AP4006 Hardware Secure Computing Syllabus:

AP4006 Hardware Secure Computing Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES

 Describe the fundamental principles in Data security
 Discuss the watermarking algorithms and its usage
 Explain the physical attacks and Modular arithmetic security methods
 Describe the memory based attacks and vulnerabilities using deceptive mechanisms
 Discuss the methods of FPGA implementation of cryptographic algorithms

UNIT I INTRODUCTION TO CRYPTO ALGORITHMS

Cryptography basics, Cryptographic algorithms – Symmetric Key algorithms, Public Key algorithms and Hash Algorithms, Data Encryption Standards, Advanced Encryption Standards, RSA, Bow Fish.

UNIT II DESIGN INTELLECTUAL PROPERTY PROTECTION

Introduction to IP Protection, Watermarking Basics, Watermarking Examples, Good Watermarks, Fingerprinting, Hardware Metering.

UNIT III PHYSICAL ATTACKS AND MODULAR EXPONENTIATION

Physical Attacks (PA) Basics, Physical Attacks and Countermeasures, Building Secure Systems, Modular Exponentiation (ME) Basics, ME in Cryptography, ME Implementation and Vulnerability, Montgomery Reduction.

UNIT IV ATTACKS AND COUNTER MEASURES

Introduction to Side Channel Attacks, Memory Vulnerabilities and Cache Attacks, Power Analysis, More Attacks and Countermeasures, Modified Modular Exponentiation, Hardware Trojan (HT) and Trusted IC, Hardware Trojan Taxonomy, Hardware Trojan Detection Overview, Hardware Trojan Detection Methods, Trusted IC Design with HT Prevention.

UNIT V EMERGING TECHNOLOGIES

FPGA Implementation of Crypto algorithms, Vulnerabilities and Countermeasures in FPGA Systems, Role of Hardware in Security and Trust, Physical Unclonable Functions (PUF) Basics, Reliability, Trust Platform Modules

TOTAL : 45 PERIODS

COURSE OUTCOMES

Upon completion the students will be able to
CO1:Understand the basics of Cryptography(K2)
CO2:Identify the mechanism of Data Integrity protection mechanisms(K2)
CO3: Analyse the counter measures for physical attacks and the use of Modular exponentiation(K2)
CO4: Study side channel attacks and Trojan-based attacks(K2)
CO5: Challenges in Realisation using VLSI implementations(K2)

REFERENCES:

1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, Hardware Security: Design, Threats, and Safeguards, CRC Press,2014
2. Tehranipoor, Mohammad, Wang, Introduction to Hardware Security and Trust, Springer,2011.
3. Ted Huffmire, Handbook of FPGA Design Security, Springer,2010.
4. Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks – Revealing the Secrets of Smart Cards, Springer,2007.
5. Doug Stinson, Cryptography Theory and Practice, CRC Press,2018.