The 'Introduction to Hardware Security' is an advanced-level course in the 'Hardware Security Tutorial Series'. It covers chip security design concepts, hardware attack and defense theories, totaling 54 hours of lecturing. This course is originally introduced in 2019 at National Tsing Hua University by Dr. Evans Yang, Executive VP at PUFsecurity. The in-person lesson includes hands-on projects of practices with chips featuring PUF/TRNG functions, Arduino, and Chipwhisperer boards. Python is used during the course so having prior knowledge of Python would be beneficial.
Below this page, you can find filmings from the 2019 course available on YouTube. Note that the videos do not include hands-on content.
Course Schedule
According to the National Tsing Hua University calendar, the course is offered in the first semester of each academic year, typically starting in September.
Registration:
Due to limited course capacity, submitting a resume is required for enrollment. Students will be admitted and provided with learning suggestions and materials until full admission.
Recommended Prior Knowledges
1. C language
2. Binary operations
3. Electronics (RLC & MOSFET fundamentals)
4. Fundamental Arduino syntax
In this course, you will learn:
• What is hardware security?
• Operation and design concepts of Secure System-on-Chip (SoC)
• Design considerations for hardware security
• Mechanisms of SHA/AES/RSA/ECC algorithms
• Fundamentals of applications with MAC/HMAC, CRC, ECDH/ECDSA
• Basics of entropy and true/pseudo-random number generation
• Fundamental design and applications of Physical Unclonable Function (PUF)
• Designing and Countermeasures for hardware layer attacks
Chapter 1 Introduction to Hardware Security
• Introduction to Hardware Security
• Introduction to SoC (System-on-Chip)
• How Security SoC works?
• Security Operations & Design
Chapter 2 Introduction to Cryptography
• Hash Function
• Symmetric Key Algorithms
• Asymmetric Key Algorithms
Chapter 3 Mid-term Project: Crypto Engine
Chapter 4 Malicious Attacks
• Physical Attacks prevention
• Mathematics of Cryptography
• Side Channel Attack Exercise
Chapter 5 Hardware Root of Trust
• Software and Hardware Root of Trust
• Random Number Generator (RNG)
• Physical Unclonable Function (PUF)
Chapter 6 Final Project: TRNG and PUF