Timing Channels in Cryptography

A Micro-Architectural Perspective

Nonfiction, Computers, Advanced Computing, Theory, Science & Nature, Technology, Electronics
Cover of the book Timing Channels in Cryptography by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya ISBN: 9783319123707
Publisher: Springer International Publishing Publication: December 12, 2014
Imprint: Springer Language: English
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
ISBN: 9783319123707
Publisher: Springer International Publishing
Publication: December 12, 2014
Imprint: Springer
Language: English

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

More books from Springer International Publishing

Cover of the book Neuroimmune Pharmacology by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Type-2 Fuzzy Neural Networks and Their Applications by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Ted Hughes, Nature and Culture by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Taxation in European Union by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Computational Diffusion MRI by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Human-Computer Interaction. User Interface Design, Development and Multimodality by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Micromechanics of Materials, with Applications by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Multiprocessor Scheduling for Real-Time Systems by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Maxillofacial Imaging by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Approximation by Max-Product Type Operators by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book The Myths of Health Care by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Proceedings of ELM-2015 Volume 1 by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book All Sides to an Oval by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book The Decision to Delist from the Stock Market by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Wireless Communication Electronics by Example by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy