ECE 4156/6156 HARDWARE-ORIENTED SECURITY AND TRUST
This directory contains information regarding general lecture material for ECE 4156/6156 taught at Georgia Tech.
The course textbooks are Introduction to Modern Cryptography by Katz and Lindell, second edition, CRC Press, 2015, and Handbook of Applied Cryptography by Menezes et al., CRC Press, 1996.
Lecture notes explained in class will be the primary source of material for homeworks, labs and tests. Please note that important parts of the explanations may not be on the slides initially, and thus alone the slides will typically be insufficient to learn the material. In a few cases, new material may be written by hand and described in class with no associated preprepared lecture notes. The expectation is that you will write down and learn all explanations given in class. Pdf versions of lecture slides, plus any supplementary electronic material prepared by the instructor of this course (ECE 4156/6156, taught at Georgia Tech by Assoc. Prof. Vincent Mooney), will appear below week by week as the class progresses (the links will begin to appear after the first day of class in January, 2024). Please note that some of the lecture topics below are quite large and may be broken into multiple lectures during the semester as the slides are prepared for class.
- Introduction
(Lecture 1 original
and marked up
slides)
- Introduction to ECE 4156/6156 with a focus on security and trust in digital design of VLSI circuits
- Cryptography Part I
(Lecture 2 original
and marked up
slides)
- A brief introduction to cryptography including the shift cipher.
- Introduction to SHA-2
(Lecture 3 original
and marked up
slides)
- A brief introduction to one-way hash functions and SHA-2
- Introduction to Authentication Terminology
- A brief introduction to authentication and associated terminology
- The Merkle-Damgard Construction
- Use of the Merkle-Damgard Construction in Collision Resistant Hashes.
- Cryptography Part II
(Lecture 6 original
and marked up
slides)
- Cryptography Part III
(Lecture 7 original
and marked up
slides)
- Cryptography Part IV
(Lecture 8 original
and marked up
slides)
- CPA-secure encryption and encryption modes.
- Labs Overview
- Introduction to the first lab in ECE 4156/6156
- Cryptography Part V
(Lecture 9 original
and marked up
slides)
- Introduction to secret sharing.
- Cryptography Part VI
(Lecture 10 original
and marked up
slides)
- A brief introduction to Diffie-Hellman Key Exchange.
- Cryptography Part VII
(Lecture 11 original
and marked up
slides)
- CCA, HMAC and Unforgeability.
- Cryptography Part VIII
(Lecture 12 original
and marked up
slides)
- Advanced Encryption Standard
(Lecture 13 original
and marked up
slides)
- RSA
(Lecture 14 original
and marked up
slides)
- Asymmetric cryptography using RSA.
- Authentication Part II
(Lecture 15 original
and marked up
slides)
- Cryptography Part IX
(Lecture 16 original
and marked up
slides)
- Testing for Randomness
(Lecture 17 original
and marked up
slides)
- NIST Test Suite for Random Number Generation
- Physically hard for yoU to clone Functions (PUFs) Part I
(Lecture 18 original
and marked up
slides)
- A brief introduction to PUF notation
- PUF construction classes
- Intra- vs. inter-chip Hamming Distance
- Samsung PUF
- ICTK PUF
- PUFs Part II
(Lecture 19 original
and marked up
slides)
- PUF types and physics
- PUF entropy sources
- Random Access Memory
(Lecture 20 original
and marked up
slides)
- Some notes by Professor Mooney (and Prof. David Schimmel) on random access memory from ECE 6130
- PUFs Part III
(Lecture 21 original
and marked up
slides)
- PUFs Part IV
(Lecture 22 original
and marked up
slides)
- Lecture notes borrowed from other universities.
- PUFs Part V
(Lecture 23 original slides,
original 1st set of markings,
original 2nd set of markings, original last set of markings,
marked up slides,
1st set of markings,
2nd set of markings and last set of markings
)
- More lecture notes borrowed from other universities.
- Hazards
(Lecture 24 original
and marked up
slides)
- Some notes by Professor Mooney (and Prof. David Schimmel) on logic hazards from ECE 3150 (formerly ECE 3060)
- Sequential Systems
(Lecture 25 original
slides)
- Some notes by Professor Mooney (and Prof. David Schimmel) on clock based systems and metastability from ECE 3150 (formerly ECE 3060)
- FPGA Systems
(Lecture 26 original
notes)
- Some notes by Professor Mooney on FPGA logic design from ECE 6130; these FPGA notes are meant to assist in understanding HELP (a PUF which can be implemented in an FPGA).
- PUFs Part VI
(Lecture 27 original slides, paper
and marked up slides
)
- Lecture notes and associated paper borrowed again from other universities.
- PUFs Part VII (Lecture 28 original
and marked up
slides)
- Lecture notes borrowed from other universities.
- Hardware Trojans I (Lecture 29 original
slides)
- Lecture notes borrowed yet again from other universities.
- Hardware Trojans II (Lecture 30 original
slides)
- Lecture notes borrowed from other universities.
- Midterm II Review/ Comments on Topics Covered and Relationships
(Lecture 31)
- Readings and syllabus topics since Midterm I
- Architecture Flaws Part I
-
Advanced Authentication
- Multi-party authentication
-
Architecture Flaws Part II
-
Hardware and Software Vulnerabilities
- Common weakness enumerations
- Secure boot
- Timing attacks
- Countermeasures in hardware
This web page is http://mooney.gatech.edu/Courses/ECE4156/lectures/