1) Understand the specific threats and vulnerabilities of hardware and embedded systems, as well as the importance of physical security in critical environments where hardware protection is essential.
2) Explore and implement modern cryptographic primitives in hardware, including classical and post-quantum algorithms, random number generators (TRNG/DRNG), and physically unclonable functions (PUFs), evaluating their applicability and security.
3) Analyze physical attacks on hardware, including side-channel and fault injection attacks, understanding their principles, means of execution, and practical limitations, and proposing effective countermeasures to mitigate their effects.
4) Evaluate the trust and integrity of hardware throughout its lifecycle, identifying risks such as counterfeiting, piracy, and hardware Trojans, and proposing mechanisms to mitigate these issues.
5) Apply both practical and conceptual knowledge to design secure hardware solutions, taking into account both external and internal threats during the development and deployment phases.