Number of hours
- Lectures 16.0
- Laboratory works 20.0
ECTS
ECTS 3.0
Goal(s)
To understand the implementation constraints of secure systems and protection methods against hardware based attacks
Contact Régis LEVEUGLEContent(s)
- Secure circuits: design constraints, qualification, common criteria
- Types of attacks, exploitation examples
- Impact on test techniques
- Implementation of protections (counter-measures) against the different types of attacks
- Examples of secure architectures for symmetric and asymmetric coding algorithms
Lectures are associated to a set of practical works.
Prerequisites
- Basics on hardware logic implementations (logic circuits, VHDL)
- If possible, basics on usual cryptographic algorithms
Test
written exam (2h) + lab work reports
N1=0,5*E1+0,5*TP
N2=0,5*E2+0,5*TP
Additional Information
Curriculum->Embedded Systems and Software->Semester 5