top of page

Courses

CS798A: Design for Security

Course Objective:

​

  1. Developing efficient finite field architecture

  2. Block cipher and stream cipher accelerators

  3. Accelerating Public Key Cryptography: Elliptic curve scalar multiplication and isogeny based cryptosystem

  4. Power-based side-channel attack

  5. Fault Attacks

  6. Countermeasures

​​

Course Contents

​

•Module 1: Finite Field Arithmetic Hardware

 

• Module 2: Secure Constructions of Block Cipher: AES

​

• Module 3: Secure Constructions of Stream Cipher: Grain

​

• Module 4: Efficient Implementation of Elliptic Curve Architectures

​

• Module 5: Elliptic curve isogeny based cryptosystem for post quantum computing

​

Books:

​

1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty,“Hardware Security: Design, Threats, and Safeguards”,

CRC Press, 2014.

2. Doug Stinson, Cryptography Theory and Practice, CRC Press, 2005.

3. Samir Palnitkar, “Verilog HDL: A Guide to Digital Design and Synthesis”, Prentice Hall, 1996.

4. Michael D. Ciletti, “Advanced Digital Design with the Verilog HDL”, Pearson, 1996 .

5. Ted Huffmire et al: “Handbook of FPGA Design Security”, Springer, 2014.

​

​

More details regarding the course can be found at https://www.cse.iitk.ac.in/pages/CS798A.html

bottom of page