Cryptographic Hardware for Embedded Systems

(3-0-3-4)

CMPE Degree: This course is Elective for the CMPE degree.

EE Degree: This course is Elective for the EE degree.

Lab Hours: 3 supervised lab hours and 0 unsupervised lab hours.

Technical Interest Group(s) / Course Type(s): VLSI Systems and Digital Design

Course Coordinator: Vincent J Mooney

Prerequisites: ECE2040 and ECE2031

Corequisites: None.

Catalog Description

Introduction to cryptography and authentication from a hardware-centric perspective. Historic ciphers, symmetric and asymmetric encryption, and power analysis attacks are taught from a digital and VLSI design perspective.

Course Outcomes

  1. Analyze the level of security provided by symmetric encryption algorithms such as DES and asymmetric encryption algorithms such as RSA
  2. Write VHSIC Hardware Description Language (VHDL) code to implement encryption algorithms including synthesis to hardware logic gates.
  3. Provide approaches to authentication able to resist attacks such as man-in-themiddle and replay.
  4. Explain dangers associated with hardware Trojan insertion of logic gates in the chip design process including the manufacturing supply chain.
  5. Make tradeoffs between execution speed, area, energy/power and resistance to side-channel analysis and attacks for practical digital logic implementations of encryption and authentication.

Student Outcomes

In the parentheses for each Student Outcome:
"P" for primary indicates the outcome is a major focus of the entire course.
“M” for moderate indicates the outcome is the focus of at least one component of the course, but not majority of course material.
“LN” for “little to none” indicates that the course does not contribute significantly to this outcome.

1. ( P ) An ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics

2. ( M ) An ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors

3. ( P ) An ability to communicate effectively with a range of audiences

4. ( LN ) An ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts

5. ( LN ) An ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives

6. ( P ) An ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions

7. ( LN ) An ability to acquire and apply new knowledge as needed, using appropriate learning strategies.

Strategic Performance Indicators (SPIs)

Not Applicable

Course Objectives

Topical Outline

Module 1: Authentication - Access control, challenge-response, keys - One-way functions - VLSI circuits and characteristics Module 2: Cryptography from a hardware-centric perspective - Data integrity and authenticity - Historic ciphers: substitution, permutation/transposition and one-time pads - Symmetric and asymmetric keys, models and protocols - DES and associated cryptographic hardware Module 3: Power Analysis Attacks - Simple Power Analysis - Differential Power Analysis - Electro-Magnetic (EM) Analysis Module 4: Cryptographic Hardware and Vulnerabilities - ASIC versus FPGA versus Microprocessor (i.e., software) - Side Channel Analysis Module 5: VLSI Test, Supply Chain and Hardware Attacks - Design verification and manufacturing test - Relationship betwee