In the new series of ” Introduction to Hardware Security ” tutorial course we are approaching our previous hardware security lessons from a new angle! For each lesson, two groups of students will prepare in advance and give a special report. Through the pre-preparation process, students will master the key points of the content and be able to discuss and share their findings with each other. More in-depth courses (such as encryption algorithms) will be taught by experts. Through this, students will be able to understand the relevant considerations and technical details of hardware security.
The course is divided into four parts:
- Introduction to SoC
Part I will give you an introduction to Security SoC where you will learn how to designing chip with security functions and how SoC works.
- Introduction to Cryptography
Part II is about cryptography where you will learn about the symmetric and asymmetric key algorithms, as well as th hash function.
- Malicious Attack & SCA Experiment
The third part discusses malicious attack and SCA experiments.
- Hardware Root of Trust
The lesson will conclude with teaching you about hardware root of trust, the physical unclonable function (PUF), and other related applications.
The course video can be watched directly on this page. If you would like to download the handouts, please fill out the form at the bottom of the page to obtain the password needed for download.
Chapter 1 : Introduction to Hardware Security
Part I. Introduction to SoC
Chapter 2 : Introduction to Security SoC
2-1: Introduction to Security SoC
Designing Chip with Security
2-2: How Security SoC Works
Authentication, SW Integrity, Information Exchange
2-3 Security Operation in SoC
1. Secure Authentication, Secure Communication
2. Security SoC Use Case
Part II. Introduction to Cryptography
Chapter 3 : Introduction to Cryptography
3-1 Introduction to Symmetric Key Algorithm
1. Algorithm Specification
2. Modes of Operations
3-2 Introduction to Hash Function
1. Hash Characteristics
2. SHA Family
3-3 Introduction to Asymmetric Key Algorithm
1. Elliptic Curve Arithmetic
2. Cryptographic Schemes
Part III. Malicious Attack & SCA Experiment
Chapter 4 : Introduction to Malicious Attack
4-1 Introduction to Malicious Attack
This Chapter will give a introduction to malicious attacks including side channel attack (SCA) and physical attack (tampering), and raise a discussion about the prevention methods.
1. Market Application and Security Demand
2. Malicious Attacks
4-2 Cryptography & SCA Experiment
1. How does cryptographic function work for system security?
2. SCA Experiment
Part IV. Hardware Root of Trust
Chapter 5 : Introduction to Root of Trust
- Root of Trust by Software and Hardware
- Why inborn Root of Trust?
Chapter 6 : Physical Unclonable Function (PUF)
- What is PUF?
- Different kinds of On-Chip PUFs
- Applications of PUF
Dear Mr. / Ms.
If you are interested in this online tutorial course, please fill out the form to get the password, then all the handouts will be free to use!
After submitting, please get back to the page, the password will automatically show up below the form. Thank you!
If you want to get our update notice, you’re welcome to subscribe 🙂