Cryptographic Hardware for Embedded Systems
CMPE Degree: This course is Elective for the CMPE degree.
EE Degree: This course is Elective for the EE degree.
Lab Hours: 3 supervised lab hours and 0 unsupervised lab hours.
Technical Interest Group(s) / Course Type(s): VLSI Systems and Digital Design
Course Coordinator: Vincent J Mooney
Prerequisites: ECE2040 and ECE2031
Catalog DescriptionIntroduction to cryptography and authentication from a hardware-centric perspective. Historic ciphers, symmetric and asymmetric encryption, and power analysis attacks are taught from a digital and VLSI design perspective.
Textbook(s)Applied Cryptography, Introduction to Modern Cryptography, Handbook of Applied Cryptography
- Analyze the level of security provided by symmetric encryption algorithms such as DES and asymmetric encryption algorithms such as RSA
- Write VHSIC Hardware Description Language (VHDL) code to implement encryption algorithms including synthesis to hardware logic gates.
- Provide approaches to authentication able to resist attacks such as man-in-themiddle and replay.
- Explain dangers associated with hardware Trojan insertion of logic gates in the chip design process including the manufacturing supply chain.
- Make tradeoffs between execution speed, area, energy/power and resistance to side-channel analysis and attacks for practical digital logic implementations of encryption and authentication.
Student OutcomesIn the parentheses for each Student Outcome:
"P" for primary indicates the outcome is a major focus of the entire course.
“M” for moderate indicates the outcome is the focus of at least one component of the course, but not majority of course material.
“LN” for “little to none” indicates that the course does not contribute significantly to this outcome.
1. ( P ) An ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics
2. ( M ) An ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors
3. ( P ) An ability to communicate effectively with a range of audiences
4. ( LN ) An ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts
5. ( LN ) An ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives
6. ( P ) An ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions
7. ( LN ) An ability to acquire and apply new knowledge as needed, using appropriate learning strategies.
Strategic Performance Indicators (SPIs)
Module 1: Authentication
- Access control, challenge-response, keys
- One-way functions
- VLSI circuits and characteristics
Module 2: Cryptography from a hardware-centric perspective
- Data integrity and authenticity
- Historic ciphers: substitution, permutation/transposition and one-time pads
- Symmetric and asymmetric keys, models and protocols
- DES and associated cryptographic hardware
Module 3: Power Analysis Attacks
- Simple Power Analysis
- Differential Power Analysis
- Electro-Magnetic (EM) Analysis
Module 4: Cryptographic Hardware and Vulnerabilities
- ASIC versus FPGA versus Microprocessor (i.e., software)
- Side Channel Analysis
Module 5: VLSI Test, Supply Chain and Hardware Attacks
- Design verification and manufacturing test
- Relationship betwee