Cryptographic Engineering

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success.

The material includes four important features:

  • ASIC and FPGA hardware design for cryptography,
  • Principles and practice of true random number generators,
  • Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and
  • Side-channel attacks on cryptographic systems and countermeasure designs.

Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.

Author(s): Çetin Kaya Koç (auth.), Çetin Kaya Koç (eds.)
Edition: 1
Publisher: Springer US
Year: 2009

Language: English
Pages: 522
Tags: Circuits and Systems; Communications Engineering, Networks; Data Structures, Cryptology and Information Theory; Data Encryption

Front Matter....Pages i-xxii
About Cryptographic Engineering....Pages 1-4
Random Number Generators for Cryptographic Applications....Pages 5-23
Evaluation Criteria for Physical Random Number Generators....Pages 25-54
True Random Number Generators for Cryptography....Pages 55-73
Fast Finite Field Multiplication....Pages 75-104
Efficient Unified Arithmetic for Hardware Cryptography....Pages 105-124
Spectral Modular Arithmetic for Cryptography....Pages 125-169
Elliptic and Hyperelliptic Curve Cryptography....Pages 171-189
Instruction Set Extensions for Cryptographic Applications....Pages 191-233
FPGA and ASIC Implementations of AES....Pages 235-294
Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs....Pages 295-320
Block Cipher Modes of Operation from a Hardware Implementation Perspective....Pages 321-363
Basics of Side-Channel Analysis....Pages 365-380
Improved Techniques for Side-Channel Analysis....Pages 381-406
Electromagnetic Attacks and Countermeasures....Pages 407-430
Leakage from Montgomery Multiplication....Pages 431-449
Randomized Exponentiation Algorithms....Pages 451-473
Microarchitectural Attacks and Countermeasures....Pages 475-504
Back Matter....Pages 505-517