Back close

Course Detail

Course Name Hardware Security
Course Code 21SN638
Program M. Tech. in Cyber Security Systems & Networks
Credits 3

Overview

Preliminaries: Algebra of Finite Fields, Mathematics of Cryptography, Fundamentals of Digital Systems, Application-Specific Integrated Circuits (ASIC), Field Programmable Gate Arrays (FPGA).Cryptography Implementation: Symmetric Cryptography- DES, AES; Asymmetric Cryptography-RSA, ECC; Cryptographic Hardware and their Implementation, Optimization of Cryptographic Hardware on FPGA

Attacks against Cryptographic Algorithms: Fault Injection & Side-channel Attacks – Basic Idea, Methodologies, Algorithms and Case Studies, Design Techniques for resilience against Fault Injection and Side-channel Attacks

Hardware Security Primitives: Physically Unclonable Functions (PUFs), PUF Implementations,

PUF Quality Evaluation, Design Techniques to Increase PUF Response Quality, Attacks against PUFs

Hardware Trojans: Trojan Nomenclature and Classification, Countermeasures to prevent/detect hardware trojans, Logic testing and side-channel analysis for Trojan detection

Microarchitectural Attacks: Cache-based attacks, Attacks against Branch Prediction, Spectre, Meltdown, Rowhammer Attacks

TEXTBOOKS / REFERENCES:

  1. M. Tehranipoor and C. Wang, “Introduction to Hardware Security and Trust”, Springer.
  2. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, “Hardware Security: Design,

    Threats, and Safeguards”, CRC Press

  3. Ahmad-Reza Sadeghi and David Naccache (eds.): Towards Hardware-intrinsic Security:

    Theory and Practice, Springer.

Course Outcomes

  • CO1: Understand and optimize the process of implementing cryptographic algorithms onhardware
  • CO2: Learn the different kinds of attacks that can be mounted against cryptographic algorithms
  • CO3: Learn the process of building Physical Unclonable Functions and make them resilient to attacks
  • CO4: Understand the different kinds of Trojans, their impact and learn the effective countermeasures for defending against them
  • CO5: Learn the different kinds of threats at the microarchitectural level and their corresponding countermeasures.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now