AP4006 Hardware Secure Computing Syllabus:
AP4006 Hardware Secure Computing Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES
Describe the fundamental principles in Data security
Discuss the watermarking algorithms and its usage
Explain the physical attacks and Modular arithmetic security methods
Describe the memory based attacks and vulnerabilities using deceptive mechanisms
Discuss the methods of FPGA implementation of cryptographic algorithms
UNIT I INTRODUCTION TO CRYPTO ALGORITHMS
Cryptography basics, Cryptographic algorithms – Symmetric Key algorithms, Public Key algorithms and Hash Algorithms, Data Encryption Standards, Advanced Encryption Standards, RSA, Bow Fish.
UNIT II DESIGN INTELLECTUAL PROPERTY PROTECTION
Introduction to IP Protection, Watermarking Basics, Watermarking Examples, Good Watermarks, Fingerprinting, Hardware Metering.
UNIT III PHYSICAL ATTACKS AND MODULAR EXPONENTIATION
Physical Attacks (PA) Basics, Physical Attacks and Countermeasures, Building Secure Systems, Modular Exponentiation (ME) Basics, ME in Cryptography, ME Implementation and Vulnerability, Montgomery Reduction.
UNIT IV ATTACKS AND COUNTER MEASURES
Introduction to Side Channel Attacks, Memory Vulnerabilities and Cache Attacks, Power Analysis, More Attacks and Countermeasures, Modified Modular Exponentiation, Hardware Trojan (HT) and Trusted IC, Hardware Trojan Taxonomy, Hardware Trojan Detection Overview, Hardware Trojan Detection Methods, Trusted IC Design with HT Prevention.
UNIT V EMERGING TECHNOLOGIES
FPGA Implementation of Crypto algorithms, Vulnerabilities and Countermeasures in FPGA Systems, Role of Hardware in Security and Trust, Physical Unclonable Functions (PUF) Basics, Reliability, Trust Platform Modules
TOTAL : 45 PERIODS
COURSE OUTCOMES
Upon completion the students will be able to
CO1:Understand the basics of Cryptography(K2)
CO2:Identify the mechanism of Data Integrity protection mechanisms(K2)
CO3: Analyse the counter measures for physical attacks and the use of Modular exponentiation(K2)
CO4: Study side channel attacks and Trojan-based attacks(K2)
CO5: Challenges in Realisation using VLSI implementations(K2)
REFERENCES:
1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, Hardware Security: Design, Threats, and Safeguards, CRC Press,2014
2. Tehranipoor, Mohammad, Wang, Introduction to Hardware Security and Trust, Springer,2011.
3. Ted Huffmire, Handbook of FPGA Design Security, Springer,2010.
4. Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks – Revealing the Secrets of Smart Cards, Springer,2007.
5. Doug Stinson, Cryptography Theory and Practice, CRC Press,2018.