Report 02 - Hardware Cryptography Whiteboard
2026-02-20 | Report , Cryptography , Whiteboard
Introduction
In the preparation lab for this course, you have interacted with a hardware implementation of AES. This is a symmetric key algorithm, famous for its wide use in government and industry. In this report, you will produce a “whiteboarding style” interview video which explains the AES implementation provided to you in the prep lab.
Instructions
- Read and understand how the AES algorithm is implemented in the hardware system.
- Understand how each component relates to the AES algorithm.
- Produce a 5 minute video explaining how the hardware for the AES algorithm works
- (You can skip the SPI components)
- Film yourself with your phone, e.g. in front of a whiteboard
- Or use a screen recorder with something like an iPad or Android tablet
- Accessibility: If you do not have access to a suitable device, contact Hammond.
Goals
- Understand a hardware cryptography implementation
- Develop a clear understanding of how AES is implemented in hardware.
- Practice communicating complex concepts clearly and with effective presentation skills
- Use a whiteboarding-style explanation to make the cryptographic process approachable.
- Avoid unnecessary mathematical complexity while maintaining technical accuracy.
- Structure content effectively within a five-minute time limit.
- Use clear visuals, diagrams, and concise explanations.
- Demonstrate system-level thinking
- Explain how different components interact to perform encryption/decryption.
- Present the logical flow that connects algorithmic principles to hardware execution.
Deliverables
- A single link to a youtube or google drive or UNSW drive hosted video. This video should:
- Be less than or equal to five minutes long.
- Depict you, the student, with a whiteboard or similar digital technology.
- Explain AES in light but sufficient detail to provide context.
- Explain how the hardware implements AES for encryption and/or decryption in sufficient detail to provide understanding.
- You should not:
- Spend too much time covering the mathematical underpinnings of the algorithm.
- Spend too much time focusing on any one component.
- Go over five minutes in video length.
Resources
In the examples/ dir of the hackster-programmer repository is the folder spi_aes. You should have familiarised yourself with this during the “Lab 0 - Prep. Lab”. You may also find the following URL helpful: https://legacy.cryptool.org/en/cto/aes-step-by-step
Grading Rubric
VIDEO (8%):
- Criterion:
- (2%) Content Coverage:
- Poor (0.5%): Basic facts presented with minimal depth.
- Fair (1%): Covers key aspects of AES but lacks clear explanation of hardware implementation.
- Good (1.5%): Explains AES and the hardware implementation with reasonable detail but lacks depth in one or more areas.
- Excellent (2%): Clearly and concisely explains both AES and the hardware implementation, providing sufficient context and depth.
- (2%) Technical Accuracy:
- Poor (0.5%): Contains inaccuracies or lacks depth.
- Fair (1%): Mostly accurate but may include minor errors or lack precise details.
- Good (1.5%): Accurate with well-reasoned explanations but may omit some technical nuances.
- Excellent (2%): Fully accurate with clear, well-structured explanations of both the cryptographic algorithm and its hardware implementation.
- (4%) Clarity and Organization:
- Poor (1%): Poor verbal or audio clarity or video quality. Video is longer than five minutes in length. Diagrams are unclear or missing.
- Fair (2%): Video and explanation are understandable but lack polish or structure. Video may be slightly over five minutes. Diagrams are present but may be unclear or not well integrated into the explanation.
- Good (3%): Clear and well-paced explanation with good use of whiteboarding visuals, but some minor areas could be improved.
- Excellent (4%): Professionally delivered, well-structured, and visually engaging, making complex topics easy to understand. Enjoyable to watch.
- (2%) Content Coverage: