Timing Channels in Cryptography

A Micro-Architectural Perspective

Nonfiction, Computers, Advanced Computing, Theory, Science & Nature, Technology, Electronics
Cover of the book Timing Channels in Cryptography by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya ISBN: 9783319123707
Publisher: Springer International Publishing Publication: December 12, 2014
Imprint: Springer Language: English
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
ISBN: 9783319123707
Publisher: Springer International Publishing
Publication: December 12, 2014
Imprint: Springer
Language: English

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

More books from Springer International Publishing

Cover of the book Operator Algebras and Applications by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Phantom Ex Machina by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Fundamentals of Tropical Climate Dynamics by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Midwifery, Childbirth and the Media by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Foundations of Programming Languages by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Renormalization Group Analysis of Equilibrium and Non-equilibrium Charged Systems by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Soil Dynamics and Foundation Modeling by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Metacognitive Learning by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Microgrid Architectures, Control and Protection Methods by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book F. R. Leavis by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Multiplicative Ideal Theory and Factorization Theory by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Social Dimensions of Organised Crime by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Nomic Truth Approximation Revisited by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Design Automation for Differential MOS Current-Mode Logic Circuits by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Industrial Espionage and Technical Surveillance Counter Measurers by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy