The 'Introduction to Hardware Security' is an intermediate-level course in the 'Hardware Security Tutorial Series'. It covers chip security design concepts, hardware attack and defense theories, totaling 54 hours of lecturing taught by Dr. Kent Chuang, R&D Manager at PUFsecurity. This physical course includes hands-on projects with Chipwhisperer board, which students will learn methodologies of chip attacks and international standard PUF/TRNG designs.
Below this page, you can find filmings from the 2019 course available on YouTube. Note that the videos do not include hands-on content.
Course Schedule
According to the National Tsing Hua University calendar, the course is offered in the first semester of each academic year, typically starting in September.
Registration:
Due to limited course capacity, submitting a resume is required for enrollment. Students will be admitted and provided with learning suggestions and materials until full admission.
Recommended Prior Knowledges
1. C language
2. Binary operations
3. Electronics (RLC & MOSFET fundamentals)
4. Fundamental Arduino syntax
In this course, you will learn:
• What is hardware security?
• Operation and design concepts of Secure System-on-Chip (SoC)
• Design considerations for hardware security
• Mechanisms of SHA/AES/RSA/ECC algorithms
• Fundamentals of applications with MAC/HMAC, CRC, ECDH/ECDSA
• Basics of entropy and true/pseudo-random number generation
• Fundamental design and applications of Physical Unclonable Function (PUF)
• Designing and Countermeasures for hardware layer attacks
Chapter 1 Introduction
• Hardware Security Overview I
• Hardware Security Overview II
Chapter 2 Algorithms
• Basic Math and Statistics
• Symmetric Key
• Hash Function
Chapter 3 Physical Attacks
• Phydical Attack
• Side-Channel Attacks
• Hands-on Session
• Anti-tampering Techniques
Mid-term Exam: Chapter 1 to 3
Chapter 4 Root of Trust
• Random Number Generators
• Secure Operation and Root-of-trust
• Physically Unclonable Functions
Chapter 5 Advanced Algorithms
• Public Key Cryptography
• Post Quantum Cryptography
Final Project: Attack Practice/Entropy Source Design