Embedded Cryptography 3
Home > Computing and Information Technology > Computer security > Data encryption > Embedded Cryptography 3: (ISTE Invoiced)
Embedded Cryptography 3: (ISTE Invoiced)

Embedded Cryptography 3: (ISTE Invoiced)


     0     
5
4
3
2
1



International Edition


X
About the Book

Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 3 is dedicated to white-box cryptography, randomness and key generation, as well as real world applications and attacks in the wild.

Table of Contents:
Preface xiii Emmanuel PROUFF, Guénaël RENAULT, Matthieu RIVAIN and Colin O'FLYNN Part 1. White-Box Cryptography 1 Chapter 1. Introduction to White-Box Cryptography 3 Pierre GALISSANT and Louis GOUBIN 1.1. Introductory remarks 3 1.2. Basic notions for white-box cryptography 6 1.3. Proposed (and broken) solutions 9 1.4. Generic strategies to build white-box implementations 12 1.5. Applications of white-box cryptography 15 1.6. Notes and further references 17 1.7. References 19 Chapter 2. Gray-Box Attacks against White-Box Implementations 23 Aleksei UDOVENKO 2.1. Introduction 23 2.2. Specifics of white-box side-channels 24 2.3. Fault injections 30 2.4. Exact matching attack 35 2.5. Linear decoding analysis/algebraic attacks 39 2.6. Countermeasures against the algebraic attack 43 2.7. Conclusions 49 2.8. Notes and further references 50 2.9. References 50 Chapter 3. Tools for White-Box Cryptanalysis 53 Philippe TEUWEN 3.1. Introduction 53 3.2. Tracing programs 55 3.3. Target recognition 57 3.4. Acquiring traces for side-channel analysis 59 3.5. Preprocessing traces 61 3.6. Differential computation analysis 62 3.7. Linear decoding analysis also known as algebraic attack 64 3.8. Injecting faults 65 3.9. Differential fault analysis 67 3.10. Coping with external encodings 69 3.11. Conclusion 70 3.12. Notes and further references 70 3.13. References 72 Chapter 4. Code Obfuscation 73 Sebastian SCHRITTWIESER and Stefan KATZENBEISSER 4.1. Introduction 73 4.2. Obfuscation methods 76 4.3. Attacks against obfuscation 85 4.4. Application of code obfuscation 87 4.5. Conclusions 89 4.6. Notes and further references 89 4.7. References 90 Part 2. Randomness and Key Generation 93 Chapter 5. True Random Number Generation 95 Viktor FISCHER, Florent BERNARD and Patrick HADDAD 5.1. Introduction 95 5.2. TRNG design 96 5.3. Randomness and sources of randomness 97 5.4. Randomness extraction and digitization 100 5.5. Post-processing of the raw binary signal 104 5.6. Stochastic modeling and entropy rate management of the TRNG 105 5.7. TRNG testing and testing strategies 109 5.8. Conclusion 113 5.9. Notes and further references 113 5.10. References 114 Chapter 6. Pseudorandom Number Generation 115 Jean-René REINHARD and Sylvain RUHAULT 6.1. Introduction 115 6.2. PRNG with ideal noise source 116 6.3. PRNG with imperfect noise sources 121 6.4. Standard PRNG with inputs 125 6.5. Notes and further references 128 6.6. References 129 Chapter 7. Prime Number Generation and RSA Keys 131 Marc JOYE and Pascal PAILLIER 7.1. Introduction 131 7.2. Primality testing methods 133 7.3. Generation of random units 133 7.4. Generation of random primes 136 7.5. RSA key generation 140 7.6. Exercises 143 7.7. Notes and further references 144 7.8. References 146 Chapter 8. Nonce Generation for Discrete Logarithm-Based Signatures 151 Akira TAKAHASHI and Mehdi TIBOUCHI 8.1. Introduction 151 8.2. The hidden number problem and randomness failures 153 8.3. Lattice attacks 154 8.4. Fourier transform attack 160 8.5. Preventing randomness failures 166 8.6. Notes and further references 167 8.7. Acknowledgment 169 8.8. References 169 Chapter 9. Random Error Distributions in Post-Quantum Schemes 173 Thomas PREST 9.1. Introduction 173 9.2. Why post-quantum schemes need random errors 174 9.3. Distributions for random errors 178 9.4. Sampling algorithms 184 9.5. Notes and further references 193 9.6. References 197 Part 3. Real-World Applications 203 Chapter 10. ROCA and Minerva Vulnerabilities 205 Jan JANCAR, Petr SVENDA and Marek SYS 10.1. The Return of Coppersmith's Attack 206 10.2. Minerva 216 10.3. References 222 Chapter 11. Security of Automotive Systems 225 Lennert WOUTERS, Benedikt GIERLICHS and Bart PRENEEL 11.1. Introduction 225 11.2. The embedded automotive attacker 226 11.3. An overview of automotive attacks 227 11.4. Application of physical attacks in automotive security 231 11.5. Case study: Tesla Model X keyless entry system 233 11.6. Conclusion 237 11.7. References 237 Chapter 12. Practical Full Key Recovery on a Google Titan Security Key 245 Laurent IMBERT, Victor LOMNE, Camille MUTCHLER and Thomas ROCHE 12.1. Introduction 245 12.2. Preliminaries 246 12.3. Reverse-engineering and vulnerability of the ECDSA algorithm 249 12.4. A key-recovery attack 252 12.5. Take-home message 255 12.6. References 255 Chapter 13. An Introduction to Intentional Electromagnetic Interference Exploitation 257 José LOPES ESTEVES 13.1. IEMI: history and definition 257 13.2. Information security threats related to electromagnetic susceptibility 259 13.3. Electromagnetic fault injection 260 13.4. Destruction, denial of service 261 13.5. Denial of service on radio front-ends 261 13.6. Signal injection in communication interfaces 262 13.7. Signal injection attacks on sensors and actuators 262 13.8. IEMI-covert channel 263 13.9. Electromagnetic watermarking 269 13.10. Conclusion 273 13.11. References 274 Chapter 14. Attacking IoT Light Bulbs 279 Colin O'FLYNN and Eyal RONEN 14.1. Introduction 279 14.2. Preliminaries 280 14.3. Hardware AES and AES-CTR attacks 282 14.4. AES-CCM bootloader attack 286 14.5. Application of attack 293 14.6. Notes and further references 294 14.7. References 295 List of Authors 297 Index 301 Summary of Volume 1 305 Summary of Volume 2 313

About the Author :
Emmanuel Prouff is a researcher in Applied Cryptography and Embedded Security. He has worked as an expert for ANSSI, France, as well as for major security companies such as IDEMIA and SAFRAN, both to develop secure implementations against physical attacks. Guénaël Renault is Deputy Head of the Hardware Security Lab at ANSSI, France. His research interests include cryptography, algebraic (symbolic) computation and computational number theory. Mattieu Rivain is a researcher and entrepreneur in Cryptography, currently working as CEO at CryptoExperts, France. His research interests include provable security against side-channel attacks, white-box cryptography, zero-knowledge proofs and post-quantum signatures. Colin O'Flynn is Assistant Professor in Embedded Hardware Security at Dalhousie University, Canada. His interests include embedded hardware security, PCB design and prototype construction.


Best Sellers


Product Details
  • ISBN-13: 9781789452150
  • Publisher: ISTE Ltd
  • Publisher Imprint: ISTE Ltd
  • Language: English
  • Returnable: N
  • Returnable: N
  • Weight: 680 gr
  • ISBN-10: 1789452155
  • Publisher Date: 04 Feb 2025
  • Binding: Hardback
  • No of Pages: 352
  • Returnable: N
  • Series Title: ISTE Invoiced


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Embedded Cryptography 3: (ISTE Invoiced)
ISTE Ltd -
Embedded Cryptography 3: (ISTE Invoiced)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Embedded Cryptography 3: (ISTE Invoiced)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!