Tutorial Course

Introduction to Hardware Security (Update to Ch3)

Course Description

In the course of ” Introduction to Hardware Security “, we will discuss the role of system security function and the operation practice through market application overview and system service cases such as cryptocurrency, mobile payment, secure supply chain. Also, everyone should be aware of the importance of anti-hacking protection.

The course is mainly divided into 3 parts:

  1. Market Applications
  2. Security SoC Operation
  3. Hardware Root of Trust

The first of all is to give you a whole picture of software and hardware security and their application markets. The second part will dive into the key software and hardware designs in the system and the considerations of security function deployment. In the third part, we will discuss about the importance of “root of trust” from the foundation of product design. You will learn the theory of physical unclonable function (PUF) and the related technology and application.

You could watch the course video directly. If you would like to have handouts as well, please go down this page and fill out the form for the password.

硬體安全導論課程將透過市場應用與系統服務實例說明(加密貨幣、行動支付、安全供應鏈)來探討系統安全功能的角色及運作方式,並宣揚安全防駭的重要性。

課程內容分為三部份:

  1. 市場安全應用
  2. 安全系統晶片運作
  3. 硬體信任根

首先本課程將從整體概貌的角度,介紹軟硬體安全與其需求市場。第二部分則將深入探討系統安全運作中的關鍵軟體/硬體設計與安全功能考量,再進一步延伸到第三部分產品設計底層的硬體安全考量,介紹硬體信任根的重要性、物理不可複製功能原理概要與設計時所需的相關技術及應用發展。

以下課程影片可直接線上觀賞,講義需密碼解鎖,密碼索取方式請見文末,填寫姓名和郵件即可獲取,謝謝您!

———————

Part I. Market Applications

Chapter 1 : Introduction to Hardware Security

1. Application Market
2. Software vs. Hardware Security
3. PUF Introduction

———————

Part II. Security SoC Operation

Chapter 2 : Introduction to Security SoC

2-1 Designing Chip with Security (I)
1. Market Application and Security Demand
2. How Chip Security Works

2-2 Designing Chip with Security (II)
1. Basic of Cryptography
2. Security SoC Cases

2-3 Security Operation in SoC
1. Security SoC Cases
2. Commercial Cases

Chapter 3 : Introduction to Cryptography & SCA Experiment

3-1 Implementation of Crypto Chips and Attack Models

1. Hardware Security: Internet of Vehicle

2. Cryptanalysis and Power Analysis Attacks

Practice: Wifi Cracking

3-2 AES Implemantation and Power Analysis
1. Algorithm Specification
2. Mode of Operations
3. Implementation Architecture
4. Power Analysis Attacks

Practice: Side Channel Attack – Simple Power Analysis

3-3 ECC Implementation and Power Analysis
1. Introduction
2. Elliptic Curve Scalar Multiplication (ECSM)
3. Implementation Architecture
4. Power Analysis Attacks

Practice: Side Channel Attack – Differential Power Analysis

Chapter 4 : Introduction to Malicious Attack

4-1 What Is Side Channel Attack and How To Prevent?

4-2 What Is Physical Attack (Tampering) and How To Prevent?

———————

Part III. Hardware Root of Trust

Chapter 5 : Introduction to Root of Trust

5-1 Root of Trust by Software and Hardware

5-2 Why Inborn Root of Trust?

Chapter 6 : Physical Unclonable Function (PUF)

6-1 What is PUF?

6-2 Different kinds of On Chip PUFs

6-3 Applications of PUF

———————

Dear Mr. / Ms.

If you are interested in this online tutorial course, please fill out the form to get the password, then all the handouts will be free to use!
After submitting, please get back to the page, the password will automatically show up below the form. Thank you!

If you want to get our update notice, you’re welcome to subscribe 🙂

Leave a Reply

%d bloggers like this: