𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cryptography and Embedded Systems Security

✍ Scribed by Xiaolu Hou, Jakub Breier


Publisher
Springer
Year
2024
Tongue
English
Leaves
526
Edition
2024
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security – side-channel attacks, and fault injection attacks, together with the protection methods used against both.

✦ Table of Contents


Foreword
Preface
Acknowledgment
Contents
List of Figures
List of Tables
List of Algorithms
1 Mathematical and Statistical Background
1.1 Preliminaries
1.1.1 Sets
1.1.2 Functions
1.1.3 Integers
1.2 Abstract Algebra
1.2.1 Groups
1.2.2 Rings
1.2.3 Fields
1.3 Linear Algebra
1.3.1 Matrices
1.3.2 Vector Spaces
1.4 Modular Arithmetic
1.4.1 Solving Linear Congruences
1.5 Polynomial Rings
1.5.1 Bytes
1.6 Coding Theory
1.7 Probability Theory
1.7.1 pdf-Algebras
1.7.2 Probabilities
1.7.3 Random Variables
1.8 Statistics
1.8.1 Important Distributions
1.8.2 Estimating Mean and Difference of Means of Normal Distributions
1.8.3 Hypothesis Testing
1.9 Further Reading
2 Introduction to Cryptography
2.1 Cryptographic Primitives
2.1.1 Hash Functions
2.1.2 Cryptosystems
2.1.2.1 Converting Message to Plaintext
2.1.3 Security of Cryptosystems
2.2 Classical Ciphers
2.2.1 Shift Cipher
2.2.2 Affine Cipher
2.2.3 Substitution Cipher
2.2.4 Vigenère Cipher
2.2.5 Hill Cipher
2.2.6 Cryptanalysis of Classical Ciphers
2.2.6.1 Frequency Analysis
2.2.6.2 Kasiski Test: Vigenère Cipher
2.2.6.3 Index of Coincidence: Vigenère Cipher
2.2.7 One-Time Pad
2.3 Encryption Modes
2.4 Further Reading
3 Modern Cryptographic Algorithms and Their Implementations
3.1 Symmetric Block Ciphers
3.1.1 DES
3.1.2 AES
3.1.3 PRESENT
3.2 Implementations of Symmetric Block Ciphers
3.2.1 Implementing Sboxes
3.2.2 Implementing Permutations
3.2.2.1 Implementing pLayer
3.2.2.2 AES T-tables
3.2.3 Bitsliced Implementations
3.2.3.1 Algebraic Normal Form
3.2.3.2 Bitsliced Implementation of PRESENT
3.3 RSA
3.4 RSA Signatures
3.5 Implementations of RSA Cipher and RSA Signatures
3.5.1 Implementing Modular Exponentiation
3.5.1.1 Square and Multiply Algorithm
3.5.1.2 Montgomery Powering Ladder
3.5.1.3 Chinese Remainder Theorem (CRT) Based RSA
3.5.2 Implementing Modular Multiplication
3.5.2.1 Blakely's Method
3.5.2.2 Montgomery's Method
3.6 Further Reading
4 Side-Channel Analysis Attacks and Countermeasures
4.1 Experimental Setting
4.1.1 Attack Methods
4.2 Side-Channel Leakages
4.2.1 Distribution of the Leakage
4.2.2 Estimating Leakage Distributions
4.2.3 Leakage Assessment
4.2.4 Signal-to-Noise Ratio
4.3 Side-Channel Analysis Attacks on Symmetric Block Ciphers
4.3.1 Non-profiled Differential Power Analysis Attacks
4.3.1.1 Non-profiled DPA Attack Steps
4.3.1.2 Identity Leakage Model
4.3.1.3 Hamming Weight Leakage Model
4.3.2 Profiled Differential Power Analysis
4.3.2.1 Profiled DPA Attack Steps
4.3.2.2 Stochastic Leakage Model
4.3.2.3 Template-Based DPA
4.3.2.4 Success Rate and Guessing Entropy
4.3.3 Side-Channel Assisted Differential Plaintext Attack
4.4 Side-Channel Analysis Attacks on RSA and RSA Signatures
4.4.1 Simple Power Analysis
4.4.2 Differential Power Analysis
4.5 Countermeasures Against Side-Channel Analysis Attacks
4.5.1 Hiding
4.5.1.1 Encoding-Based Countermeasure for Symmetric Block Ciphers
4.5.1.2 Square and Multiply Always
4.5.2 Masking and Blinding
4.5.2.1 Introduction to Boolean Masking
4.5.2.2 Boolean Masking for AES-128
4.5.2.3 Boolean Masking for PRESENT
4.5.2.4 Blinding for RSA and RSA Signatures
4.6 Further Reading
4.6.1 AI-Assisted SCA
5 Fault Attacks and Countermeasures
5.1 Fault Attacks on Symmetric Block Ciphers
5.1.1 Differential Fault Analysis
5.1.1.1 DFA on DES
5.1.1.2 Diagonal DFA on AES-128
5.1.2 Statistical Fault Analysis
5.1.2.1 SFA Attack on AES-128 Round 9
5.1.2.2 SFA on AES-128 Round 8
5.1.3 Persistent Fault Analysis
5.1.4 Implementation-Specific Fault Attack
5.2 Fault Countermeasures for Symmetric Block Ciphers
5.2.1 Encoding-Based Countermeasure
5.2.2 Infective Countermeasure
5.3 Fault Attacks on RSA and RSA Signatures
5.3.1 Bellcore Attack
5.3.2 Attack on the Square and Multiply Algorithm
5.3.3 Attack on the Public Key
5.3.4 Safe Error Attack
5.3.4.1 Safe Error Attack on the Montgomery Powering Ladder
5.3.4.2 Safe Error Attack on the Square and Multiply Algorithm
5.4 Fault Countermeasures for RSA and RSA Signatures
5.4.1 Shamir's Countermeasure
5.4.2 Infective Countermeasure
5.4.3 Countermeasure for Attacks on the Square and Multiply Algorithm
5.4.4 Countermeasures Against the Safe Error Attack
5.5 Further Reading
6 Practical Aspects of Physical Attacks
6.1 Side-Channel Attacks
6.1.1 Origins of Leakage
6.1.2 Measurement Setup
6.1.2.1 Oscilloscopes
6.1.2.2 Probes
6.2 Fault Attacks
6.2.1 Fault Injection Techniques
6.2.1.1 Clock/Voltage Glitching
6.2.1.2 Optical Fault Injection
6.2.1.3 Electromagnetic Fault Injection
6.2.1.4 Rowhammer Attacks
6.3 Industry Standards
6.3.1 Common Criteria
6.3.2 FIPS 140-3
A Proofs
A.1 Matrices
A.2 Invertible Matrices for the Stochastic Leakage Model
B Long Division
C DES Sbox
D Algebraic Normal Forms for PRESENT Sbox Output Bits
E Encoding-Based Countermeasure for Symmetric Block Ciphers
References
Index


πŸ“œ SIMILAR VOLUMES


Cryptography and Embedded Systems Securi
✍ Xiaolu Hou, Jakub Breier πŸ“‚ Library πŸ“… 2024 πŸ› Springer 🌐 English

<p><span>This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption al

Cryptography and Embedded Systems Securi
✍ Xiaolu Hou, Jakub Breier πŸ“‚ Library πŸ“… 2024 πŸ› Springer 🌐 English

<p><span>This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption al

Embedded Systems Security
πŸ“‚ Library πŸ“… 2012 πŸ› Newnes 🌐 English

</div><div class='box-content'><ul><li><p><span class=''review_text''><P/><IT>''Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology.

Embedded Systems Security
πŸ“‚ Library πŸ“… 2012 πŸ› Newnes

</div><div class='box-content'><ul><li><p><span class="review_text"><P/><IT>"Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology."--

Embedded Systems Security: Practical Met
✍ David Kleidermacher, Mike Kleidermacher πŸ“‚ Library πŸ“… 2012 πŸ› Newnes 🌐 English

<p><span>The ultimate resource for making embedded systems reliable, safe, and secure</span></p><p><span>Embedded Systems Security provides:</span></p><ul></ul><p></p><ul><li><span><span>A broad understanding of security principles, concerns, and technologies</span></span></li></ul><p></p><ul><li><s

Embedded Multimedia Security Systems: Al
✍ Amit Pande, Joseph Zambreno (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag London 🌐 English

<p>Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features