Hardware Security: Building Tamper-Resistant Cryptography
describes hardware design techniques for security-critical
operations, such as data encryption or key generation.
The widespread use of programmable hardware platforms and
reconfigurable hardware has made secure hardware design a viable,
trustworthy alternative to software. Secure hardware is particularly useful
when high-performance, low-power operation, and/or trustworthiness of a design is critical.
A related course, Hunting for Software Bugs: Software Correctness and Security will address formal and informal methods for software assurance.
The two-and-a-half day course (Monday morning until Wednesday noon) on Hardware Security introduces the key concepts in secure hardware design, including the major technologies for secure hardware, design techniques for cryptographic implementations, and design techniques for trustworthiness. The lectures combine theory with practical hands-on sessions in a computer lab.
Participants will receive course lecture materials,
and the design examples from the hands-on sessions.
The two-and-a-half day course handles three major topics.
Day 1: Symmetric-key Cryptographic Hardware
- Finite Field Arithmetic in hardware
- Block Ciphers: Advanced Encryption Standard
- Hardware/Software Interfaces
- Handson: Design of a Cryptographic Coprocessor
Day 2: Public-key Cryptographic Hardware, and Implementation Attacks
- Public-key Elliptic-Curve based Cryptography
- Implementation Attacks: Side-channel Analysis
- Implementation Attacks: Fault Attacks
- Handson: Side-channel Analysis of AES
Day 3: Cryptographic Hash, and Attack Countermeasures
- Hash functions and SHA-3
- Countermeasures against Implementation Attacks
- Designers with a need for design trustworthiness in their application, such as data encryption, trustworthy operation, and intellectual property protection.
- Managers involved in product definition in the field of information security, in particular products with an embedded or constrained form factor.
- Students, researchers and practitioners in secure embedded system design.
- Dates: June 18 (Monday) to June 20 (Wednesday), 2012
Location: Virgnia Tech Research Center,
Nearby hotels include the Westin Arlington Gateway and the Holiday Inn – Ballston
- Registration: The cost of the course is $1800. This includes two-and-a-half days of lecture, lecture materials, and coffee breaks. Discounts are available for multiple registrations. Participants can register through the Virginia Tech Continuing and Professional Education website.
- Questions on CESCA's Continuing Education program can be directed to Patrick Schaumont (firstname.lastname@example.org)