Hardware security is a growing field within cyber-physical system security. It focuses on the secure implementation of cryptographic algorithms in hardware. Traditionally, a cryptographic algorithm is considered safe if it is a mathematically complex problem that can't be solved easily by the modern computer. However, It can be easily compromised if not correctly implemented in software or if the computer hardware exposes secret information through side-channel attacks.
As electronic devices connected to the internet become increasingly sophisticated, the requirement for a processor or hardware that accelerates crypto operations is also increasing. Implementing hardware accelerators and accelerating crypto operations in processors is still a growing field. There are different aspects of hardware security. Some of them are discussed in this blog.
My computing system requires speed over anything else, like a server responding to many client requests. There are handshake or key agreement processes that require the execution of cryptographic algorithms. If it is not fast, it can limit the owner's business operations. The hardware accelerator is dedicated hardware that executes cryptographic algorithms or executes time-consuming operations in the algorithm to decrease overall execution time, resulting in handling many more clients. Hardware security deals with implementing crypto instruction set in the existing instruction set architecture, which can help accelerate cryptographic algorithm execution.
Many devices have area or low-cost constraints, but security is a high priority, and implementing cryptographic algorithms in hardware is not feasible. Thanks to lightweight cryptographic algorithms, they can be implemented in hardware with the minimum requirement of logic gates or area. Hardware security deals with the efficient implementation of lightweight cryptographic algorithms.
A PUF is hardware that can generate random numbers required for key generation in lightweight devices. It leverages variation in the integrated circuit fabrication process and generates responses unique to the devices without the need for a sophisticated key generation process or large key storage memory in the device. Hardware security involves implementing a strong or a weak PUF based on the application requirements.
When PUF, a key generation primitive, is used, it is important that the system uses a mutual authentication and key agreement protocol. Hardware security also deals with the design and verification of a lightweight and secure authentication and key agreement protocol.
Lastly, if the hardware for executing cryptographic algorithms is not implemented correctly, it is vulnerable to side-channel or fault injection attacks. Hardware security deals with the implementation of the hardware and protects it from such attacks.