Implementation Security in Cryptography
Instructor:
Prof. Sayandeep Saha
Course Details
| Lecture Slot | 6 |
| Lecture Venue | CC 101 |
| Lecture Schedule | Wednesday and Friday, 11:05 AM โ 12:30 PM |
| Piazza | Course Piazza Page |
| Piazza Access Code | cs6102 |
| Instructor Office Hours | After class or by prior email appointment |
| Teaching Assistants | Shoaib Ahamed (24m2102 [at] iitb.ac.in) Aritra Belel (24m0814 [at] iitb.ac.in) Keyaan Kartikeya Rajesh (24b0977 [at] iitb.ac.in) Please use Piazza for general course-related queries. |
Lecture Schedule (Tentative)
Weeks 1โ2: Foundations and Motivation
- Relationship between hardware security and cryptographic theory
- Fundamentals of block ciphers and hardware design principles
Weeks 3โ5/6: Hardware Design of AES
- Finite field arithmetic
- Finite field multipliers
- Architectural design of AES
Weeks 7โ9: Side-Channel Attacks
- Introduction to power analysis attacks
- Classification of power-based side-channel attacks
- Countermeasures against power attacks
Week 10 Onwards
- Fault injection attacks
- Fault attack countermeasures
- Advanced topics in implementation security
Detailed Lecture Plan
| Date | Topic | Prerequisites | Slides | YouTube Video | Reading / References |
|---|---|---|---|---|---|
| Jan 07 | Course Prelude and Introduction | โ | Lecture 01 | Video | โ |
| Jan 09 | Fundamentals and Perfect Secrecy | โ | Lecture 02 | Video | Introduction to Modern Cryptography |
| Jan 14 | Computational Secrecy and Block Ciphers | Lecture 2 | Lecture 03 | Video | โ |
| Jan 16 | Hardware Design Using Verilog | Basics of digital logic (MUX, flip-flops, registers, etc.) โ see Resources | Lecture 04 | Video | ASIC World: Verilog HDL |
| Jan 21 | Sequential Circuits & Hardware Mapping | Lecture 4 | Lecture 4 slides + extended slides | Video | Switching and Finite Automata Theory |
| Jan 23 | Finite Fields and Hardware | โ | Lecture 06 | Video | โ |
| Jan 28 | Verilog Tutorial (Tutorial 1) | โ | Tutorial 1 | โ | ยท Tutorial Tab ยท Download Files |
| Jan 30 | Galois Fields and AES Introduction | โ | Lecture 07 | Video | โ |
| Feb 04 | Field Operations over Hardware | โ | Lecture 08 | Video | โ |
| Feb 06 | Extension Fields Isomorphism | โ | Lecture 09-10 | Video | โ |
| Feb 11 | Quiz - I | โ | Quiz-I_solutions | โ | โ |
| Feb 13 | Extension Fields Isomorphism contd. | โ | Lecture 09-10 | Video | โ |
| Feb 18 | Optimizing Field Operations over GF(2^8) | โ | Lecture 11 | Video | โ |
| Feb 20 | Efficiency and Security of Different AES Implementations | โ | โ | Video | Sage File |
| Mar 04 | Efficient AES Mix-Column | Bitslicing | โ | โ | Video | โ |
| Mar 06 | Side Channel Attack on AES | โ | โ | Video | โ |
| Mar 11 | Statistical Analysis of Differential Power Attacks | โ | โ | Video | โ |
| Mar 13 | Statistics Behind Difference of Mean Attack | โ | โ | Video | โ |
| Mar 18 | Statistics Behind Correlation Power Attack | โ | โ | Video | โ |
| Mar 20 | Statistics Behind Template Attacks, Modelling Noise | โ | Consolidated Slides (from L11 - L18) | Video | โ |
| Mar 25 | SCA Countermeasures | โ | Lecture 19 | โ | โ |
| Mar 27 | SCA Countermeasures contd. | โ | Lecture 20 | โ | โ |
| Apr 01 | Fault Attacks | โ | Lecture 21 | โ | โ |
Grading Policy (Tentative)
| Component | Weight | Notes |
|---|---|---|
| Programming Assignments | 30% | Best 2 out of 3 assignments will be considered |
| Quizzes | 30% | - |
| Mid-Semester and End-Semester Examinations | 40% | - |
Note: All schedules and policies are subject to revision during the semester.