𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Fault Tolerant Architectures for Cryptography and Hardware Security

✍ Scribed by SIKHAR PATRANABIS, Debdeep Mukhopadhyay


Publisher
Springer Singapore
Year
2018
Tongue
English
Leaves
242
Series
Computer Architecture and Design Methodologies
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

✦ Table of Contents


Front Matter ....Pages i-xii
Front Matter ....Pages 1-1
Introduction to Fault Attacks (Sikhar Patranabis, Debdeep Mukhopadhyay)....Pages 3-8
Classical Fault Attacks on Public and Symmetric-Key Cryptosystems (Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay)....Pages 9-45
Front Matter ....Pages 47-47
Side-Channel Inspired Fault Analysis Techniques (Sikhar Patranabis, Debdeep Mukhopadhyay)....Pages 49-58
Side-Channel Assisted Fault Analysis (Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin)....Pages 59-77
Front Matter ....Pages 79-79
Laser-Based Fault Injection on Microcontrollers (Jakub Breier, Dirmanto Jap, Chien-Ning Chen)....Pages 81-110
Advanced Fault Attacks in Software: Exploiting the Rowhammer Bug (Sarani Bhattacharya, Debdeep Mukhopadhyay)....Pages 111-135
Automation of Fault Analysis (Sayandeep Saha, Debdeep Mukhopadhyay)....Pages 137-167
Front Matter ....Pages 169-169
Classical Countermeasures Against Differential Fault Analysis (Sikhar Patranabis, Debdeep Mukhopadhyay)....Pages 171-182
Fault Space Transformation: Countering Biased Fault Attacks (Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti)....Pages 183-195
Infective Countermeasures Against Fault Analysis (Sikhar Patranabis, Debdeep Mukhopadhyay)....Pages 197-211
Reactive Design Strategies Against Fault Injection Attacks (Jakub Breier, Wei He, Shivam Bhasin)....Pages 213-229
Back Matter ....Pages 231-240

✦ Subjects


Engineering; Circuits and Systems; Data Encryption; Security Science and Technology


πŸ“œ SIMILAR VOLUMES


Hardware and Software Architectures for
✍ Ram Chillarege (auth.), Michel BanΓ’tre, Peter A. Lee (eds.) πŸ“‚ Library πŸ“… 1994 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Fault tolerance has been an active research area for many years. This volume presents papers from a workshop held in 1993 where a small number of key researchers and practitioners in the area met to discuss the experiences of industrial practitioners, to provide a perspective on the state of the

Cryptography Arithmetic: Algorithms and
✍ Amos R. Omondi πŸ“‚ Library πŸ“… 2020 πŸ› Springer-Nature New York Inc 🌐 English

<div><div>Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation&amp;nbsp;involve much&

Cryptography Arithmetic: Algorithms and
✍ Amos R. Omondi πŸ“‚ Library πŸ“… 2020 πŸ› Springer Nature 🌐 English

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic

Cryptography Arithmetic: Algorithms and
✍ Amos R. Omondi πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

<div><div>Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementationΒ involve muchΒ computer

Software-Implemented Hardware Fault Tole
✍ Olga Goloubeva, Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

This book presents the theory behind software-implemented hardware fault tolerance, as well as the practical aspects needed to put it to work on real examples. By evaluating accurately the advantages and disadvantages of the already available approaches, the book provides a guide to developers willi

Software-Implemented Hardware Fault Tole
✍ Dr. Olga Goloubeva, Prof. Maurizio Rebaudengo, Prof. Matteo Sonza Reorda, Dr. Ma πŸ“‚ Library πŸ“… 2006 πŸ› Springer US 🌐 English

<p><P>Software-Implemented Hardware Fault Tolerance addresses the innovative topic of software-implemented hardware fault tolerance (SIHFT), i.e., how to deal with faults affecting the hardware by only (or mainly) acting on the software.</P><P>The first SIHFT techniques were proposed and adopted sev