Back close

Course Detail

Course Name Cryptographic Hardware and Embedded Systems
Course Code 24CY732
Program M. Tech. in Cyber Security
Credits 3
Campus Coimbatore

Syllabus

Syllabus

Introduction to Verilog- Structure, Constructs, and Conventions. Modeling at Gate level, Data flow level, Behavior level, and switch level. Design, Simulation, and Synthesis of digital circuits, Modules, and Systems. Functions, Tasks, User defined primitives, Compiler directives. Queues, PLAs, and FSMs. FPGAs – blocks inside, their features and use. IDE and its use, FPGA based design realizations, Design of finite field arithmetic operations, Representative designs with AES, ECC and Hash Algorithms. 

Objectives and Outcomes

Prerequisite

24CY603 Cryptography 

 
Course Outcome

Course Outcome

Bloom’s Taxonomy Level

CO 1

Study verilog: structure, constructs, and conventions. Learn to model at gate level, data flow level, behavior level, and switch level 

L2

CO 2

Design, simulate and synthesis of digital circuits, modules, and systems. Understand the concepts of functions, tasks, user defined primitives, Compiler directives 

L5

CO 3

Gain the core idea of queues, PLAs, and FSMs. Learn the concepts of FPGAs – blocks inside, their features and use 

L3

CO 4

FPGA based design realizations 

L5

CO 5

Design of finite field arithmetic operations, Representative designs with AES, ECC and Hash Algorithms 

L6

 
CO-PO Mapping

CO-PO Mapping

CO/PO

PO 1 

PO 2 

PO 3 

PO 4 

PO 5 

PO 6 

PO 7 

PO 8 

PO 9 

PO 10 

PSO1 

PSO2 

PSO3 

CO 1 

– 

– 

– 

CO 2 

– 

– 

– 

CO 3 

– 

– 

– 

CO 4 

– 

– 

– 

CO 5 

– 

– 

– 

Text Books / References

  1. M. C. Cileti, Advanced Digital Design with Verilog HDL, Prentice Hall, 2002. 
  2. S. Brown and Z. Vranesic, Fundamentals of Digital Logic with Verilog Design , Tata McGraw Hill, 2002. 
  3. T. R. Padmanabhan and B. Bala Tripura Sundari, Design through Verilog HDL , IEEE Press, John Wiley, 2003. 
  4. F. Riodrigues-Henriquez, N. Saqib, A. Diaz-Perez and C. Koc, Cryptographic Algorithms on Reconfigurable Hardware , Springer, 2007. 
  5. C. K. Koc, Cryptographic Engineering , Springer, 2008. 

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now