Welcome to Implementation Security in Cryptography
Instructor: Prof. Sayandeep Saha
Course Details
|
TAs:
|
Course Outline
Checkout the course page.
Grading Policy (Tentative)
- Programming Assignments : 30 % (Best 2 among 3 will be considered)
- Quiz : 15 % (Best of 2 will be considered)
- Midsem, Endsem : 40 %
- Paper Presentation : 15 % (Physical; Group/Individual)
Bonus Marks
- Best Presentation : +5
- Best assignment : +5
- "Optional" extra coding assignment : +5 (max.)
- Constructive and useful feedback : +2
Lecture Schedule (Tentative)
-
Week 1 to 2: Connecting the dots and building the basics
- How does the hardware security connect to the theory of crypto
- Basics of block ciphers and hardware design
-
Week 3 to 5/6: Hardware design of AES
- Finite field maths
- Finite field multiplier
- AES design
-
Week 7 to 9: Side-channel attacks
- Power attack basics
- Different types of power attacks
- Power attack countermeasures
-
Week 10 onwards
- Fault attacks
- Fault attack countermeasures
- Advanced topics
- Paper presentations
Date | Lecture Topic | Pre-req | Lecture Slides | Reading Material |
---|---|---|---|---|
Jan 08 | Course Prelude, Introduction | - | - | |
Jan 10 | Intro to Theoretical Cryptography | - | Intro to Modern Cryptography, Chapters 2 to 3.4 | |
Jan 15 | Introduction to Block Ciphers | Bayes theorem, Basic probability, Boolean algebra | - | |
Jan 17 | Hardware Design using Verilog | Digital logic design, Verilog (see the resources on webpage and also asic-world.com) | Prof. Debdeep Mukhopadhyay's lecture on Algorithm to Hardware video | |
Jan 22 | Some Essential Concepts in Hardware Design | - | - | |
Jan 24 | Finite Field and Hardware | hard copy (due to some copyright issues) of a book will be provided in next class | ||
Jan 29 | The Anatomy of AES | - | - | |
Jan 31 | Field Isomorphism | - | - | |
Feb 5, 7 | Composite Field Mapping | - | - | |
Feb 12, 19, 21 | Entering the world of attacks | - | - | |
Mar 05, 07 | Entering the world of attacks (from page 72) | - | - | |
Mar 12, 19 | Entering the world of attacks (from page 117) | - | - | |
Mar 21, 26 | Side channel attack countermeasures | - | - | |
Mar 28 | Fault Attacks | - | - | |
Apr 2 | Fault Attacks (from page 35) | - | - | |
Apr 4 | Fault Attacks (from page 64) | - | - |