Keyboard shortcuts

Press โ† or โ†’ to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Implementation Security in Cryptography

Instructor:
Prof. Sayandeep Saha


Course Details

Lecture Slot6
Lecture VenueCC 101
Lecture ScheduleWednesday and Friday, 11:05 AM โ€“ 12:30 PM
PiazzaCourse Piazza Page
Piazza Access Codecs6102
Instructor Office HoursAfter class or by prior email appointment
Teaching AssistantsShoaib Ahamed (24m2102 [at] iitb.ac.in)
Aritra Belel (24m0814 [at] iitb.ac.in)
Keyaan Kartikeya Rajesh (24b0977 [at] iitb.ac.in)

Please use Piazza for general course-related queries.

Lecture Schedule (Tentative)

Weeks 1โ€“2: Foundations and Motivation

  • Relationship between hardware security and cryptographic theory
  • Fundamentals of block ciphers and hardware design principles

Weeks 3โ€“5/6: Hardware Design of AES

  • Finite field arithmetic
  • Finite field multipliers
  • Architectural design of AES

Weeks 7โ€“9: Side-Channel Attacks

  • Introduction to power analysis attacks
  • Classification of power-based side-channel attacks
  • Countermeasures against power attacks

Week 10 Onwards

  • Fault injection attacks
  • Fault attack countermeasures
  • Advanced topics in implementation security

Detailed Lecture Plan

DateTopicPrerequisitesSlidesYouTube VideoReading / References
Jan 07Course Prelude and Introductionโ€”Lecture 01Videoโ€”
Jan 09Fundamentals and Perfect Secrecyโ€”Lecture 02VideoIntroduction to Modern Cryptography
Jan 14Computational Secrecy and Block CiphersLecture 2Lecture 03Videoโ€”
Jan 16Hardware Design Using VerilogBasics of digital logic (MUX, flip-flops, registers, etc.) โ€” see ResourcesLecture 04VideoASIC World: Verilog HDL
Jan 21Sequential Circuits & Hardware MappingLecture 4Lecture 4 slides + extended slidesVideoSwitching and Finite Automata Theory
Jan 23Finite Fields and Hardwareโ€”Lecture 06Videoโ€”
Jan 28Verilog Tutorial (Tutorial 1)โ€”Tutorial 1โ€”ยท Tutorial Tab
ยท Download Files
Jan 30Galois Fields and AES Introductionโ€”Lecture 07Videoโ€”
Feb 04Field Operations over Hardwareโ€”Lecture 08Videoโ€”
Feb 06Extension Fields Isomorphismโ€”Lecture 09-10Videoโ€”
Feb 11Quiz - Iโ€”Quiz-I_solutionsโ€”โ€”
Feb 13Extension Fields Isomorphism contd.โ€”Lecture 09-10Videoโ€”
Feb 18Optimizing Field Operations over GF(2^8)โ€”Lecture 11Videoโ€”
Feb 20Efficiency and Security of Different AES Implementationsโ€”โ€”VideoSage File
Mar 04Efficient AES Mix-Column | Bitslicingโ€”โ€”Videoโ€”
Mar 06Side Channel Attack on AESโ€”โ€”Videoโ€”
Mar 11Statistical Analysis of Differential Power Attacksโ€”โ€”Videoโ€”
Mar 13Statistics Behind Difference of Mean Attackโ€”โ€”Videoโ€”
Mar 18Statistics Behind Correlation Power Attackโ€”โ€”Videoโ€”
Mar 20Statistics Behind Template Attacks, Modelling Noiseโ€”Consolidated Slides (from L11 - L18)Videoโ€”
Mar 25SCA Countermeasuresโ€”Lecture 19โ€”โ€”
Mar 27SCA Countermeasures contd.โ€”Lecture 20โ€”โ€”
Apr 01Fault Attacksโ€”Lecture 21โ€”โ€”

Grading Policy (Tentative)

ComponentWeightNotes
Programming Assignments30%Best 2 out of 3 assignments will be considered
Quizzes30%-
Mid-Semester and End-Semester Examinations40%-

Note: All schedules and policies are subject to revision during the semester.