Atjaunināt sīkdatņu piekrišanu

E-grāmata: Timing Channels in Cryptography: A Micro-Architectural Perspective

  • Formāts: PDF+DRM
  • Izdošanas datums: 12-Dec-2014
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319123707
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 12-Dec-2014
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319123707
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack"s success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

An Introduction to Timing Attacks.- Modern Cryptography.- Superscalar Processors, Cache Memories, and Branch Predictors.- Time-Driven Cache Attacks.- Advanced Time-Driven Cache Attacks on Block Ciphers.- A Formal Analysis of Time-Driven Cache Attacks.- Profiled Time-Driven Cache Attacks on Block Ciphers.- Access-Driven Cache Attacks on Block Ciphers.- Branch Prediction Attacks.- Countermeasures for Timing Attacks.
1 An Introduction to Timing Attacks 1(12)
1.1 Side-Channel Attacks
3(3)
1.1.1 Side-Channel Attack Requirements
4(1)
1.1.2 The Attacker's Success
5(1)
1.1.3 Side-Channel Attack Suppression
5(1)
1.2 Timing Attacks
6(4)
1.2.1 Kocher's Timing Attack
7(2)
1.2.2 Taxonomy of Timing Attacks
9(1)
1.3 Organization
10(1)
Reference
11(2)
2 Modern Cryptography 13(24)
2.1 Types of Encryption Algorithms
13(2)
2.2 Block Ciphers: An Important Family of Symmetric-Key Ciphers
15(9)
2.2.1 AES
16(4)
2.2.2 CLEFIA
20(3)
2.2.3 CAMELLIA
23(1)
2.3 Classical Cryptanalysis
24(5)
2.3.1 Classical Cryptanalysis of Block Ciphers
25(1)
2.3.2 The Idea of Differential in Block Ciphers
25(4)
2.4 Asymmetric-Key Ciphers
29(1)
2.5 RSA: An Asymmetric-Key Algorithm
29(2)
2.5.1 Square and Multiply Algorithm to Perform Exponentiation
30(1)
2.6 Confinement Problem and Covert Channels
31(1)
2.7 Formal Analysis of Side-Channel Attacks
32(1)
2.8 Conclusion
33(1)
References
34(3)
3 Superscalar Processors, Cache Memories, and Branch Predictors 37(16)
3.1 Superscalar Processors
37(2)
3.2 Memory Hierarchy and Cache Memory
39(6)
3.2.1 Organization of Cache Memory
40(3)
3.2.2 Improving Cache Performance for Superscalar Processors
43(2)
3.3 Branch Prediction Unit
45(5)
3.3.1 Static Branch Prediction
47(1)
3.3.2 Dynamic Branch Prediction Schemes
47(3)
3.3.3 Branch Target Buffers
50(1)
3.4 Conclusion
50(1)
Reference
51(2)
4 Time-Driven Cache Attacks 53(18)
4.1 A Simple Illustration
53(4)
4.1.1 Relation Between Size and Bits Revealed
55(1)
4.1.2 Relation Between Alignment of Tables and Bits Revealed
56(1)
4.1.3 Initial State of Cache Memory
56(1)
4.2 Collisions from Execution Time
57(6)
4.2.1 Clocks Using Hardware Time Stamp Counters
57(2)
4.2.2 Clocks with Virtual Time-Stamp Counters
59(1)
4.2.3 Distinguishing Cache Hit and Miss Events Using Time
60(3)
4.3 Timing Attacks on Block Ciphers Based on Internal Collisions
63(3)
4.3.1 Max, Min, or Max Deviation
65(1)
4.4 Time-Driven Attack Based on Induced Cache Miss
66(3)
4.5 Results
69(1)
4.6 Conclusion
69(1)
Reference
69(2)
5 Advanced Time-Driven Cache Attacks on Block Ciphers 71(10)
5.1 Second Round Attack on AES
71(1)
5.2 Differential Cache Attacks on Feistel Ciphers
72(3)
5.3 Differential Cache Attack on CLEFIA
75(4)
5.3.1 Differential Properties of CLEFIA's F Functions
75(1)
5.3.2 Determining RKO and RK1
76(1)
5.3.3 Determining WKO circled plus RK2 and WK1 circled plus RK3
77(1)
5.3.4 Determining RK4 and RK5
78(1)
5.3.5 Determining RK2 and RK3
79(1)
5.4 Conclusion
79(1)
References
80(1)
6 A Formal Analysis of Time-Driven Cache Attacks 81(58)
6.1 Memory Access Model for a Block Cipher
81(1)
6.2 Cache Misses in a Block Cipher
82(3)
6.3 Average Execution Time of a Block Cipher
85(3)
6.3.1 Estimating the Difference of Means
87(1)
6.4 DOM as a Security Metric
88(2)
6.5 Application of the Model
90(49)
10 Countermeasures for Timing Attacks 139(12)
10.1 Application Level Countermeasures
139(4)
10.1.1 Countermeasures Involving Look-Up Tables
140(2)
10.1.2 Data-Oblivious Memory Access Pattern
142(1)
10.1.3 Constant and Random Time Implementations
142(1)
10.2 Countermeasures Applied in the Hardware
143(3)
10.2.1 Noncached Memory Accesses
143(1)
10.2.2 Specialized Cache Designs
143(1)
10.2.3 Specialized Instructions
144(1)
10.2.4 Hardware Prefetching
145(1)
10.2.5 Fuzzying Clocks
145(1)
10.3 Countermeasures in the Operating System
146(1)
10.4 Conclusion
147(1)
References
147(4)
Appendix A: CPUs Used for Experiments 151
Debdeep Mukhopadhyay is an Associate Professor in the Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India. Chester Rebeiro is a Post-doc researcher in the department of Computer Science, Columbia University, USA.