. • Computer methods of analysis and design of electronic means.
Summary of the subject: Methodology of symmetric block encryption processor Intellectual Property Cores design. Application-specific processor Intellectual Property Cores configuring. Symmetric block encryption processors structure configuring. Technology and tools to create application-specific processor Intellectual Property Cores using generators. Technology and software tools for application-specific processor Intellectual Property Cores generation using libraries. Tools for application-specific processor Intellectual Property Cores automated high-level design from the algorithm to the Register-Transfer Level. Computer systems on a chip design methodology. perspective areas of activity in the field of high performance computing means design.
Assessment methods and criteria: • Examining during lectures (without points) as the frontal or partial individual oral examination of students on the previously given material, especially in sections of the course that are necessary for understanding the lecture topics being read, or to assess the degree of digesting of previous lectures. • Current control on laboratory works in the form of individual examination. • Written tests. • Oral examination in the form of an interview. • Written examination. The maximum score in points (total for discipline): 100, particularly: • Execution and defense of laboratory works: 40 • Examination control: 60 (written component: 30, oral component: 30)
Recommended books: 1. A. Melnyk, V. Melnyk. “Personal Supercomputers: Architecture, Design, Application”. Lviv Politechnic National University Publishing. – 2013. – 516 pp. 2. T. Korkishko, A. Melnyk, V. Melnyk. „Algorithms and Processors of Symmetric Block Encryption. Series: Information Protection in Computer and Telecommunication Networks ”. Lviv, BAK, 2003, -169 pp. 3. Gokhale M. B. Reconfigurable Computing: Accelerating Computation with Field-Programmable Gate Arrays / M. B. Gokhale, P. S. Graham, Springer, 2005. 4. Scott Hauck, Andre DeHon. "Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation"/ Morgan Kaufmann, 2008. – 944 p. 5. Keating M. «Reuse Methodology Manual for System-On-a-Chip Design» / M. Keating, P. Bricaud, Kluwer Academic Publishers, 1999, - 224 p.

Computer Methods of Data Protection Devices Hign-Level Design (курсовий проєкт)

Major: Security of Information and Communication Systems
Code of subject: 7.125.01.E.032
Credits: 3.00
Department: Information Technology Security
Lecturer: prof. Viktor Melnyk
Semester: 2 семестр
Mode of study: денна
Learning outcomes: • Consolidation and deepening of theoretical knowledge on the subject "Computer Methods of Data Protection Devices High-Level Design". • Knowledge of symmetric block encryption processors Intellectual Property Cores design methodology. • Acquisition of experience in the development of electronic computing devices using VHDL hardware description language. • Acquiring of experience in using Computer-Aided Design tools for analysis and design of electronic computing devices with VHDL hardware description language.
Required prior and related subjects: Prerequisites: • Elements of discrete devices of automation, • Computer systems architecture, • Applied cryptology, • Computer Methods of Electronic Hardware Means Analysis and Design. Co-requisites: • Design of complex information security systems.
Summary of the subject: Course project is intended to architectural design, modelling with VHDL hardware description language, debugging and logic synthesis in FPGA using dedicated Computer-Aided Design tools, of the data encryption processor that performs encryption and decryption of data blocks in accordance with specified algorithm of symmetric block encryption, encryption modes, and data path structure.
Assessment methods and criteria: • Written examination. • Oral examination in the form of an interview. Evaluation of the course project is carried out on a 100-point scale, which consists of two parts: 1) implementation of a course project (analytical, technical parts, graphic part - 60 points) and 2) project defence (presentation, answers to the question - 40 points).
Recommended books: 1. A. Melnyk, V. Melnyk. “Personal Supercomputers: Architecture, Design, Application”. Lviv Politechnic National University Publishing. – 2013. – 516 p. 2. T. Korkishko, A. Melnyk, V. Melnyk. „Algorithms and Processors of Symmetric Block Encryption. Series: Information Protection in Computer and Telecommunication Networks ”. Lviv, BAK, 2003, -169 p. 3. Keating M. «Reuse Methodology Manual for System-On-a-Chip Design» / M. Keating, P. Bricaud, Kluwer Academic Publishers, 1999, - 224 p.