Timing Channels in Cryptography

A Micro-Architectural Perspective

Nonfiction, Computers, Advanced Computing, Theory, Science & Nature, Technology, Electronics
Cover of the book Timing Channels in Cryptography by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya ISBN: 9783319123707
Publisher: Springer International Publishing Publication: December 12, 2014
Imprint: Springer Language: English
Author: Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
ISBN: 9783319123707
Publisher: Springer International Publishing
Publication: December 12, 2014
Imprint: Springer
Language: English

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

More books from Springer International Publishing

Cover of the book Technoscience and Citizenship: Ethics and Governance in the Digital Society by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Anthrozoology by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Sport and Physical Activity in the Heat by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Thermo-Hydro-Mechanical-Chemical Processes in Fractured Porous Media: Modelling and Benchmarking by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Roman Law and the Origins of the Civil Law Tradition by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Academic Work and Careers in Europe: Trends, Challenges, Perspectives by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book The Conversational Interface by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Sociality in Bats by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Cyber Physical Systems. Model-Based Design by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Lévy Matters V by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Creating Performances for Teaching and Learning by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Anglicans, Dissenters and Radical Change in Early New England, 1686–1786 by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book High-Level Models of Unconventional Computations by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Mathematical Modeling by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
Cover of the book Data Privacy Management and Security Assurance by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy