Automated Methods in Cryptographic Fault Analysis

Automated Methods in Cryptographic Fault Analysis

Author: Jakub Breier

Publisher: Springer

Published: 2019-03-19

Total Pages: 342

ISBN-13: 3030113337

DOWNLOAD EBOOK

This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.


Classical and Physical Security of Symmetric Key Cryptographic Algorithms

Classical and Physical Security of Symmetric Key Cryptographic Algorithms

Author: Anubhab Baksi

Publisher: Springer Nature

Published: 2022-01-01

Total Pages: 295

ISBN-13: 9811665222

DOWNLOAD EBOOK

This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse—it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography.


Security and Privacy

Security and Privacy

Author: Pantelimon Stănică

Publisher: Springer Nature

Published: 2021-11-09

Total Pages: 155

ISBN-13: 3030905535

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: ​Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.


Fault Tolerant Architectures for Cryptography and Hardware Security

Fault Tolerant Architectures for Cryptography and Hardware Security

Author: SIKHAR PATRANABIS

Publisher: Springer

Published: 2018-03-29

Total Pages: 242

ISBN-13: 981101387X

DOWNLOAD EBOOK

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.


Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications

Author: Vincent Grosso

Publisher: Springer Nature

Published: 2022-03-08

Total Pages: 315

ISBN-13: 3030973484

DOWNLOAD EBOOK

This book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic. The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations.


Data Protection and Privacy in Healthcare

Data Protection and Privacy in Healthcare

Author: Ahmed Elngar

Publisher: CRC Press

Published: 2021-03-09

Total Pages: 269

ISBN-13: 1000349314

DOWNLOAD EBOOK

The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient’s record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.


XIV International Scientific Conference “INTERAGROMASH 2021"

XIV International Scientific Conference “INTERAGROMASH 2021

Author: Alexey Beskopylny

Publisher: Springer Nature

Published: 2021-10-30

Total Pages: 940

ISBN-13: 3030816192

DOWNLOAD EBOOK

This book contains original and fundamental research papers in the following areas: engineering technologies for precision agriculture, agricultural systems management and digitalization in agriculture, logistics in agriculture, and other topics. Selected materials of the largest regional scientific event—INTERAGROMASH 2021 conference–included in this book present the results of the latest research in the areas of precision agriculture and agricultural machinery industry. The book is aimed for professionals and practitioners, for researchers, scholars, and producers. The materials presented here are used in the educational process at specific agricultural universities or during vocational training at enterprises and become an indispensable helper to farm managers in making the best agronomic decisions. The book is also useful for representatives of regional authorities, as it gives an idea of existing high-tech solutions for agriculture.


Trustworthy Hardware Design: Combinational Logic Locking Techniques

Trustworthy Hardware Design: Combinational Logic Locking Techniques

Author: Muhammad Yasin

Publisher: Springer Nature

Published: 2019-09-04

Total Pages: 157

ISBN-13: 3030153347

DOWNLOAD EBOOK

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book have contributed to this field significantly through numerous fundamental papers.


Cryptographic Protocol

Cryptographic Protocol

Author: Ling Dong

Publisher: Springer Science & Business Media

Published: 2012-06-20

Total Pages: 379

ISBN-13: 3642240739

DOWNLOAD EBOOK

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism’s efficiency, rigorousness, and the possibility of its automation are also presented. The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world. Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.