Prouff E. Embedded Cryptography 1 2025
上传时间
2025-02-09
大小
25.11 MB
文件数
1
做种者
5
下载者
17
哈希值
C99767174588103BB91BBDFEB0EFE462851D0040

Textbook in PDF format

Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 1 is dedicated to software side-channel attacks, hardware side-channel attacks and fault injection attacks. The field of embedded cryptography, as a research domain, was born in the mid-1990s. Until that time, the evaluation of a cryptosystem and the underlying attacker model were usually agnostic of implementation aspects, whether the cryptosystem was deployed on a computer or on some embedded hardware like a smart card. Indeed, the attacker was assumed to have no other information than the final results of a computation and, possibly, the corresponding inputs. In this black box context, defining a cryptanalytic attack and evaluating resistance to it essentially consisted of finding flaws in the abstract definition of the cryptosystem. In the 1990s, teams of researchers published the first academic results, highlighting very effective means of attack against embedded systems. These attacks were based on the observation that a system’s behavior during a computation strongly depends on the values of the data manipulated (which was previously known and exploited by intelligence services). Consequently, a device performing cryptographic computation does not behave like a black box whose inputs and outputs are the only known factors. The power consumption of the device, its electromagnetic radiation or its running time are indeed other sources that provide the observer with information on the intermediate results of the computation. Teams of researchers have also shown that it was possible to disrupt a computation using external energy sources such as lasers or electromagnetic pulses. Preface Software Side-Channel Attacks Timing Attacks Microarchitectural Attacks Hardware Side-Channel Attacks Leakage and Attack Tools Supervised Attacks Unsupervised Attacks Quantities to Judge Side Channel Resilience Countermeasures and Advanced Attacks Mode-Level Side-Channel Countermeasures Fault Injection Attacks An Introduction to Fault Injection Attacks Fault Attacks on Symmetric Cryptography Fault Attacks on Public-key Cryptographic Algorithms Fault Countermeasures List of Authors Index

Gomagnet 2023.
数据来自Pirate Bay。