Timing Channels in Cryptography

A Micro-Architectural Perspective

Nonfiction, Computers, Advanced Computing, Theory, Science & Nature, Technology, Electronics
Cover of the book Timing Channels in Cryptography by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya ISBN: 9783319123707
Publisher: Springer International Publishing Publication: December 12, 2014
Imprint: Springer Language: English
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
ISBN: 9783319123707
Publisher: Springer International Publishing
Publication: December 12, 2014
Imprint: Springer
Language: English

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

More books from Springer International Publishing

Cover of the book Knowledge Management in Organizations by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Technology and the Environment in State-Socialist Hungary by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Cormac McCarthy’s Philosophy by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book The Vienna Circle by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – ISAT 2017 by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book New Developments in Civil and Commercial Mediation by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Producing History in Spanish Civil War Exhumations by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Software Engineering Research, Management and Applications by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Recursion: Complexity in Cognition by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Statistical Theory and Inference by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Wittgenstein, Mathematics and World by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Evolution of Karst in the Lower Part of Crna Reka River Basin by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Seismic Behavior of Steel Storage Pallet Racking Systems by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Self-Oscillations in Dynamic Systems by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Ethical Reasoning in Big Data by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy