The services and security benefits provided by cryptographic algorithms are indispensable for modern electronic infrastructure. To provide benefit to a larger system, however, the algorithms themselves must be implemented securely. Devices implementing cryptographic algorithms can leak secret information to any observer through side channels limiting their security. Powerful attacks have been developed with conscientiously exploit the side information to completely compromise the security of an implementation within minutes. This thesis investigates the sources of vulnerabilities and proposed counter measures against attacks which use power consumption and behavior in the presence of faults of a device as the target for an attack. The proposed counter measures for the power and fault attacks are based on the non linear error-detecting codes known as robust codes and a synchronous gate level circuit structures.
Secure Hardware Design (Paperback)
info:
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here, and we have not verified it. Â
Specifications
Book format
Paperback
Fiction/nonfiction
Non-Fiction
Genre
Technology & Engineering/Electronics - General
Publication date
April, 2010
Warranty
Warranty information
Please be aware that the warranty terms on items offered for sale by third party Marketplace sellers may differ from those displayed in this section (if any). To confirm warranty terms on an item offered for sale by a third party Marketplace seller, please use the 'Contact seller' feature on the third party Marketplace seller's information page and request the item's warranty terms prior to purchase.