Circuit Design for Security
Lecturer: Michael Pehl (L), Jonas Schupp, Niklas Stein
Number | 0000005198 |
---|---|
Type | lecture |
Duration | 2 SWS |
Term | Sommersemester 2024 |
Language of instruction | English |
Position within curricula | See TUMonline |
Dates | See TUMonline |
- 17.04.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 22.04.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 24.04.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 29.04.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 06.05.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 08.05.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 13.05.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 15.05.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 22.05.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 27.05.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 29.05.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 03.06.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 05.06.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 10.06.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 17.06.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 19.06.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 24.06.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 26.06.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 01.07.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 03.07.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 08.07.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 10.07.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 15.07.2024 11:30-13:00 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
- 17.07.2024 15:00-16:30 Theresianum, 0602, Hörsaal ansteigend, ohne exp. B
Admission information
Objectives
After successful completion of the module, students have the following qualifications:
- They know essential elements of digital circuits such as state machines, FIFOs, serial interfaces, buses, LFSRs and multipliers and can implement them independently.
- They know typical circuit design issues such as clock domain crossing, the choice of synchronous and asynchronous reset or the testability of circuits and can choose suitable solutions.
- They know application scenarios of multipliers and (N)LFSRs in the security context, can understand the theoretical foundations of the concepts discussed, and can name the advantages and disadvantages of these.
- They are able to describe digital circuits in VHDL and perform initial synthesis steps.
- They know essential elements of digital circuits such as state machines, FIFOs, serial interfaces, buses, LFSRs and multipliers and can implement them independently.
- They know typical circuit design issues such as clock domain crossing, the choice of synchronous and asynchronous reset or the testability of circuits and can choose suitable solutions.
- They know application scenarios of multipliers and (N)LFSRs in the security context, can understand the theoretical foundations of the concepts discussed, and can name the advantages and disadvantages of these.
- They are able to describe digital circuits in VHDL and perform initial synthesis steps.
Description
In this module, the development of digital circuits in the security context is examined starting from basic circuits. First of all, basic circuits and possibilities for storing data (ROM / RAM / flip-flops / latches) are repeated. In addition, the knowledge of implementing state machines will be refreshed and extended. The implementation of important components of digital circuit design such as FIFOs and LFSRs is introduced. In particular, the implementation of pseudo-random number generators based on LFSRs and NLFSRs and their application in the security context will be discussed. The module also covers the implementation of interfaces, with a focus on serial interfaces, and the implementation of buses using the AXI BUS as an example. The implementation of multipliers is essential in many cryptographic applications. For this purpose, fundamental implementations as well as special variants for modulo-multiplication are discussed in the module. Also, concepts are discussed to test cryptographic circuits appropriately; Implementation strategies are introduced to optimize circuits in terms of area, power consumption, and performance.
In addition to the theoretical teaching of the content in lectures, the practical relevance is clarified in exercises and in a mandatory lab course. The students also learn to implement and synthesize digital circuits with a commercial design tool.
In addition to the theoretical teaching of the content in lectures, the practical relevance is clarified in exercises and in a mandatory lab course. The students also learn to implement and synthesize digital circuits with a commercial design tool.
Prerequisites
Basic knowledge in VHDL
Basic knowledge of IT security as taught,e.g., in the lectures Grundlagen der IT-Sicherheit and Angewandte Kryptographie
Basic knowledge of IT security as taught,e.g., in the lectures Grundlagen der IT-Sicherheit and Angewandte Kryptographie
Examination
see module description
Recommended literature
Niklaus Wirth; Digital Circuit Design for Computer Science Students - An Introductory Textbook; Springer; 1995 ISBN; 978-3-540-58577-0
Hubert Kaeslin; Digital Integrated Circuit Design - From VLSI Architectures to CMOS Fabrication; Cambridge University Press; 2008; ISBN 978-0-521-88267-5
Debdeep Mukhopadhyay and Rajat Subhra Chakrabory; Hardware Security - Design, Threats and Safeguards; CRC Press; 2015; ISBN 978-1-4398-9583-2
Hubert Kaeslin; Digital Integrated Circuit Design - From VLSI Architectures to CMOS Fabrication; Cambridge University Press; 2008; ISBN 978-0-521-88267-5
Debdeep Mukhopadhyay and Rajat Subhra Chakrabory; Hardware Security - Design, Threats and Safeguards; CRC Press; 2015; ISBN 978-1-4398-9583-2