Hardware Security: Design, Threats, and Safeguards
暫譯: 硬體安全:設計、威脅與防護措施

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

  • 出版商: CRC
  • 出版日期: 2014-10-28
  • 售價: $5,810
  • 貴賓價: 9.5$5,520
  • 語言: 英文
  • 頁數: 542
  • 裝訂: Hardcover
  • ISBN: 143989583X
  • ISBN-13: 9781439895832
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive Understanding of Hardware Security―from Fundamentals to Practical Applications

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards:

 

 

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention

Design for Security and Meet Real-Time Requirements

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you’ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.

商品描述(中文翻譯)

本書《硬體安全:設計、威脅與防護》從密碼學的介紹開始,解釋設計複雜密碼演算法所需的基本數學原理。接著,書中介紹了高效的密碼演算法實現方法,以及針對非常大規模集成電路(VLSI)和對稱密碼系統的最先進研究和設計策略,並提供了高級加密標準(AES)密碼、非對稱密碼和橢圓曲線密碼學(ECC)的範例。

全面了解硬體安全——從基礎到實際應用

由於大多數標準密碼演算法的實現會洩漏資訊,這些資訊可能被對手利用來獲取有關秘密加密金鑰的知識,《硬體安全:設計、威脅與防護》:

 

 


  • 詳細說明基於功耗、時間、故障、快取和掃描鏈分析的攻擊的演算法和電路級對策

  • 描述基於水印技術的不同抽象層次的硬體智慧財產盜竊和保護技術

  • 討論硬體混淆和物理不可複製函數(PUFs),以及木馬建模、分類、檢測和預防

設計以安全為重點,滿足實時需求

如果您將安全視為集成電路(IC)的關鍵指標,與功耗、面積和性能同等重要,您將會接受《硬體安全:設計、威脅與防護》的設計安全方法論。