Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Fault analysis in cryptography
Joye M., Tunstall M., Springer Publishing Company, Incorporated, New York, NY, 2012. 370 pp. Type: Book (978-3-642296-55-0)
Date Reviewed: Oct 11 2012

In the basic fault analysis scenario in cryptography, the adversary obtains a pair of ciphertexts from the same plaintext: one is encrypted correctly and the other is a faulty computation. Among the well-studied side-channel analysis techniques, fault analysis might be the most powerful for recovering the secret value in the computation of a cryptographic algorithm.

In this book, the authors first provide a historical view of fault analysis by presenting examples of two prominent block ciphers: data encryption standard (DES) and advanced encryption standard (AES). Next, the fault analysis in public key cryptography is reviewed, which includes classic RSA implementations and elliptic curve computations. Finally, the authors show how to implement fault analysis in practice, with solid experimental results.

This book contains sufficient information for people who have not studied fault analysis before. It will be a handy book for self-study for both security engineers and academic researchers.

Reviewer:  Zheng Gong Review #: CR140589 (1301-0010)
Bookmark and Share
 
Data Encryption (E.3 )
 
 
Fault Tolerance (C.4 ... )
 
 
Reliability, Testing, And Fault-Tolerance (B.8.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy