Hardware Security: Design, Threats, and Safeguards
Autor Debdeep Mukhopadhyay, Rajat Subhra Chakrabortyen Limba Engleză Hardback – 29 oct 2014
Gain a Comprehensive Understanding of Hardware Security—from Fundamentals to Practical Applications
Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards:
- Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
- Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
- Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention
If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you’ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.
Preț: 737.00 lei
Preț vechi: 1068.76 lei
-31% Nou
Puncte Express: 1106
Preț estimativ în valută:
141.05€ • 148.80$ • 117.55£
141.05€ • 148.80$ • 117.55£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781439895832
ISBN-10: 143989583X
Pagini: 590
Ilustrații: 93 black & white illustrations, 27 black & white tables
Dimensiuni: 178 x 254 x 35 mm
Greutate: 1.22 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
ISBN-10: 143989583X
Pagini: 590
Ilustrații: 93 black & white illustrations, 27 black & white tables
Dimensiuni: 178 x 254 x 35 mm
Greutate: 1.22 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Public țintă
Professional Practice & DevelopmentCuprins
Mathematical Background. Overview of Modern Cryptography. Modern Hardware Design Practices. Hardware Design of the Advanced Encryption Standard. Efficient Design of Finite Field Arithmetic on FPGAs. High Speed Implementation of Elliptic Curve Scalar Multiplication on FPGAs. Introduction to Side Channel Analysis. Differential Fault Analysis of Ciphers. Cache Attacks on Ciphers. Power Analysis of Cipher Implementations. Testability of Cryptographic Hardware. Hardware Intellectual Property Protection through Obfuscation. Overview of Hardware Trojans. Logic Testing-Based Hardware Trojan Detection. Side-Channel Analysis Techniques for Hardware Trojans Detection. Design Techniques for Hardware Trojan Threat Mitigation. Physically Unclonable Functions: A Root-of-Trust for Hardware Security. Genetic Programming-Based Model Building Attack on PUFs.
Notă biografică
Dr. Debdeep Mukhopadhyay is an associate professor at the Indian Institute of Technology (IIT) Kharagpur, West Bengal, where he has been instrumental in setting up a side channel analysis laboratory. Previously, he worked as an assistant professor at the IIT Kharagpur and Madras. His research interests include VLSI of cryptographic algorithms and side channel analysis. A popular invited speaker, he has authored around 100 international conference and journal papers, co-authored a textbook on cryptography and network security, reviewed and served on program committees for several international conferences, and collaborated with several organizations including ISRO, DIT, ITI, DRDO, and NTT-Labs Japan. He has been the recipient of the prestigious INSA Young Scientist Award and the INAE Young Engineer Award.
Dr. Rajat Subhra Chakraborty is an assistant professor at the Indian Institute of Technology Kharagpur, West Bengal. Previously, he worked as a CAD software engineer at National Semiconductor, Bangalore, Karnataka, India and a co-op at Advanced Micro Devices, Sunnyvale, California, USA. His research interests include design methodology for hardware IPIIC protection, hardware Trojan detection/prevention through design and testing, attacks on hardware implementation of cryptographic algorithms, and reversible watermarking for digital content protection. He has authored over 25 conference and journal publications and presented at numerous events including the 2011 IEEE VLSI Design Conference, where he delivered a tutorial on hardware security.
Dr. Rajat Subhra Chakraborty is an assistant professor at the Indian Institute of Technology Kharagpur, West Bengal. Previously, he worked as a CAD software engineer at National Semiconductor, Bangalore, Karnataka, India and a co-op at Advanced Micro Devices, Sunnyvale, California, USA. His research interests include design methodology for hardware IPIIC protection, hardware Trojan detection/prevention through design and testing, attacks on hardware implementation of cryptographic algorithms, and reversible watermarking for digital content protection. He has authored over 25 conference and journal publications and presented at numerous events including the 2011 IEEE VLSI Design Conference, where he delivered a tutorial on hardware security.
Recenzii
"… an excellent job introducing the field of hardware security. It is a good source for upper undergraduates, postgraduates, and practitioners. The book does not need to be read cover to cover, and a select subset of chapters can form an undergraduate or graduate course in hardware security. … an excellent reference and can help graduate students move quickly to the frontiers of research. With its 432 references, the book helps direct readers who want to explore a specific topic in more detail."
—Computing Reviews, April 2015
—Computing Reviews, April 2015
Descriere
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.