top of page

Courses

CS798A: Design for Security

Course Objective:

  1. Developing efficient finite field architecture

  2. Block cipher and stream cipher accelerators

  3. Accelerating Public Key Cryptography: Elliptic curve scalar multiplication and isogeny based cryptosystem

  4. Power-based side-channel attack

  5. Fault Attacks

  6. Countermeasures

Course Contents

•Module 1: Finite Field Arithmetic Hardware

 

• Module 2: Secure Constructions of Block Cipher: AES

• Module 3: Secure Constructions of Stream Cipher: Grain

• Module 4: Efficient Implementation of Elliptic Curve Architectures

• Module 5: Elliptic curve isogeny based cryptosystem for post quantum computing

Books:

1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty,“Hardware Security: Design, Threats, and Safeguards”,

CRC Press, 2014.

2. Doug Stinson, Cryptography Theory and Practice, CRC Press, 2005.

3. Samir Palnitkar, “Verilog HDL: A Guide to Digital Design and Synthesis”, Prentice Hall, 1996.

4. Michael D. Ciletti, “Advanced Digital Design with the Verilog HDL”, Pearson, 1996 .

5. Ted Huffmire et al: “Handbook of FPGA Design Security”, Springer, 2014.

More details regarding the course can be found at https://www.cse.iitk.ac.in/pages/CS798A.html

bottom of page