Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
|
Buy Now
Fault Analysis in Cryptography (Paperback, 2012 ed.)
Loot Price: R2,950
Discovery Miles 29 500
|
|
Fault Analysis in Cryptography (Paperback, 2012 ed.)
Series: Information Security and Cryptography
Expected to ship within 10 - 15 working days
|
In the 1970s researchers noticed that radioactive particles
produced by elements naturally present in packaging material could
cause bits to flip in sensitive areas of electronic chips. Research
into the effect of cosmic rays on semiconductors, an area of
particular interest in the aerospace industry, led to methods of
hardening electronic devices designed for harsh environments.
Ultimately various mechanisms for fault creation and propagation
were discovered, and in particular it was noted that many
cryptographic algorithms succumb to so-called fault attacks.
Preventing fault attacks without sacrificing performance is
nontrivial and this is the subject of this book. Part I deals with
side-channel analysis and its relevance to fault attacks. The
chapters in Part II cover fault analysis in secret key
cryptography, with chapters on block ciphers, fault analysis of DES
and AES, countermeasures for symmetric-key ciphers, and
countermeasures against attacks on AES. Part III deals with fault
analysis in public key cryptography, with chapters dedicated to
classical RSA and RSA-CRT implementations, elliptic curve
cryptosystems and countermeasures using fault detection, devices
resilient to fault injection attacks, lattice-based fault attacks
on signatures, and fault attacks on pairing-based cryptography.
Part IV examines fault attacks on stream ciphers and how faults
interact with countermeasures used to prevent power analysis
attacks. Finally, Part V contains chapters that explain how fault
attacks are implemented, with chapters on fault injection
technologies for microprocessors, and fault injection and key
retrieval experiments on a widely used evaluation board. This is
the first book on this topic and will be of interest to researchers
and practitioners engaged with cryptographic engineering.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.