Skip to main content
  • Book
  • © 2018

Fault Tolerant Architectures for Cryptography and Hardware Security

  • Reviews exhaustively the recent key research into fault tolerant architectures in hardware security and cryptography software
  • Discusses the latest fault attacks on a wide variety of cryptographic implementations, such as biased fault attacks, algebraic fault attacks, and attacks on authenticated encryption based ciphers
  • Offers hands-on and practical demonstrations for handling complex secure cryptographic architectures, complementing the theoretical analysis

Part of the book series: Computer Architecture and Design Methodologies (CADM)

Buy it now

Buying options

eBook USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (11 chapters)

  1. Front Matter

    Pages i-xii
  2. Fault Attacks: A Preamble

    1. Front Matter

      Pages 1-1
    2. Introduction to Fault Attacks

      • Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 3-8
    3. Classical Fault Attacks on Public and Symmetric-Key Cryptosystems

      • Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
      Pages 9-45
  3. Side-Channel Inspired and Assisted Fault Analysis Techniques

    1. Front Matter

      Pages 47-47
    2. Side-Channel Inspired Fault Analysis Techniques

      • Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 49-58
    3. Side-Channel Assisted Fault Analysis

      • Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
      Pages 59-77
  4. Advanced Fault Analysis Techniques and Fault Analysis Automation

    1. Front Matter

      Pages 79-79
    2. Laser-Based Fault Injection on Microcontrollers

      • Jakub Breier, Dirmanto Jap, Chien-Ning Chen
      Pages 81-110
    3. Advanced Fault Attacks in Software: Exploiting the Rowhammer Bug

      • Sarani Bhattacharya, Debdeep Mukhopadhyay
      Pages 111-135
    4. Automation of Fault Analysis

      • Sayandeep Saha, Debdeep Mukhopadhyay
      Pages 137-167
  5. Countermeasures Against Fault Analysis Techniques

    1. Front Matter

      Pages 169-169
    2. Classical Countermeasures Against Differential Fault Analysis

      • Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 171-182
    3. Fault Space Transformation: Countering Biased Fault Attacks

      • Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
      Pages 183-195
    4. Infective Countermeasures Against Fault Analysis

      • Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 197-211
    5. Reactive Design Strategies Against Fault Injection Attacks

      • Jakub Breier, Wei He, Shivam Bhasin
      Pages 213-229
  6. Back Matter

    Pages 231-240

About this book

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.  It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Editors and Affiliations

  • Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India

    SIKHAR PATRANABIS, Debdeep Mukhopadhyay

About the editors

Sikhar Patranabis is a PhD student in the Department of Computer Science and Engineering, Indian Institute of Technology at Kharagpur, India. Prior to this, he obtained his BTech degree in Computer Science and Engineering, from IIT Kharagpur in the year 2015. His research interests include Fault Analysis of Ciphers, Side Channel Attacks, Hardware Security, and Secured data sharing protocols for the cloud. He is the recipient of the prestigious President Gold Medal for securing the highest grade point among all the outgoing students of the batch of 2015.

Debdeep Mukhopadhyay is currently an Associate Professor at the Department of Computer Science and Engineering, Indian Institute of Technology at Kharagpur, India. At IIT Kharagpur he initiated the Secured Embedded Architecture Laboratory (SEAL), with a focus on Embedded Security and Side Channel Attacks. Prior to this, he worked as a visiting Associate Professor of NYU-Shanghai. He had also served as an Assistant Professor at IIT Madras, India and as a Visiting Researcher at NYU Polytechnic School of Engineering under the Indo-US STF Fellowship. He holds a PhD, an MS, and a B. Tech from IIT Kharagpur, India. Mukhopadhyay’s research interests are Cryptography, Hardware Security, and VLSI. His books include Cryptography and Network Security (Mc Graw Hills), Hardware Security: Design, Threats, and Safeguards (CRC Press), and Timing Channels in Cryptography (Springer). He has written more than 100 papers in peer-reviewed conferences and journals and has collaborated with several Indian and Foreign Organizations. Mukhopadhyay is the recipient of the prestigious Young Scientist award from the Indian National Science Academy, the Young Engineer award from the Indian National Academy of Engineers, and is the Young Associate of the Indian Academy of Science. He was also awarded the Outstanding Young Faculty fellowship in 2011 from IIT Kharagpur, and the Techno-Inventor Best PhD award by the Indian Semiconductor Association.

Bibliographic Information

  • Book Title: Fault Tolerant Architectures for Cryptography and Hardware Security

  • Editors: SIKHAR PATRANABIS, Debdeep Mukhopadhyay

  • Series Title: Computer Architecture and Design Methodologies

  • DOI: https://doi.org/10.1007/978-981-10-1387-4

  • Publisher: Springer Singapore

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer Nature Singapore Pte Ltd. 2018

  • Hardcover ISBN: 978-981-10-1386-7Published: 18 April 2018

  • Softcover ISBN: 978-981-13-3819-9Published: 25 December 2018

  • eBook ISBN: 978-981-10-1387-4Published: 29 March 2018

  • Series ISSN: 2367-3478

  • Series E-ISSN: 2367-3486

  • Edition Number: 1

  • Number of Pages: XII, 240

  • Number of Illustrations: 36 b/w illustrations, 39 illustrations in colour

  • Topics: Circuits and Systems, Cryptology, Security Science and Technology

Buy it now

Buying options

eBook USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access