Vtome.ru - электронная библиотека

Cryptography and Embedded Systems Security

  • Добавил: literator
  • Дата: 10-08-2024, 21:02
  • Комментариев: 0
Название: Cryptography and Embedded Systems Security
Автор: Xiaolu Hou, Jakub Breier
Издательство: Springer
Год: 2024
Страниц: 516
Язык: английский
Формат: pdf (true), epub
Размер: 53.3 MB

This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security – side-channel attacks, and fault injection attacks, together with the protection methods used against both.

To study attacks on cryptographic algorithms, we need to first understand the computations that are carried out in each step of those algorithms. To achieve this, we need knowledge of certain math concepts. In the Chapter 1, we will introduce the necessary mathematical background for the rest of the book, including abstract algebra, linear algebra, coding theory, and probability theory.

Before we dive into the modern cryptographic algorithms that are in use today, we give an introduction to cryptography in general and discuss some classical ciphers that were designed a few centuries back. In the end, we will discuss how cryptographic algorithms are actually used with different encryption modes. Cryptography studies techniques that allow secure communication in the presence of adversarial behavior. These techniques are related to information security attributes such as confidentiality, integrity, authentication, and non-repudiation.

CIA Triad is a widely utilized information security model, where the abbreviation stands for confidentiality, integrity, and availability. Therefore, a curious reader might be interested in knowing why we did not mention the availability. The answer is rather simple—there are no techniques within cryptography that could contribute in one way or another to ensure availability. Availability attribute ensures that information is consistently and readily accessible for authorized entities. One needs to look into other means of supporting this attribute.

Скачать Cryptography and Embedded Systems Security



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.