HUDU

Differential Power-Analysis Attacks


€ 49,00
 
kartoniert
Lieferbar innerhalb von 2-3 Tagen
November 2013

Beschreibung

Beschreibung

Implementations of theoretically secure cryptographic algorithms can be broken by side-channel attacks. In particular, block ciphers have turned out to be very susceptible to differential power-analysis (DPA) attacks. Various methods to prevent these attacks have been proposed so far. This book is about countermeasures against DPA attacks, which can be easily implemented in a standard CMOS design flow. In particular, the work focuses on the insertion of dummy operations, on the randomization of operands and on the generation of noise. The effectiveness and the costs of these countermeasures are analyzed. In addition, an ASIC design implementing these countermeasures is presented. The design is a strong authentication module using AES equipped with the countermeasures. First measurement results of this design based on an FPGA prototype are also part of this book. Not only researchers in the area of cryptography and security are addressed by this work but also hardware security designers. Implementations of theoretically secure cryptographic algorithms can be broken by side-channel attacks. In particular, block ciphers have turned out to be very susceptible to differential power-analysis (DPA) attacks. Various methods to prevent these attacks have been proposed so far. This book is about countermeasures against DPA attacks, which can be easily implemented in a standard CMOS design flow. In particular, the work focuses on the insertion of dummy operations, on the randomization of operands and on the generation of noise. The effectiveness and the costs of these countermeasures are analyzed. In addition, an ASIC design implementing these countermeasures is presented. The design is a strong authentication module using AES equipped with the countermeasures. First measurement results of this design based on an FPGA prototype are also part of this book. Not only researchers in the area of cryptography and security are addressed by this work but also hardware security designers.

Portrait

Stefan Achleitner, born in Vorarlberg (Austria), studied computer science at Graz University of Technology. He specialized in hardware security and cryptography. After completing his thesis at the Swiss Federal Institute of Technology Zurich, he began working as a consultant for Roland Berger Strategy Consultants in Vienna.
EAN: 9783836446167
ISBN: 3836446162
Untertitel: A Practical Example for Hardware Countermeasures Protecting Cryptographic Circuits. Paperback.
Verlag: VDM Verlag Dr. Müller e.K.
Erscheinungsdatum: November 2013
Seitenanzahl: 84 Seiten
Format: kartoniert
Es gibt zu diesem Artikel noch keine Bewertungen.Kundenbewertung schreiben