Secure Integrated Circuits and Systems

As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designe

  • PDF / 6,027,587 Bytes
  • 250 Pages / 501.591 x 765.837 pts Page_size
  • 118 Downloads / 254 Views

DOWNLOAD

REPORT


Ingrid M.R. Verbauwhede Editor

Secure Integrated Circuits and Systems 1 23

Integrated Circuits and Systems

Series Editor Anantha Chandrakasan, Massachusetts Institute of Technology Cambridge, Massachusetts

For other titles published in this series, go to http://www.springer.com/series/7236

Ingrid M.R. Verbauwhede Editor

Secure Integrated Circuits and Systems

12 3

Editor Ingrid M.R. Verbauwhede Department of Elektrotechniek (ESAT) Katholieke Universiteit Leuven COSIC Division Kasteelpark Arenberg 10 3001 Leuven Belgium [email protected]

ISSN 1558-9412 ISBN 978-0-387-71827-9 e-ISBN 978-0-387-71829-3 DOI 10.1007/978-0-387-71829-3 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2009942092 c Springer Science+Business Media, LLC 2010  All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

Security is as strong as the weakest link. The mathematical design and analysis of cryptographic algorithms has evolved a lot over the last decades (ever since the invention of public key cryptography at the end of the 1970s). The mathematical strength of the cryptographic algorithms is now at such a level that the attacker will choose the ‘implementation’ as the weak link in the chain. Many incidents have been reported for hardware and software implementations. Even the human factor, forgetting or using easy passwords, is often the weak link. Weak implementations are becoming an even bigger problem as more and more information processing moves to small portable embedded devices. These small devices are cheap, lightweight, easy to carry around, and also easy to loose. The need for embedded security is omnipresent in cell phones, PDA’s, medical devices, automotive, consumer, smart cards, RFID tags, sensor nodes, and so on. At the other end of the spectrum computations and storage of sensitive data move from hard disks on our personal PCs to central servers and to the so-called clouds. Also in these environments efficient and secure implementations are a necessity to provide security and privacy. The goal of this book, Secure Integrated Circuits and Systems, is to give the integrated circuits and system designer an insight in the basics of security and cryptography from the implementation viewpoint. This means