Hardware Security. (2014)
- Record Type:
- Book
- Title:
- Hardware Security. (2014)
- Main Title:
- Hardware Security.
- Other Names:
- Mukhopadhyay, Debdeep
- Contents:
- Part I Mathematical Background Introduction Modular Arithmetic Groups, Rings, and Fields Greatest Common Divisors and Multiplicative Inverse Subgroups, Subrings, and Extensions Groups, Rings, and Field Isomorphisms Polynomials and Fields Construction of Galois Field Extensions of Fields Cyclic Groups of Group Elements Efficient Galois Fields Mapping between Binary and Composite Fields Conclusions Overview of Modern Cryptography Introduction Cryptography: Some Technical Details Block Ciphers Rijndael in Composite Field Elliptic Curves Scalar Multiplications: LSB First and MSB First Approaches Montgomery’s Algorithm for Scalar Multiplication Inversions Conclusions Modern Hardware Design Practices Introduction Components of a Hardware Architecture: Mapping an Algorithm to Hardware Case Study: Binary gcd Processor Enhancing the Performance of a Hardware Design Modelling of the Computational Elements of the gcd Processor Experimental Results Conclusions Hardware Design of the Advanced Encryption Standard (AES) Introduction Algorithmic and Architectural Optimizations for AES Design Circuit for the AES S-Box Implementation of the Mix Column Transformation An Example Reconfigurable Design for the Rijndael Cryptosystem Experimental Results Single Chip Encryptor/Decryptor Conclusions Efficient Design of Finite Field Arithmetic on FPGAs Introduction Finite Field Multiplier Finite Field Multipliers for High Performance Applications Karatsuba Multiplication Karatsuba Multipliers forPart I Mathematical Background Introduction Modular Arithmetic Groups, Rings, and Fields Greatest Common Divisors and Multiplicative Inverse Subgroups, Subrings, and Extensions Groups, Rings, and Field Isomorphisms Polynomials and Fields Construction of Galois Field Extensions of Fields Cyclic Groups of Group Elements Efficient Galois Fields Mapping between Binary and Composite Fields Conclusions Overview of Modern Cryptography Introduction Cryptography: Some Technical Details Block Ciphers Rijndael in Composite Field Elliptic Curves Scalar Multiplications: LSB First and MSB First Approaches Montgomery’s Algorithm for Scalar Multiplication Inversions Conclusions Modern Hardware Design Practices Introduction Components of a Hardware Architecture: Mapping an Algorithm to Hardware Case Study: Binary gcd Processor Enhancing the Performance of a Hardware Design Modelling of the Computational Elements of the gcd Processor Experimental Results Conclusions Hardware Design of the Advanced Encryption Standard (AES) Introduction Algorithmic and Architectural Optimizations for AES Design Circuit for the AES S-Box Implementation of the Mix Column Transformation An Example Reconfigurable Design for the Rijndael Cryptosystem Experimental Results Single Chip Encryptor/Decryptor Conclusions Efficient Design of Finite Field Arithmetic on FPGAs Introduction Finite Field Multiplier Finite Field Multipliers for High Performance Applications Karatsuba Multiplication Karatsuba Multipliers for Elliptic Curves Designing for the FPGA Architecture Analyzing Karatsuba Multipliers on FPGA Platforms Performance Evaluation High Performance Finite Field Inversion Architecture for FPGAs Itoh-Tsujii Inversion Algorithm The Quad ITA Algorithm Experimental Results Generalization of the ITA for 2n Circuit Hardware Architecture for 2n Circuit-Based ITA Area and Delay Estimations for the 2n ITA Obtaining the Optimal Performing ITA Architecture Validation of Theoretical Estimations Conclusions High Speed Implementation of Elliptic Curve Scalar Multiplication on FPGAs Introduction The Elliptic Curve Cryptoprocessor Point Arithmetic on the ECCP The Finite State Machine (FSM) Performance Evaluation Further Acceleration Techniques of the ECC Processor Pipelining Strategies for the Scalar Multiplier Scheduling of the Montgomery Algorithm Finding the Right Pipeline Detailed Architecture of the ECM Implementation Results Conclusion Introduction to Side Channel Analysis Introduction What Are Side Channels? Types of Side Channel Attacks Kocher’s Seminal Works Power Attacks Fault Attacks Cache Attacks Scan Chain-Based Attacks Conclusions Differential Fault Analysis of Ciphers Introduction to Differential Fault Analysis DFA and Associated Fault Models Differential Fault Attacks on AES: Early Efforts State of the Art DFAs on AES Multiple Byte DFA of AES-128 Extension of the DFA to Other Variants of AES DFA of AES Targeting the Key-Schedule CED for AES Conclusions Cache Attacks on Ciphers Memory Hierarchy and Cache Memory Timing Attacks due to CPU Architecture Trace-Driven Cache Attacks Access-Driven Cache Attacks Time-Driven Cache Attacks Countermeasures for Timing Attacks Conclusion Power Analysis of Cipher Implementations Power Attack Set up and Power Traces Power Models Differential Power Analysis using Difference of Mean PKDPA: An Improvement of the DoM Technique Correlation Power Attack Metrics to Evaluate a Side Channel Analysis CPA on Real Power Traces of AES-128 Popular Countermeasures against Power Analysis: Masking Conclusions Testability of Cryptographic Hardware Introduction Scan Chain-Based Attacks on Cryptographic Implementations Scan Attack on Trivium Testability of Cryptographic Designs Conclusion Bibliography Part II Hardware Intellectual Property Protection through Obfuscation Introduction Related Work Functional Obfuscation through State Transition Graph Modification Extension of STG Modification for RTL Designs Obfuscation through Control and Data Flow Graph (CDFG) Modification Measure of Obfuscation Level Results Discussions Conclusions Overview of Hardware Trojans Introduction Trojan Taxonomy and Examples Multi-Level Attack Effect of Hardware Trojan on Circuit Reliability Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream Conclusion Logic Testing-Based Hardware Trojan Detection Introduction Statistical Approach for Trojan Detection Results Summary Side-Channel Analysis Techniques for Hardware Trojans Detection Introduction Motivation for the Proposed Approaches Multiple-Parameter Analysis-Based Trojan Detection Results Integration with Logic-Testing Approach Design Techniques for Hardware Trojan Threat Mitigation Introduction Obfuscation-Based Trojan Detection/Protection Integrated Framework for Obfuscation Results A FPGA-Based Design Technique for Trojan Isolation A Design Infrastructure Approach to Prevent Circuit Malfunction Physically Unclonable Functions: A Root-of-Trust for Hardware Security Introduction Physically Unclonable Function (PUF) Classification of PUFs Realization of Silicon PUFs PUF Performance Metrics for Quality Evaluation Secure PUF: What Makes a PUF Secure? Applications of PUF as a Root-of-Trust Attacks Model: How PUF Security Could Be Compromised Looking Forward: What Lies Ahead for PUFs? Genetic Programming-Based Model Building Attack on PUFs Introduction Background: Genetic Programming and RO-PUFs Methodology Results Bibliography … (more)
- Publisher Details:
- Place of publication not identified : CRC Press
- Publication Date:
- 2014
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security
Data encryption (Computer science)
Integrated circuits -- Design and construction
Computers -- Circuits -- Design and construction
Computer security
Computers -- Circuits -- Design and construction
Data encryption (Computer science)
Integrated circuits -- Design and construction
Electronic books - Languages:
- English
- ISBNs:
- 1322626308
9781322626307
1439895848
9781439895849
9781439895832 - Related ISBNs:
- 143989583X
- Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143729
- Ingest File:
- 01_024.xml