Sie sind auf Seite 1von 13

INTRODUCTION TO

HARDWARE SECURITY AND


TRUST

CHAP 1:BACKGROUND ON VLSI


TESTING
IC DESIGN FLOW AND IMPORTANCE
DESIGN FOR TESTABILITY
DEFECT YIELD DEFECT LEVEL
TEST GENERATION
1. STRUCTURAL TEST
2. FUNCTIONAL TEST
.FAULT MODELS

TESTABILITY
1. CONTROLLABILITY
2. OBSERVABILITY
.AUTOMATIC TEST PATTERN GENERATION
.DESIGN FOR TESTABILITY
1. SCAN CELL
2. SCAN CHAIN
3. SCAN TEST COMPRESSION
4. PARTIAL SCAN DESIGN
5. BOUNDARY SCAN
6. BIST METHODS
.AT SPEED DELAY TEST

CHAP 2:Introduction to
Cryptographic Hash Functions
Hash function maps message of arbitrary length to m bit output
h=H(M)
Preimage Resistance
Given hash h, difficult to find message M such that h=H(M)
One way property
Second Preimage
Given message M1 difficult to generate another hash function M2 such that
M1=M2
Collision Resistance
Difficult to find two messages M1 and M2 such that M1 and M2 not equal
but H(M1)=H(M2)

Merkle Damgard Model of Hash


Functions

STEP1
Message padded and divided in blocks of uniform length
Step 2
Blocks processed sequentially with compression function
Step 3
Starting with initial hash F repeatedly generates new hash value
from previous block and new message block
Step 4
Output of the final compression function is hash of the message

MD5 and SHA 2 use Merkle Damgard model and logical


functions for computation
Applications of Hash
1. Data Integrity

After receiving data on can compute hash of the received data


and compare with the hash of the received data which can be
sent through secure channels ,second preimage resistance
2. Digital Signatures

Hash functions can be used to generate public key algorithms


.One can sign the document by encrypting hash of the message
with private key .The ciphertext can be used as signature
.Anyone who wants to verify can decrypt with public key and
compare decrypted value with hash generated from message

3.Authentication
Hash functions can be used for authentication as well .In
this case hash value of the users password instead of
password itself is transmitted and compared by the
server .
When computing the hash password may be
concatenated with random value generated by server
.Hence hash are different every time

Algorithms
MD5
SHA 2

Keccak based Sponge Construction

BLAKE BASED HAIFA


CONSTRUCTION

CHAP 3:RSA IMPLEMENTATION AND


SECURITY
INTRODUCTION
1. SYMMETRIC
2. ASYMMETRIC
.RSA ALGORITHM DESCRIPTION
.HARDWARE IMPLEMENTATION INTRODUCTION
1. COMBINATORIAL MULTIPLIER
2. SERIAL BIT MULTIPLIER
3. HYBRID/PARALLEL DESIGN

SECURITY ANALYSIS
CONCLUSION

Das könnte Ihnen auch gefallen