Secure electronic circuits and systems

lelec2760  2019-2020  Louvain-la-Neuve

Secure electronic circuits and systems
Note from June 29, 2020
Although we do not yet know how long the social distancing related to the Covid-19 pandemic will last, and regardless of the changes that had to be made in the evaluation of the June 2020 session in relation to what is provided for in this learning unit description, new learnig unit evaluation methods may still be adopted by the teachers; details of these methods have been - or will be - communicated to the students by the teachers, as soon as possible.
5 credits
30.0 h + 30.0 h
Q2
Teacher(s)
Standaert François-Xavier;
Language
English
Main themes
The course material includes the following topics:

  • black box assumptions for cryptographic algorithms and block ciphers,
  • mathematical cryptanalysis issues (statistical, algebraic, ...),
  • efficient implementation of cryptosystems,
  • physical attacks exploiting side-channels (e.g. power consumption, electromagnetic radiation, ...) or fault insertion,
  • random number generation, biometrics, physically unclonable functions, ...
  • integration of cryptographic hardware devices in secure systems and applications.
Aims

At the end of this learning unit, the student is able to :

1 In view of the LO frame of reference of the "Master Electrical Engineering", this course contributes to the development, acquisition and evaluation of the following learning outcomes :
  • AA1.1, AA1.2, AA1.3
  • AA2.2
  • AA3.2
  • AA4.3
  • AA5.3, AA5.6
At the end of the course, the student will be able to :
- Define the notion of secure cipher and argue about the difficulty of building efficient block ciphers that are provably secury in come formal model,
- Identify the properties that enable guaranteeing the "practical" security of a cipher, as well as the structural weaknesses to be avoided when designing such ciphers,
- Criticize the heuristic assumptions that are used in the (mathematical and physical) security analysis of a block cipher algorithm ofr its implementation,
- Apply cryptanalytic techniques (for example statistical, algebraic, combinatorial) and evaluate their impact for the security of an encryption algorithm,
- Describe and analyze the hardware architecture of a cryptographic implementation fulfilling a number of constraints provided in terms of cost or performance,
- Implement a cryptographic algorithm in a low-cost microcontroller,
- Evaluate the physical security of a cryptographic implementation against-side-channel attacks, taking advantage of physical information leakage (e.g. the power consumption of a microelectronic device performing some sensitive crypographic computations),
- Propose countermeasures and protection mechanisms against different physical attacks and justify their relevance in function of the adversarial context considered,
- Formalize physical properties that can be constructively exploited in cryptography (e.g. for random number generation, physically unclonable functions, IP protection),
- Enumerate the pros and cons of a cryptographic algorithm in function of its compromise between (mathematical, physical) security vs. implementation efficiency,
- Understand, summarize and present the results of a scientific paper related to the design and implementation of cryptograhic algorithms (e.g. such as published in conferenes like Eurocrypt, Crypto, Asiacrypt, CHES, FSA, ACM CCS, ...)
 

The contribution of this Teaching Unit to the development and command of the skills and learning outcomes of the programme(s) can be accessed at the end of this sheet, in the section entitled “Programmes/courses offering this Teaching Unit”.
Content
Block ciphers (2 lectures), hardware implementations (1 lecture), software implementations (1 lecture), side-channel attacks (2 lectures), tamper resilience and fault attacks (1 lecture), physically unclonable functions (1 lecture), + open topics
Teaching methods
The course is organized in 14 lectures and 14 exercice sessions (2hours each). Every lecture starts with a preliminary reading to prepare. Students will be questioned about these lectures at the beginning of the course. Exercice sessions are dedicated to solving implementation and cryptanalysis problems, and are structured as different projetcts to carry out by small (2 or 3 student) groups.  The last hour  will be devoted to the oral presentation of scientific papers proposed by the students
Evaluation methods
Students will be evaluated individually, based on the following elements :
- Solving of implementation and cryptanalysis problems proposed during the exercise sessions that will be structured as several short-term projects.
- Written summary and/or oral presentation of a scientific paper.
- Answers to the questions at the beginning of each course, about preliminary readings.
- Written and/or oral examination about the previously listed course goals.
The respective importance of each element of the evaluation can vary in function of the years and will be specified at the first course of each year. Under individual demand of a student, the evaluation can be limited to the written work and session examination.
Other information
The course is open to any master student in electrical engineering, electromechanical engineering, computer science engineering and mathematical engineering. Prerequisites only include courses from the UCL bachelor in engineering (mathematics, statistics, ...).
Bibliography
Notes de cours et articles disponibles sur la page du cours
Faculty or entity
ELEC


Programmes / formations proposant cette unité d'enseignement (UE)

Title of the programme
Sigle
Credits
Prerequisites
Aims
Master [120] in Data Science Engineering

Master [120] in Computer Science and Engineering

Master [120] in Mathematical Engineering

Master [120] in Electro-mechanical Engineering

Master [120] in Electrical Engineering

Master [120] in Data Science: Information Technology