ECE 3170 CRYPTOGRAPHIC HARDWARE FOR EMBEDDED SYSTEMS
This directory contains information regarding general lecture material for ECE 3170 Cryptographic Hardware for Embedded Systems taught at Georgia Tech.
The course textbook is Applied Cryptography by Schneier, Second Edition, CRC Press, 1996. Additional reading materials may be provided on a case by case basis during the course.
Lecture notes explained in class will be the primary source of material for homeworks, labs and tests. The course text is a major help to understand the lecture notes. Please note that important parts of the explanations may not be on the slides initially, and thus alone the slides will typically be insufficient to learn the material. In a few cases, new material may be written by hand and described in class with no associated preprepared lecture notes. The expectation is that you will write down and learn all explanations given in class. Portable Document Format (PDF) versions of lecture slides, plus any supplementary electronic material prepared by the instructor of this course (ECE 3170 CHES, taught at Georgia Tech by Assoc. Prof. Vincent Mooney), will appear below week by week as the class progresses (the links will beging to appear after the first day of class in August 2024). The course textbook is a solid resource and should be read as indicated on the lecture slides (typically each set of lecture slides will contain an associated reading assignment).
- Introduction to the Course (Lecture 1 original
slides)
- Introduction to ECE 3170 which covers cryptography from the perspective of digital design of VLSI circuits
- Cryptography I (Lecture 2 original
slides)
- Very Brief Introduction to Cryptography Terminology and History
- Four traditional cryptographic attacks: ciphertext only, known plaintext, chosen plaintext and chosen ciphertext
- Cryptography II (Lecture 3 original
slides)
- Data Encryption Standard (Lecture 4 original
slides)
- DES Overview (Schneier Ch. 12)
- Asymmetric Encryption Using RSA
- RSA Overview (Schneier Ch. 19.3)
- Number Theory I (Lecture 6
slides)
- Some mathematical background
- Authentication I
slides)
- Definitions of Authentication, Integrity and (Non-)Repudiation
- Protocols
- Man-in-the-Middle, Replay and Spoofing attacks
- Cryptography III
- Hash Functions
- MD5
- Collision Resistance, Second Preimage Resistance and Preimage Resistance
- Cryptography IV
- Encryption modes: ECB, CBC and Stream
- Cryptography V
- Cryptography VI
- Message Authentication Codes and Three Encryption + MAC Options
- Cryptography VII
- Authentication II
- Two-way Authentication Protocol
- Cryptography VIII
- Chosen Ciphertext Oracle Attack (Katz & Lindell Ch. 3.5)
- The Padding Oracle Attack (Katz & Lindell Ch. 3.7)
- Cryptography IX
- Key Length and Symmetric versus Asymmetric
- Cryptography X
- Linear Feedback Shift Register Theory
- Shift Register Based Hash Functions
- Cryptography XI
- Message Authentication Code (Keyed Hash Function)
- Digital Systems Test
- Some notes by Professor Mooney (and Prof. David Schimmel) on digital systems test from ECE 3150 (formerly ECE 3060)
- Testing for Randomness
- NIST Test Suite for Random Number Generation
- Midterm I Review of Topics
- A Retrospective Organization of the Topics Covered in Lectures
- Number Theory II
- Additional mathematical background
- Power Analysis I
- Very brief intro to power analysis
- Energy Basics
- Basics of static and dynamic energy consumption and power in CMOS
- Statistics I
- Very brief intro to standard statistical analysis
- Power Analysis II
- Detailed intro to power analysis
- Power Analysis III
- Power Analysis IV
- Continued intro to power analysis
- Number Theory II
- Some additional mathematical background
- Power Analysis V
- Intro to Differential Power Analysis (DPA)
- Power Analysis VI
- Differential Power Analysis (DPA) continued
- Hiding Countermeasures Part I
- Hiding Countermeasures Part II
- Wave Dynamic Differential Logic
Hazards
- Hazards (notes borrowed from another GT ECE undergraduate course)
Digital Logic Styles
- Uyemura textbook figures on digital logic styles
Masking Countermeasures Part I
- Masking Countermeasures I
Masking Countermeasures Part II
- Masking Countermeasures II
Power Analysis VII
- Differential Power Analysis (DPA) continued 2 (first order still)
Power Analysis VIII
- Intro to second-order differential power analysis (2nd order DPA)
Power Analysis IX
- Some additional details w.r.t. second-order differential power analysis
Hardware Trojans I
- Hardware Trojans I (notes borrowed from other universities)
Hardware Trojans II
- Hardware Trojans II (notes borrowed from other universities)
- Some additional mathematical background
This web page is http://mooney.gatech.edu/Courses/ECE3170/lectures/