- Добавил: literator
- Дата: 10-08-2024, 21:02
- Комментариев: 0
Название: Cryptography and Embedded Systems Security
Автор: Xiaolu Hou, Jakub Breier
Издательство: Springer
Год: 2024
Страниц: 516
Язык: английский
Формат: pdf (true), epub
Размер: 53.3 MB
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security – side-channel attacks, and fault injection attacks, together with the protection methods used against both. To study attacks on cryptographic algorithms, we need to first understand the computations that are carried out in each step of those algorithms. To achieve this, we need knowledge of certain math concepts. In the Chapter 1, we will introduce the necessary mathematical background for the rest of the book, including abstract algebra, linear algebra, coding theory, and probability theory.
Автор: Xiaolu Hou, Jakub Breier
Издательство: Springer
Год: 2024
Страниц: 516
Язык: английский
Формат: pdf (true), epub
Размер: 53.3 MB
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security – side-channel attacks, and fault injection attacks, together with the protection methods used against both. To study attacks on cryptographic algorithms, we need to first understand the computations that are carried out in each step of those algorithms. To achieve this, we need knowledge of certain math concepts. In the Chapter 1, we will introduce the necessary mathematical background for the rest of the book, including abstract algebra, linear algebra, coding theory, and probability theory.