ELEC 5210/ELEC 6210 - Hardware Security I

Fall 2022, MWF 10:00 a.m. - 10:50 a.m., Broun 113

Back to Teaching

Goals:
    Secure electronic products play an important role in safeguarding our society and day-to-day lives. Many different electronic devices that are connected to the Internet, have exhibited an increasing level of heterogeneity in recent years. Maintaining security over all these different devices becomes extremely challenging, as they are being designed and manufactured in an environment with limited trust and visibility. Various new attacks are emerging to circumvent existing security measures. To enable secure and trustworthy operations, it is absolutely necessary to understand these attacks and incorporate appropriate security measures. This course is intended for the graduate and undergraduate students who are interested in designing secure systems. This course will provide an in-depth analysis of various topics, which include (i) introduction to cryptography - symmetric and asymmetric ciphers, message authentication codes, and digital signatures, (ii) detection & avoidance of counterfeit ICs, and (iii) security primitives - physically unclonable functions (PUFs) and true random number generators (TRNGs).
Course Syllabus

Instructor: Ujjwal Guin, Assistant Professor

Reference Books:
  1. Understanding Cryptography: A Textbook for Students and Practitioners, C. Paar, and Jan Pelz, Springer-Verlag Berlin Heidelberg, 2010, ISBN 978-3-642-04100-6
  2. Counterfeit Integrated Circuits: Detection and Avoidance, M. M. Tehranipoor, U. Guin, and D. Forte, Springer International Publishing, 2015, ISBN: 978-3-319-11823-9
  3. Introduction to Hardware Security and Trust, M. Tehranipoor, C. Wang, Springer-Verlag New York, 2012, ISBN 978-1-4419-8079-3
Test/Exam Schedule:
  1. Test 1, TBD, 10:00 a.m. - 10:50 a.m., Broun 113, use only 4 sheets of paper (or 2 sheets, double-sided).
  2. Test 2, TBD, 10:00 a.m. - 10:50 a.m., Broun 113, use only 4 sheets of paper (or 2 sheets, double-sided).
  3. Final Exam, Wednesday, December 7, 8:00 a.m.- 10:30 a.m, Broun 113, Open book.
Weekly Topics:
  1. Introduction to Hardware Security [pdf]
  2. Overview and the Basics of Cryptography, Review of Prerequisite Knowledge
  3. Stream Ciphers, Linear Feedback Shift Registers (LFSR) (HW1)
  4. Data Encryption Standard (DES), 3DES, Meet-in-the-Middle Attack (HW2)
  5. Advanced Encryption Standard (AES), Galois Field (Project P1)
  6. Public Key Cryptography, Discrete Mathematics (Project P2)
  7. RSA Cryptosystem (Test 1)
  8. Diffie Hellman Key Exchange (DHKE), Discrete Logarithm Problems, ElGamal Encryption (HW3)
  9. Digital Signatures, Existential Forgery Attack (Project P3)
  10. Message Authentication Codes (MACs), Man-in-the-Middle Attack (HW4)
  11. Semiconductor Supply Chain, Basics of VLSI Design and Testing (Project P4)
  12. Counterfeit Integrated Circuits
  13. Detection and Avoidance of Counterfeit ICs (Test 2)
  14. Physically Unclonable Functions (PUFs) (Project P5)
  15. True Random Number Generators (TRNGs)
  16. FINAL EXAM (Presentation and Final report on Open Problem)
Recommended materials for further reading:
  1. Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996.
  2. M. Tehranipoor, U. Guin, and S. Bhunia, " Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market", IEEE Spectrum, 2017.
  3. U. Guin, K. Huang, D. DiMase, J. M. Carulli Jr., M. Tehranipoor, and Y. Makris, " Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain ," Proceedings of the IEEE, 2014.
  4. Adee, Sally. "The hunt for the kill switch." IEEE Spectrum, 2008.
Useful Links:
  1. US-CERT: United States Computer Emergency Readiness Team
  2. JavaScript Cryptography
  3. Creating Projects in Latex
  4. Manuscript Templates for Conference Proceedings
Related Conferences and Journals:
  1. Conference on Cryptographic Hardware and Embedded Systems (CHES)
  2. IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
  3. Design Automation Conference (DAC)
  4. International Test Conference (ITC)
  5. International Conference On Computer Aided Design (ICCAD)
  6. IEEE VLSI Test Symposium (VTS)
  7. IEEE Security & Privacy
  8. IEEE Transactions on Dependable and Secure Computing (TDSC)
  9. Journal of Hardware and Systems Security (HaSS)