Classical and Physical Security of Symmetric Key Cryptographic Algorithms

Автор: literator от 24-01-2022, 13:46, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Classical and Physical Security of Symmetric Key Cryptographic AlgorithmsНазвание: Classical and Physical Security of Symmetric Key Cryptographic Algorithms
Автор: Anubhab Baksi
Издательство: Springer
Год: 2022
Страниц: 295
Язык: английский
Формат: pdf (true), epub
Размер: 52.0 MB

This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse—it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography.

In the present world, electronic communication takes a vital role in our life. We frequently deal with sensitive/confidential information. As such, the security of such information is of utmost importance. Cryptography is the branch of computer science (often involves electronics, mathematics, and statistics) which studies the area security mostly from a theoretical perspective. In short, it deals with data confidentiality (or privacy), integrity, authentication, and non-repudiation. Confidentiality means only the intended recipient will be able to properly get the message (the message will appear as garbage to any third party). Integrity refers to the identification if the message is tampered with. Authentication is the way to ascertain that the sender is verifiable. Finally, non-repudiation means the inability for the sender to deny the dispatch of the message after it has been sent.

Traditionally, the work-flow is described by scenario where Alice wants to send a message to Bob securely, where Eve is eavesdropping. We will refer to Eve as the attacker or the adversary. Alice and Bob share some secret component (key), which is not known to Eve. In symmetric key (also known as private key) systems, the key shared between Alice and Bob is identical, which contrasts with public key (also known as asymmetric key) cryptography, where the secret keys are different. Symmetric key systems are generally simpler (hence faster) compared to the asymmetric key systems.

Скачать Classical and Physical Security of Symmetric Key Cryptographic Algorithms








Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.