Hardware Security Tutorial Series

Advanced | Introduction to Hardware Security


Course Outline

The 'Introduction to Hardware Security' is an advanced-level course in the 'Hardware Security Tutorial Series'. It covers chip security design concepts, hardware attack and defense theories, totaling 54 hours of lecturing. This course is originally introduced in 2019 at National Tsing Hua University by Dr. Evans Yang, Executive VP at PUFsecurity. The in-person lesson includes hands-on projects of practices with chips featuring PUF/TRNG functions, Arduino, and Chipwhisperer boards. Python is used during the course so having prior knowledge of Python would be beneficial.

Below this page, you can find filmings from the 2019 course available on YouTube. Note that the videos do not include hands-on content.

Course Schedule

According to the National Tsing Hua University calendar, the course is offered in the first semester of each academic year, typically starting in September.


Due to limited course capacity, submitting a resume is required for enrollment. Students will be admitted and provided with learning suggestions and materials until full admission.

Recommended Prior Knowledges

1. C language

2. Binary operations

3. Electronics (RLC & MOSFET fundamentals)

4. Fundamental Arduino syntax

In this course, you will learn:

• What is hardware security?

• Operation and design concepts of Secure System-on-Chip (SoC)

• Design considerations for hardware security

• Mechanisms of SHA/AES/RSA/ECC algorithms

• Fundamentals of applications with MAC/HMAC, CRC, ECDH/ECDSA

• Basics of entropy and true/pseudo-random number generation

• Fundamental design and applications of Physical Unclonable Function (PUF)

• Designing and Countermeasures for hardware layer attacks

This course covers:

Chapter 1 Introduction to Hardware Security

  • Introduction to Hardware Security

  • Introduction to SoC (System-on-Chip)

  • How Security SoC works?

  • Security Operations & Design 

Chapter 2 Introduction to Cryptography

  • Hash Function

  • Symmetric Key Algorithms

  • Asymmetric Key Algorithms

Chapter 3 Mid-term Project: Crypto Engine

Chapter 4 Malicious Attacks

  • Physical Attacks prevention

  • Mathematics of Cryptography

  • Side Channel Attack Exercise

Chapter 5 Hardware Root of Trust

  • Software and Hardware Root of Trust

  • Random Number Generator (RNG)

  • Physical Unclonable Function (PUF)

Chapter 6 Final Project: TRNG and PUF

Course Preview

Introduction to Hardware Security Lesson 1

You can preview the first lesson on this site. The complete course is freely available on our YouTube channel. Feel free to click the button below to start learning. Please note that the videos do not include the hands-on lessons. If you wish to learn and participate in the hands-on lessons, welcome to contact us for more information.

Contact Us

Feel free to leave any requests to us


Copyright © 2019-2024 PUFsecurity, All rights reserved.