Fault Tolerant Architectures for Cryptography and Hardware Security

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Networking & Communications, Computer Security
Cover of the book Fault Tolerant Architectures for Cryptography and Hardware Security by , Springer Singapore
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9789811013874
Publisher: Springer Singapore Publication: March 29, 2018
Imprint: Springer Language: English
Author:
ISBN: 9789811013874
Publisher: Springer Singapore
Publication: March 29, 2018
Imprint: Springer
Language: English

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.  It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.  It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

More books from Springer Singapore

Cover of the book Paradigm Shift in International Economic Law Rule-Making by
Cover of the book China’s Selective Identities by
Cover of the book China’s Conquest of Taiwan in the Seventeenth Century by
Cover of the book Synthesis of Functionalized Organoboron Compounds Through Copper(I) Catalysis by
Cover of the book Relaxation of the Chemical Bond by
Cover of the book Proceedings of the Pacific Rim Statistical Conference for Production Engineering by
Cover of the book Finite Time and Cooperative Control of Flight Vehicles by
Cover of the book Atlas of Perioperative 3D Transesophageal Echocardiography by
Cover of the book Governance and Governed by
Cover of the book Control Oriented Modelling of AC Electric Machines by
Cover of the book High-level Political Appointments in the Philippines by
Cover of the book A Transnational Feminist View of Surrogacy Biomarkets in India by
Cover of the book Proceedings of the Tiangong-2 Remote Sensing Application Conference by
Cover of the book Perceptual Image Coding with Discrete Cosine Transform by
Cover of the book Proceedings of 2019 Chinese Intelligent Automation Conference by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy