2020 HW Security Tutorial - CH5-2 Building Root of Trust

preview_player
Показать описание
CH5-2 Building Root of Trust
Presenter: Group 5
---

In the new series of the ” Introduction to Hardware Security ” tutorial course, we are approaching our previous hardware security lessons from a new angle! For each lesson, two groups of students will prepare in advance and give a special report. Through the pre-preparation process, students will master the key points of the content and be able to discuss and share their findings with each other. More in-depth courses (such as encryption algorithms) will be taught by experts. Through this, students will be able to understand the relevant considerations and technical details of hardware security.

The course is divided into four parts:

1. Introduction to SoC
Part I will give you an introduction to Security SoC where you will learn how to design a chip with security functions and how SoC works.

2. Introduction to Cryptography
Part II is about cryptography where you will learn about the symmetric and asymmetric key algorithms, as well as the hash function.

3. Malicious Attack & SCA Experiment
The third part discusses malicious attacks and SCA experiments.

4. Hardware Root of Trust
The lesson will conclude by teaching you about the hardware root of trust, the physical unclonable function (PUF), and other related applications.

Рекомендации по теме