Home > PUF Academy > Hardware Security and Practices Tutorial (2020)

In the new series of ” Introduction to Hardware Security ” tutorial course we are approaching our previous hardware security lessons from a new angle!

For each lesson, two groups of students will prepare in advance and give a special report. Through the pre-preparation process, students will master the key points of the content and be able to discuss and share their findings with each other. More in-depth courses (such as encryption algorithms) will be taught by experts. Through this, students will be able to understand the relevant considerations and technical details of hardware security.

The course is divided into four parts:

  1. Introduction to SoC
    Part I will give you an introduction to Security SoC where you will learn how to designing chip with security functions and how SoC works.
  2. Introduction to Cryptography
    Part II is about cryptography where you will learn about the symmetric and asymmetric key algorithms, as well as th hash function.
  3. Malicious Attack & SCA Experiment
    The third part discusses malicious attack and SCA experiments.
  4. Hardware Root of Trust
    The lesson will conclude with teaching you about hardware root of trust, the physical unclonable function (PUF), and other related applications.

Lecturer: Dr. Evans Yang, PUFsecurity EVP

Language: Chinese

Cooperation Unit: Tsinghua University (Taiwan)

The course video can be watched directly on this page. Please find out the password at the bottom of the page.

———————

Intro

Chapter 1 : Introduction to Hardware Security

———————

Part I. Introduction to SoC

Chapter 2 : Introduction to Security SoC

2-1: Introduction to Security SoC
Designing Chip with Security

2-2: How Security SoC Works
Authentication, SW Integrity, Information Exchange

2-3 Security Operation in SoC

1. Secure Authentication, Secure Communication
2. Security SoC Use Case

Part II. Introduction to Cryptography

Chapter 3 : Introduction to Cryptography

3-1 Introduction to Symmetric Key Algorithm
1. Algorithm Specification
2. Modes of Operations

3-2 Introduction to Hash Function
1. Hash Characteristics
2. SHA Family

3-3 Introduction to Asymmetric Key Algorithm
1. Elliptic Curve Arithmetic
2. Cryptographic Schemes

Part III. Malicious Attack & SCA Experiment

Chapter 4 : Introduction to Malicious Attack

4-1 Introduction to Malicious Attack
This Chapter will give a introduction to malicious attacks including side channel attack (SCA) and physical attack (tampering), and raise a discussion about the prevention methods.

1. Market Application and Security Demand

2. Malicious Attacks

4-2 Cryptography & SCA Experiment
1. How does cryptographic function work for system security?
2. SCA Experiment

Part IV. Hardware Root of Trust

Chapter 5 : Introduction to Secure Boot and Root of Trust

Chapter 6 : Physical Unclonable Function (PUF)

  1. What is PUF?
  2. Different kinds of On-Chip PUFs
  3. Applications of PUF

Dear Mr. / Ms.

If you want to get the free tutorial course in PDF, you will need to enter a password : PUFsecurity@Academy

You can also find out the full series of this course on our Youtube Channel PUFsecurity Corp.