Advertisement

© 2018

Fault Tolerant Architectures for Cryptography and Hardware Security

  • SIKHAR PATRANABIS
  • Debdeep Mukhopadhyay
Book

Part of the Computer Architecture and Design Methodologies book series (CADM)

Table of contents

  1. Front Matter
    Pages i-xii
  2. Fault Attacks: A Preamble

    1. Front Matter
      Pages 1-1
    2. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 3-8
    3. Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
      Pages 9-45
  3. Side-Channel Inspired and Assisted Fault Analysis Techniques

    1. Front Matter
      Pages 47-47
    2. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 49-58
    3. Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
      Pages 59-77
  4. Advanced Fault Analysis Techniques and Fault Analysis Automation

    1. Front Matter
      Pages 79-79
    2. Jakub Breier, Dirmanto Jap, Chien-Ning Chen
      Pages 81-110
    3. Sarani Bhattacharya, Debdeep Mukhopadhyay
      Pages 111-135
    4. Sayandeep Saha, Debdeep Mukhopadhyay
      Pages 137-167
  5. Countermeasures Against Fault Analysis Techniques

    1. Front Matter
      Pages 169-169
    2. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 171-182
    3. Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
      Pages 183-195
    4. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 197-211
    5. Jakub Breier, Wei He, Shivam Bhasin
      Pages 213-229
  6. Back Matter
    Pages 231-240

About this book

Introduction

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Keywords

Fault Analysis Cryptography Fault Countermeasure Hardware Security Fault Analysis Block Ciphers Fault Analysis Stream Ciphers Side Channel Security AES-128 Fault Tolerant Design Fault Analysis Automation Gröbner Basis Attacks Multivariate Public Key Cryptosystems

Editors and affiliations

  • SIKHAR PATRANABIS
    • 1
  • Debdeep Mukhopadhyay
    • 2
  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology KharagpurKharagpurIndia
  2. 2.Department of Computer Science and EngineeringIndian Institute of Technology KharagpurKharagpurIndia

About the editors

Sikhar Patranabis is a PhD student in the Department of Computer Science and Engineering, Indian Institute of Technology at Kharagpur, India. Prior to this, he obtained his BTech degree in Computer Science and Engineering, from IIT Kharagpur in the year 2015. His research interests include Fault Analysis of Ciphers, Side Channel Attacks, Hardware Security, and Secured data sharing protocols for the cloud. He is the recipient of the prestigious President Gold Medal for securing the highest grade point among all the outgoing students of the batch of 2015.

Debdeep Mukhopadhyay is currently an Associate Professor at the Department of Computer Science and Engineering, Indian Institute of Technology at Kharagpur, India. At IIT Kharagpur he initiated the Secured Embedded Architecture Laboratory (SEAL), with a focus on Embedded Security and Side Channel Attacks. Prior to this, he worked as a visiting Associate Professor of NYU-Shanghai. He had also served as an Assistant Professor at IIT Madras, India and as a Visiting Researcher at NYU Polytechnic School of Engineering under the Indo-US STF Fellowship. He holds a PhD, an MS, and a B. Tech from IIT Kharagpur, India. Mukhopadhyay’s research interests are Cryptography, Hardware Security, and VLSI. His books include Cryptography and Network Security (Mc Graw Hills), Hardware Security: Design, Threats, and Safeguards (CRC Press), and Timing Channels in Cryptography (Springer). He has written more than 100 papers in peer-reviewed conferences and journals and has collaborated with several Indian and Foreign Organizations. Mukhopadhyay is the recipient of the prestigious Young Scientist award from the Indian National Science Academy, the Young Engineer award from the Indian National Academy of Engineers, and is the Young Associate of the Indian Academy of Science. He was also awarded the Outstanding Young Faculty fellowship in 2011 from IIT Kharagpur, and the Techno-Inventor Best PhD award by the Indian Semiconductor Association.

Bibliographic information

  • Book Title Fault Tolerant Architectures for Cryptography and Hardware Security
  • Editors SIKHAR PATRANABIS
    Debdeep Mukhopadhyay
  • Series Title Computer Architecture and Design Methodologies
  • Series Abbreviated Title Computer Architecture and Design Methodologies
  • DOI https://doi.org/10.1007/978-981-10-1387-4
  • Copyright Information Springer Nature Singapore Pte Ltd. 2018
  • Publisher Name Springer, Singapore
  • eBook Packages Engineering Engineering (R0)
  • Hardcover ISBN 978-981-10-1386-7
  • Softcover ISBN 978-981-13-3819-9
  • eBook ISBN 978-981-10-1387-4
  • Series ISSN 2367-3478
  • Series E-ISSN 2367-3486
  • Edition Number 1
  • Number of Pages XII, 240
  • Number of Illustrations 36 b/w illustrations, 39 illustrations in colour
  • Topics Circuits and Systems
    Cryptology
    Security Science and Technology
  • Buy this book on publisher's site
Industry Sectors
Automotive
Biotechnology
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering