Hardware Security Tutorial Series

Intermediate | Introduction to Hardware Security

 

Course Outline

The 'Introduction to Hardware Security' is an intermediate-level course in the 'Hardware Security Tutorial Series'. It covers chip security design concepts, hardware attack and defense theories, totaling 54 hours of lecturing taught by Dr. Kent Chuang, R&D Manager at PUFsecurity. This physical course includes hands-on projects with Chipwhisperer board, which students will learn methodologies of chip attacks and international standard PUF/TRNG designs.

Below this page, you can find filmings from the 2019 course available on YouTube. Note that the videos do not include hands-on content.

Course Schedule

According to the National Tsing Hua University calendar, the course is offered in the first semester of each academic year, typically starting in September.

Registration:

Due to limited course capacity, submitting a resume is required for enrollment. Students will be admitted and provided with learning suggestions and materials until full admission.

Recommended Prior Knowledges

1. C language

2. Binary operations

3. Electronics (RLC & MOSFET fundamentals)

4. Fundamental Arduino syntax

In this course, you will learn:

• What is hardware security?

• Operation and design concepts of Secure System-on-Chip (SoC)

• Design considerations for hardware security

• Mechanisms of SHA/AES/RSA/ECC algorithms

• Fundamentals of applications with MAC/HMAC, CRC, ECDH/ECDSA

• Basics of entropy and true/pseudo-random number generation

• Fundamental design and applications of Physical Unclonable Function (PUF)

• Designing and Countermeasures for hardware layer attacks

This course covers:

Chapter 1 Introduction

  • Hardware Security Overview I

  • Hardware Security Overview II

Chapter 2 Algorithms

  • Basic Math and Statistics

  • Symmetric Key

  • Hash Function

Chapter 3 Physical Attacks

  • Phydical Attack

  • Side-Channel Attacks

  • Hands-on Session

  • Anti-tampering Techniques

Mid-term Exam: Chapter 1 to 3

Chapter 4 Root of Trust

  • Random Number Generators

  • Secure Operation and Root-of-trust

  • Physically Unclonable Functions

Chapter 5 Advanced Algorithms

  • Public Key Cryptography

  • Post Quantum Cryptography

Final Project: Attack Practice/Entropy Source Design

Course Preview

Introduction to Hardware Security Lesson 1

You can preview the first lesson on this site. The complete course is freely available on our YouTube channel. Feel free to click the button below to start learning. Please note that the videos do not include the hands-on lessons. If you wish to learn and participate in the hands-on lessons, welcome to contact us for more information.

Contact Us

Feel free to leave any requests to us

PUFacademy-logo

Copyright © 2019-2024 PUFsecurity, All rights reserved.

pufacademy-yt