Fault Analysis in Cryptography

Fault Analysis in Cryptography

 

136,53 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2014
ISBN:
9783642436772
136,53 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.

Artículos relacionados

  • Transformation of Knowledge, Information and Data
    Patrick Van Bommel
    ...
  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
    Disponible

    274,88 €

  • Accelerate Model Training with PyTorch 2.X
    Maicon Melo Alves
    Dramatically accelerate the building process of complex models using PyTorch to extract the best performance from any computing environmentKey Features- Reduce the model-building time by applying optimization techniques and approaches- Harness the computing power of multiple devices and machines to boost the training process- Focus on model quality by quickly evaluating differe...
    Disponible

    64,00 €

  • Information Theory for Data Science
    Changho Suh
    Information theory deals with mathematical laws that govern the flow, representation and transmission of information, just as the field of physics concerns laws that govern the behavior of the physical universe. The foundation was made in the context of communication while characterizing the fundamental limits of communication and offering codes (sometimes called algorithms) to...
  • Theory of Decision Under Uncertainty
    Itzhak Gilboa
    ...
    Disponible

    49,52 €