Classical and Physical Security of Symmetric Key Cryptographic AlgorithmsКНИГИ » ПРОГРАММИНГ
Название: Classical and Physical Security of Symmetric Key Cryptographic Algorithms Автор: Anubhab Baksi Издательство: Springer Год: 2022 Страниц: 295 Язык: английский Формат: pdf (true), epub Размер: 52.0 MB
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse—it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography.
In the present world, electronic communication takes a vital role in our life. We frequently deal with sensitive/confidential information. As such, the security of such information is of utmost importance. Cryptography is the branch of computer science (often involves electronics, mathematics, and statistics) which studies the area security mostly from a theoretical perspective. In short, it deals with data confidentiality (or privacy), integrity, authentication, and non-repudiation. Confidentiality means only the intended recipient will be able to properly get the message (the message will appear as garbage to any third party). Integrity refers to the identification if the message is tampered with. Authentication is the way to ascertain that the sender is verifiable. Finally, non-repudiation means the inability for the sender to deny the dispatch of the message after it has been sent.
Traditionally, the work-flow is described by scenario where Alice wants to send a message to Bob securely, where Eve is eavesdropping. We will refer to Eve as the attacker or the adversary. Alice and Bob share some secret component (key), which is not known to Eve. In symmetric key (also known as private key) systems, the key shared between Alice and Bob is identical, which contrasts with public key (also known as asymmetric key) cryptography, where the secret keys are different. Symmetric key systems are generally simpler (hence faster) compared to the asymmetric key systems.
Скачать Classical and Physical Security of Symmetric Key Cryptographic Algorithms
Advances in Cryptology - EUROCRYPT 2020, Part 1-3 Название: Advances in Cryptology - EUROCRYPT 2020, Part 1-3 Автор: Anne Canteaut and Yuval Ishai Издательство: Springer Год: 2020 Формат: PDF Размер:...
Fault Tolerant Architectures for Cryptography Название: Fault Tolerant Architectures for Cryptography and Hardware Security Автор: Sikhar Patranabis and Debdeep Mukhopadhyay Издательство:...
Automated Methods in Cryptographic Fault Analysis Название: Automated Methods in Cryptographic Fault Analysis Автор: Jakub Breier, Xiaolu Hou, Shivam Bhasin Издательство: Springer ISBN: 3030113329 ...
Selected Areas in Cryptography – SAC 2017 Название: Selected Areas in Cryptography – SAC 2017 Автор: Carlisle Adams and Jan Camenisch Издательство: Springer Год: 2018 Формат: PDF Размер: 15...
Selected Areas in Cryptography - SAC 2014 Название: Selected Areas in Cryptography - SAC 2014 Автор: Antoine Joux and Amr Youssef Издательство: Springer Год: 2014 Формат: PDF Размер: 12 Мб ...
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.