Advertisement

Fault Tolerant Architectures for Cryptography and Hardware Security

  • SIKHAR PATRANABIS
  • Debdeep Mukhopadhyay

Part of the Computer Architecture and Design Methodologies book series (CADM)

Table of contents

  1. Front Matter
    Pages i-xii
  2. Fault Attacks: A Preamble

    1. Front Matter
      Pages 1-1
    2. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 3-8
    3. Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
      Pages 9-45
  3. Side-Channel Inspired and Assisted Fault Analysis Techniques

    1. Front Matter
      Pages 47-47
    2. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 49-58
    3. Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
      Pages 59-77
  4. Advanced Fault Analysis Techniques and Fault Analysis Automation

    1. Front Matter
      Pages 79-79
    2. Jakub Breier, Dirmanto Jap, Chien-Ning Chen
      Pages 81-110
    3. Sarani Bhattacharya, Debdeep Mukhopadhyay
      Pages 111-135
    4. Sayandeep Saha, Debdeep Mukhopadhyay
      Pages 137-167
  5. Countermeasures Against Fault Analysis Techniques

    1. Front Matter
      Pages 169-169
    2. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 171-182
    3. Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
      Pages 183-195
    4. Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 197-211
    5. Jakub Breier, Wei He, Shivam Bhasin
      Pages 213-229
  6. Back Matter
    Pages 231-240

About this book

Introduction

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Keywords

Fault Analysis Cryptography Fault Countermeasure Hardware Security Fault Analysis Block Ciphers Fault Analysis Stream Ciphers Side Channel Security AES-128 Fault Tolerant Design Fault Analysis Automation Gröbner Basis Attacks Multivariate Public Key Cryptosystems

Editors and affiliations

  • SIKHAR PATRANABIS
    • 1
  • Debdeep Mukhopadhyay
    • 2
  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology KharagpurKharagpurIndia
  2. 2.Department of Computer Science and EngineeringIndian Institute of Technology KharagpurKharagpurIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-10-1387-4
  • Copyright Information Springer Nature Singapore Pte Ltd. 2018
  • Publisher Name Springer, Singapore
  • eBook Packages Engineering
  • Print ISBN 978-981-10-1386-7
  • Online ISBN 978-981-10-1387-4
  • Series Print ISSN 2367-3478
  • Series Online ISSN 2367-3486
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering