Xiaolu H. Cryptography and Embedded Systems Security 2024
- Type:
- Other > E-books
- Files:
- 1
- Size:
- 17.62 MiB (18476013 Bytes)
- Uploaded:
- 2024-08-12 10:46 GMT
- By:
- andryold1
- Seeders:
- 55
- Leechers:
- 2
- Info Hash: BA1425C686FAA9F93C685D56BF35E4F6291D34D7
Textbook in PDF format This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security – side-channel attacks, and fault injection attacks, together with the protection methods used against both. Table of Contents: Mathematical and Statistical Background Introduction to Cryptography Modern Cryptographic Algorithms and Their Implementations Side-Channel Analysis Attacks and Countermeasures Fault Attacks and Countermeasures Practical Aspects of Physical Attacks Proofs Long Division DES Sbox Algebraic Normal Forms for PRESENT Sbox Output Bits Encoding-Based Countermeasure for Symmetric Block Ciphers References Index