Hardware for Security

Course objectives

Aims At the end of the course the student will be able to: - explain the principles and techniques used to secure embedded devices - identify hardware components on a commercial off the shelf product - analyze a random number generator implementation - implement a dedicated crypto core implementation on an FPGA platform - discuss trade-offs and design explorations of cryptographic implementations on various platforms such as microcontrollers, ASICs, FPGAs, etc. Content In this course we explore the role hardware plays in securing embedded systems. We identify the typical components available in a wide range of Commercial off the shelf (COTS) products such as gaming consoles, IP cameras, routers and diverse IoT devices and explore the role of memories and interfacing. Next, we contrast the architecture for COTS products with that of high-end security devices and we zoom-in and examine components that are typically present in high-end security devices such as true random number generators, physically unclonable functions and dedicated crypto co-processors. This is a course for students interested in hardware and software design in industry i.e. real-world security applications. The course is devoted to the state-of-art technologies in cryptographic hardware and embedded systems.

Channel 1
Ileana Buhan Lecturers' profile
  • Lesson code10610026
  • Academic year2025/2026
  • CourseArtificial Intelligence
  • CurriculumSingle curriculum
  • Year2nd year
  • Semester1st semester
  • SSDING-INF/05
  • CFU6