Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

  • 出版商: CRC
  • 出版日期: 2014-10-28
  • 售價: $5,750
  • 貴賓價: 9.5$5,463
  • 語言: 英文
  • 頁數: 542
  • 裝訂: Hardcover
  • ISBN: 143989583X
  • ISBN-13: 9781439895832
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive Understanding of Hardware Security―from Fundamentals to Practical Applications

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards:

 

 

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention

Design for Security and Meet Real-Time Requirements

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you’ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.

商品描述(中文翻譯)

從介紹密碼學開始,《硬體安全:設計、威脅和保護》解釋了設計複雜密碼算法所需的基礎數學原理。它還介紹了高效的密碼算法實現方法,以及用於設計非常大規模集成(VLSI)電路和對稱密碼系統的最新研究和策略,包括高級加密標準(AES)密碼、非對稱密碼和橢圓曲線密碼(ECC)的示例。

從基礎到實際應用,全面了解硬體安全

由於大多數標準密碼算法的實現會洩漏信息,對手可以利用這些信息來獲取有關秘密加密密鑰的知識,《硬體安全:設計、威脅和保護》提供以下內容:

- 詳細介紹基於功耗、時序、故障、緩存和掃描鏈分析的攻擊的算法和電路級對策
- 描述基於數字浮水印的不同抽象層次上的硬體知識產權盜版和保護技術
- 討論硬體混淆和物理不可複製功能(PUFs),以及特洛伊模型、分類、檢測和預防
設計安全並滿足實時需求

如果您認為安全性對於集成電路(IC)來說與功耗、面積和性能一樣重要,那麼您將接受《硬體安全:設計、威脅和保護》的設計安全方法論。