Hardware Security Tutorial Series

Intermediate | Introduction to Hardware Security

 

Course Outline

The 'Introduction to Hardware Security' is an intermediate-level course in the 'Hardware Security Tutorial Series'. It covers chip security design concepts, hardware attack and defense theories, totaling 54 hours of lecturing taught by Dr. Kent Chuang, R&D Manager at PUFsecurity. This physical course includes hands-on projects with Chipwhisperer board, which students will learn methodologies of chip attacks and international standard PUF/TRNG designs.

Below this page, you can find filmings from the 2019 course available on YouTube. Note that the videos do not include hands-on content.

Course Schedule

According to the National Tsing Hua University calendar, the course is offered in the first semester of each academic year, typically starting in September.

Registration:

Due to limited course capacity, submitting a resume is required for enrollment. Students will be admitted and provided with learning suggestions and materials until full admission.

Recommended Prior Knowledges

1. C language

2. Binary operations

3. Electronics (RLC & MOSFET fundamentals)

4. Fundamental Arduino syntax

In this course, you will learn:

• What is hardware security?

• Operation and design concepts of Secure System-on-Chip (SoC)

• Design considerations for hardware security

• Mechanisms of SHA/AES/RSA/ECC algorithms

• Fundamentals of applications with MAC/HMAC, CRC, ECDH/ECDSA

• Basics of entropy and true/pseudo-random number generation

• Fundamental design and applications of Physical Unclonable Function (PUF)

• Designing and Countermeasures for hardware layer attacks

This course covers:

Chapter 1 Introduction

  • Hardware Security Overview I

  • Hardware Security Overview II

Chapter 2 Algorithms

  • Basic Math and Statistics

  • Symmetric Key

  • Hash Function

Chapter 3 Physical Attacks

  • Phydical Attack

  • Side-Channel Attacks

  • Hands-on Session

  • Anti-tampering Techniques

Mid-term Exam: Chapter 1 to 3

Chapter 4 Root of Trust

  • Random Number Generators

  • Secure Operation and Root-of-trust

  • Physically Unclonable Functions

Chapter 5 Advanced Algorithms

  • Public Key Cryptography

  • Post Quantum Cryptography

Final Project: Attack Practice/Entropy Source Design

Contact Us

Feel free to leave any requests to us

PUFacademy-logo

Copyright © 2019-2025 PUFsecurity, All rights reserved.

pufacademy-yt