Cargando…

Security of block ciphers : from algorithm design to hardware implementation /

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysisWritten by authors known within the academic cryptography community, this book presents the latest developments in current researchUnique in its combination of both algorit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sakiyama, Kazuo, 1971-
Otros Autores: Sasaki, Yu, Li, Yang, 1986 June 28-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Singapore : Wiley, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn911200073
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 150617s2015 si ob 001 0 eng
010 |a  2015024297 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d N$T  |d UIU  |d YDXCP  |d IDEBK  |d OCLCO  |d NLE  |d CDX  |d DEBSZ  |d EBLCP  |d DEBBG  |d UMI  |d KSU  |d TOH  |d STF  |d CCO  |d DG1  |d COCUF  |d LOA  |d K6U  |d LIP  |d PIFAG  |d FVL  |d VGM  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d OCLCQ  |d WRM  |d OCLCF  |d CEF  |d ICG  |d OCLCQ  |d AU@  |d UKMGB  |d OCLCQ  |d WYU  |d LVT  |d TKN  |d OCLCQ  |d UAB  |d LEAUB  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d VT2  |d OCLCA  |d IEEEE  |d OCLCO  |d IEEEE  |d UPM  |d OCLCO  |d OCLCQ  |d OCLCO 
016 7 |a 017585363  |2 Uk 
019 |a 934935457  |a 957979176  |a 992878392  |a 1066617643  |a 1088993264  |a 1148137206 
020 |a 9781118660041  |q (ePub) 
020 |a 1118660048  |q (ePub) 
020 |a 9781118660034  |q (Adobe PDF) 
020 |a 111866003X  |q (Adobe PDF) 
020 |a 9781118660027 
020 |a 1118660021 
020 |a 1118660013 
020 |a 9781118660010 
024 7 |a 10.1002/9781118660027  |2 doi 
029 1 |a AU@  |b 000060217388 
029 1 |a CHNEW  |b 000893215 
029 1 |a CHNEW  |b 000944452 
029 1 |a CHVBK  |b 480246866 
029 1 |a DEBBG  |b BV043397895 
029 1 |a DEBBG  |b BV043969998 
029 1 |a DEBSZ  |b 475043618 
029 1 |a DEBSZ  |b 485805294 
029 1 |a GBVCP  |b 834336782 
029 1 |a GBVCP  |b 882759043 
029 1 |a UKMGB  |b 017585363 
035 |a (OCoLC)911200073  |z (OCoLC)934935457  |z (OCoLC)957979176  |z (OCoLC)992878392  |z (OCoLC)1066617643  |z (OCoLC)1088993264  |z (OCoLC)1148137206 
037 |a 9781118660041  |b Wiley 
037 |a 8039768  |b IEEE 
042 |a pcc 
050 0 0 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 0 |a 005.8/2  |2 23 
049 |a UAMI 
100 1 |a Sakiyama, Kazuo,  |d 1971- 
245 1 0 |a Security of block ciphers :  |b from algorithm design to hardware implementation /  |c Kazuo Sakiyama, Yu Sasaki, Yang Li. 
264 1 |a Singapore :  |b Wiley,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record and CIP data provided by publisher. 
505 0 |a Propagation in Linear Computations 83 4.2.5 Probabilistic Differential Propagation in Nonlinear Computations 86 4.2.6 Probability of Differential Propagation for Multiple Rounds 89 4.2.7 Differential Characteristic for AES Reduced to Three Rounds 91 4.2.8 Distinguishing Attack with Differential Characteristic 93 4.2.9 Key Recovery Attack after Differential Characteristic 95 4.2.10 Basic Differential Cryptanalysis for Four-Round AES & dagger; 96 4.2.11 Advanced Differential Cryptanalysis for Four-Round AES & dagger; 103 4.2.12 Preventing Differential Cryptanalysis & dagger; 106 4.3 Impossible Differential Cryptanalysis 110 4.3.1 Basic Concept and Definition 110 4.3.2 Impossible Differential Characteristic for 3.5-round AES 111 4.3.3 Key Recovery Attacks for Five-Round AES 114 4.3.4 Key Recovery Attacks for Seven-Round AES & dagger; 123 4.4 Integral Cryptanalysis 131 4.4.1 Basic Concept. 
505 0 |a 131 4.4.2 Processing P through Subkey XOR 132 4.4.3 Processing P through SubBytes Operation 133 4.4.4 Processing P through ShiftRows Operation 134 4.4.5 Processing P through MixColumns Operation 134 4.4.6 Integral Property of AES Reduced to 2.5 Rounds 135 4.4.7 Balanced Property 136 4.4.8 Integral Property of AES Reduced to Three Rounds and Distinguishing Attack 137 4.4.9 Key Recovery Attack with Integral Cryptanalysis for Five Rounds 139 4.4.10 Higher-Order Integral Property & dagger; 141 4.4.11 Key Recovery Attack with Integral Cryptanalysis for Six Rounds & dagger; 143 Further Reading 147 5 Side-Channel Analysis and Fault Analysis on Block Ciphers 149 5.1 Introduction 149 5.1.1 Intrusion Degree of Physical Attacks 149 5.1.2 Passive and Active Noninvasive Physical Attacks 151 5.1.3 Cryptanalysis Compared to Side-Channel Analysis and Fault Analysis 151 5.2. 
505 0 |a Basics of Side-Channel Analysis 152 5.2.1 Side Channels of Digital Circuits 152 5.2.2 Goal of Side-Channel Analysis 154 5.2.3 General Procedures of Side-Channel Analysis 155 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 5.2.5 Divide-and-Conquer Algorithm 157 5.3 Side-Channel Analysis on Block Ciphers 159 5.3.1 Power Consumption Measurement in Power Analysis 160 5.3.2 Simple Power Analysis and Differential Power Analysis 163 5.3.3 General Key Recovery Algorithm for DPA 164 5.3.4 Overview of Attack Targets 169 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 5.3.8 Attacks with Collision Model & dagger; 199 5.4 Basics of Fault Analysis 203 5.4.1 Faults Caused by Setup-Time Violations 205 5.4.2 Faults. 
505 0 |a Caused by Data Alternation 208 5.5 Fault Analysis on Block Ciphers 208 5.5.1 Differential Fault Analysis 208 5.5.2 Fault Sensitivity Analysis & dagger; 215 Acknowledgment 223 Bibliography 223 6 Advanced Fault Analysis with Techniques from Cryptanalysis 225 6.1 Optimized Differential Fault Analysis 226 6.1.1 Relaxing Fault Model 226 6.1.2 Four Classes of Faulty Byte Positions 227 6.1.3 Recovering Subkey Candidates of sk10 228 6.1.4 Attack Procedure 230 6.1.5 Probabilistic Fault Injection 231 6.1.6 Optimized DFA with the MixColumns Operation in the Last Round & dagger; 232 6.1.7 Countermeasures against DFA and Motivation of Advanced DFA 236 6.2 Impossible Differential Fault Analysis 237 6.2.1 Fault Model 238 6.2.2 Impossible DFA with Unknown Faulty Byte Positions 238 6.2.3 Impossible DFA with Fixed Faulty Byte Position 244 6.3 Integral Differential. 
505 0 |a Fault Analysis 245 6.3.1 Fault Model 246 6.3.2 Integral DFA with Bit-Fault Model 247 6.3.3 Integral DFA with Random Byte-Fault Model 251 6.3.4 Integral DFA with Noisy Random Byte-Fault Model & dagger; 254 6.4 Meet-in-the-Middle Fault Analysis 260 6.4.1 Meet-in-the-Middle Attack on Block Ciphers 260 6.4.2 Meet-in-the-Middle Attack for Differential Fault Analysis 263 Further Reading 268 7 Countermeasures against Side-Channel Analysis and Fault Analysis 269 7.1 Logic-Level Hiding Countermeasures 269 7.1.1 Overview of Hiding Countermeasure with WDDL Technique 270 7.1.2 WDDL-NAND Gate 272 7.1.3 WDDL-NO. 
520 |a A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysisWritten by authors known within the academic cryptography community, this book presents the latest developments in current researchUnique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation - covers security from start to completionDeals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cr. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Mathematics. 
650 0 |a Data encryption (Computer science) 
650 0 |a Ciphers. 
650 0 |a Computer algorithms. 
650 2 |a Algorithms 
650 6 |a Sécurité informatique  |x Mathématiques. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Chiffres (Cryptographie) 
650 6 |a Algorithmes. 
650 7 |a ciphers (codes)  |2 aat 
650 7 |a algorithms.  |2 aat 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Ciphers  |2 fast 
650 7 |a Computer algorithms  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
700 1 |a Sasaki, Yu. 
700 1 |a Li, Yang,  |d 1986 June 28- 
776 0 8 |i Print version:  |a Sakiyama, Kazuo, 1971-  |t Security of block ciphers.  |d Chichester, West Sussex : John Wiley & Sons Inc., [2015]  |z 9781118660010  |w (DLC) 2015019381 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118660010/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29018752 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28964929 
938 |a Coutts Information Services  |b COUT  |n 31851102 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4037343 
938 |a EBSCOhost  |b EBSC  |n 1030226 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31851102 
938 |a IEEE  |b IEEE  |n 8039768 
938 |a YBP Library Services  |b YANK  |n 12538008 
938 |a YBP Library Services  |b YANK  |n 12676754 
938 |a YBP Library Services  |b YANK  |n 11225588 
994 |a 92  |b IZTAP