000 04412nam a22005415i 4500
001 978-3-030-11333-9
003 DE-He213
005 20220801214936.0
007 cr nn 008mamaa
008 190319s2019 sz | s |||| 0|eng d
020 _a9783030113339
_9978-3-030-11333-9
024 7 _a10.1007/978-3-030-11333-9
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
245 1 0 _aAutomated Methods in Cryptographic Fault Analysis
_h[electronic resource] /
_cedited by Jakub Breier, Xiaolu Hou, Shivam Bhasin.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXXI, 334 p. 90 illus., 66 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1. Introduction to Fault Analysis in Cryptography -- Part I. Automated Fault Analysis of Symmetric Block Ciphers -- Chapter 2. ExpFault: An Automated Framework for Block Cipher Fault Analysis -- Chapter 3. Exploitable Fault Space Characterization: A Complementary Approach -- Chapter 4. Differential Fault Analysis Automation on Assembly Code -- Chapter 5. An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers -- Chapter 6. Automatic construction of fault attacks on cryptographic hardware implementations -- Part II. Automated Design and Deployment of Fault Countermeasures -- Chapter 7. Automated Deployment of Software Encoding Countermeasure -- Chapter 8. Idempotent Instructions to Counter Fault Analysis Attacks -- Chapter 9. Differential Fault Attack Resistant Hardware Design Automation -- Part III. Automated Analysis of Fault Countermeasures -- Chapter 10. Automated Evaluation of Software Encoding Schemes -- Chapter 11. Automated Evaluation of Concurrent Error Detection Code Protected Hardware Implementations -- Chapter 12. Fault Analysis Assisted by Simulation -- Part IV. Automated Fault Attack Experiments -- Chapter 13. Optimizing Electromagnetic Fault Injection with Genetic Algorithms -- Chapter 14. Automated Profiling Method for Laser Fault Injection in FPGAs.
520 _aThis book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products. Offers a complete perspective on protecting block ciphers against fault attacks – from analysis to deployment; Provides automated methods for each stage, supported by evaluation and case studies; Describes current fault analysis approaches, together with countermeasures; Includes detailed description of prototypes for each automation method that can be easily implemented and put into industrial applications.
650 0 _aElectronic circuits.
_919581
650 0 _aMicroprocessors.
_941396
650 0 _aComputer architecture.
_93513
650 0 _aElectronics.
_93425
650 1 4 _aElectronic Circuits and Systems.
_941397
650 2 4 _aProcessor Architectures.
_941398
650 2 4 _aElectronics and Microelectronics, Instrumentation.
_932249
700 1 _aBreier, Jakub.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_941399
700 1 _aHou, Xiaolu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_941400
700 1 _aBhasin, Shivam.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_941401
710 2 _aSpringerLink (Online service)
_941402
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030113322
776 0 8 _iPrinted edition:
_z9783030113346
856 4 0 _uhttps://doi.org/10.1007/978-3-030-11333-9
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76929
_d76929