Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
Summary We provide an overview of selected crypto‐hardware devices, with a special reference to the lightweight electronic implementation of encryption/decryption schemes, hash functions, and true random number generators. In detail, we discuss the hardware implementation of the chief algorithms use...
Uloženo v:
| Vydáno v: | International journal of circuit theory and applications Ročník 45; číslo 2; s. 145 - 169 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Bognor Regis
Wiley Subscription Services, Inc
01.02.2017
|
| Témata: | |
| ISSN: | 0098-9886, 1097-007X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | Summary
We provide an overview of selected crypto‐hardware devices, with a special reference to the lightweight electronic implementation of encryption/decryption schemes, hash functions, and true random number generators. In detail, we discuss the hardware implementation of the chief algorithms used in private‐key cryptography, public‐key cryptography, and hash functions, discussing some important security issues in electronic crypto‐devices, related to side‐channel attacks (SCAs), fault injection attacks, and the corresponding design countermeasures that can be taken. Finally, we present an overview about the hardware implementation of true random number generators, discussing the chief electronic sources of randomness and the types of post‐processing techniques used to improve the statistical characteristics of the generated random sequences. Copyright © 2016 John Wiley & Sons, Ltd.
We provide an overview of selected crypto‐hardware devices, with a special reference to the lightweight electronic implementation of encryption/decryption schemes, hash functions, and true random number generators. In detail, we discuss the hardware implementation of the chief algorithms used in private‐key cryptography, public‐key cryptography, and hash functions, discussing some important security issues in electronic crypto‐devices, related to side‐channel attacks, fault injection attacks, and the corresponding design countermeasures that can be taken. Finally, we present an overview about the hardware implementation of true random number generators, discussing the chief electronic sources of randomness and the types of post‐processing techniques used to improve the statistical characteristics of the generated random sequences. |
|---|---|
| Bibliografie: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ISSN: | 0098-9886 1097-007X |
| DOI: | 10.1002/cta.2296 |