Courses
CS798A: Design for Security
Course Objective:
-
Developing efficient finite field architecture
-
Block cipher and stream cipher accelerators
-
Accelerating Public Key Cryptography: Elliptic curve scalar multiplication and isogeny based cryptosystem
-
Power-based side-channel attack
-
Fault Attacks
-
Countermeasures
Course Contents
•Module 1: Finite Field Arithmetic Hardware
• Module 2: Secure Constructions of Block Cipher: AES
• Module 3: Secure Constructions of Stream Cipher: Grain
• Module 4: Efficient Implementation of Elliptic Curve Architectures
• Module 5: Elliptic curve isogeny based cryptosystem for post quantum computing
Books:
1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty,“Hardware Security: Design, Threats, and Safeguards”,
CRC Press, 2014.
2. Doug Stinson, Cryptography Theory and Practice, CRC Press, 2005.
3. Samir Palnitkar, “Verilog HDL: A Guide to Digital Design and Synthesis”, Prentice Hall, 1996.
4. Michael D. Ciletti, “Advanced Digital Design with the Verilog HDL”, Pearson, 1996 .
5. Ted Huffmire et al: “Handbook of FPGA Design Security”, Springer, 2014.
More details regarding the course can be found at https://www.cse.iitk.ac.in/pages/CS798A.html