Welcome to Implementation Security in Cryptography

Instructor: Prof. Sayandeep Saha


Course Details

  • Lecture Slot: 6
  • Lecture Venue: CC 105
  • Lecture Days: Wednesday and Friday
    (11:05 am to 12:30 pm)
  • Piazza class: link
    Access code: cs6102
  • Instructor office hours: After class or get
    an appointment via email

TAs:



Course Outline

Checkout the course page.



Grading Policy (Tentative)

  • Programming Assignments : 30 % (Best 2 among 3 will be considered)
  • Quiz : 15 % (Best of 2 will be considered)
  • Midsem, Endsem : 40 %
  • Paper Presentation : 15 % (Physical; Group/Individual)

Bonus Marks

  1. Best Presentation : +5
  2. Best assignment : +5
  3. "Optional" extra coding assignment : +5 (max.)
  4. Constructive and useful feedback : +2

Lecture Schedule (Tentative)

  1. Week 1 to 2: Connecting the dots and building the basics

    • How does the hardware security connect to the theory of crypto
    • Basics of block ciphers and hardware design
  2. Week 3 to 5/6: Hardware design of AES

    • Finite field maths
    • Finite field multiplier
    • AES design
  3. Week 7 to 9: Side-channel attacks

    • Power attack basics
    • Different types of power attacks
    • Power attack countermeasures
  4. Week 10 onwards

    • Fault attacks
    • Fault attack countermeasures
    • Advanced topics
    • Paper presentations


DateLecture TopicPre-reqLecture SlidesReading Material
Jan 08Course Prelude, Introduction-pdf-
Jan 10Intro to Theoretical Cryptography-pdfIntro to Modern Cryptography, Chapters 2 to 3.4
pdf
Jan 15Introduction to Block CiphersBayes theorem, Basic probability, Boolean algebrapdf-
Jan 17Hardware Design using VerilogDigital logic design, Verilog (see the resources on webpage and also asic-world.com)pdfProf. Debdeep Mukhopadhyay's lecture on Algorithm to Hardware
video
Jan 22Some Essential Concepts in Hardware Design-pdf-
Jan 24Finite Field and Hardwarepdfpdfhard copy (due to some copyright issues) of a book will be provided in next class
Jan 29The Anatomy of AES-pdf-
Jan 31Field Isomorphism-pdf-
Feb 5, 7Composite Field Mapping-pdf-
Feb 12, 19, 21Entering the world of attacks-pdf-
Mar 05, 07Entering the world of attacks (from page 72)-pdf-
Mar 12, 19Entering the world of attacks (from page 117)-pdf-
Mar 21, 26Side channel attack countermeasures-pdf-
Mar 28Fault Attacks-pdf-
Apr 2Fault Attacks (from page 35)-pdf-
Apr 4Fault Attacks (from page 64)-pdf-