| Where Security Began | p. 1 |
| A Brief History of Cryptography | p. 5 |
| Brief History of the Side Channel | p. 9 |
| Summary | p. 11 |
| References | p. 11 |
| Introduction to Secure Embedded Systems | p. 13 |
| Contact Chip Card or Smart Card | p. 17 |
| Contactless SmartCards and RFID Tags | p. 18 |
| Cell Phones and PDAs | p. 20 |
| Automobiles | p. 21 |
| Game Stations | p. 23 |
| Satellites | p. 24 |
| FPGA, Networks on a Chip | p. 24 |
| Summary | p. 25 |
| References | p. 26 |
| The Key | p. 29 |
| Key Randomness | p. 30 |
| Physically Unclonable Functions | p. 32 |
| Key Lifetime, Freshness, Updating | p. 35 |
| Key Length | p. 36 |
| Key Storage and Authentication Issues | p. 39 |
| Key Types | p. 40 |
| Trusted Platform Module (TPM) | p. 41 |
| Network on Chip Security | p. 43 |
| Summary | p. 47 |
| References | p. 48 |
| Using Keys | p. 49 |
| No Shared Keys | p. 51 |
| Using a Preexisting Shared Key | p. 53 |
| Using Keys in Conventional Crypto | p. 54 |
| Needham-Schroeder | p. 56 |
| Kerberos | p. 57 |
| Public Key Approaches | p. 58 |
| Protocols | p. 59 |
| Mathematics Behind PKC | p. 64 |
| References | p. 73 |
| Elliptic Curve Protocols | p. 75 |
| High-Level Elliptic Curve Computations | p. 79 |
| Performance Improvements | p. 82 |
| The Mathematics Behind Elliptic Curves | p. 84 |
| The Curve Over a Field | p. 84 |
| Point Computations | p. 89 |
| Improving Performance | p. 93 |
| EC Protocols | p. 100 |
| Embedded Implications | p. 105 |
| References | p. 107 |
| Symmetric Key Protocols Including Ciphers | p. 111 |
| The Theory of a Cipher | p. 111 |
| Block Ciphers | p. 115 |
| Rijndael: The Advanced Encryption Standard | p. 116 |
| Cast | p. 122 |
| Tea | p. 124 |
| Hight | p. 125 |
| Present Cipher | p. 127 |
| Stream Ciphers | p. 128 |
| Stream Cipher Principles | p. 129 |
| RC4 | p. 131 |
| Grain | p. 132 |
| Cipher Modes of Operation | p. 133 |
| Authenticated Modes for Encryption | p. 136 |
| Embedded Systems Implications | p. 138 |
| References | p. 141 |
| Data Integrity and Message Authentication | p. 143 |
| Properties of Hash and MAC | p. 145 |
| The Structure of Integrity and Authentication Functions | p. 148 |
| The SHA-2 Function | p. 152 |
| Integrity Trees | p. 154 |
| Embedded Implications | p. 157 |
| References | p. 160 |
| Side Channel Attacks on the Embedded System | p. 163 |
| The Side Channel | p. 163 |
| Theory of the Side Channel | p. 164 |
| The Side Channel Attack in Practice | p. 166 |
| Setting up a SCA | p. 174 |
| What is Simple Analysis | p. 176 |
| Differential Analysis | p. 179 |
| Correlalion Analysis | p. l89 |
| Differential Frequency Analysis | p. 190 |
| Experiments on PDAs | p. 191 |
| EM Results | p. 195 |
| Experiments with Contactless Chip Cards | p. 215 |
| The SCA Timeline and Future Technologies | p. 218 |
| References | p. 220 |
| Countermeasures | p. 223 |
| Misalignment Countermeasures | p. 224 |
| Masking Countermeasures | p. 228 |
| S-Box Output Masking | p. 230 |
| Evaluating Countermeasures and Higher Order Analysis | p. 235 |
| Address Masking of S-Box | p. 243 |
| Countermeasures for Public Key Cryptography | p. 247 |
| Summary | p. 254 |
| Second-Order S-box Differential Analysis Derivation | p. 255 |
| Derivation of Third-Order S-box Differential Analysis Statistic | p. 257 |
| References | p. 260 |
| Reliable Testable Secure Systems | p. 263 |
| Reliability and Fault Tolerance | p. 265 |
| SEU-Resistant FPGA Design | p. 269 |
| SEU-Resistant AES Design | p. 271 |
| SEU-Resistant SHA-2 Design | p. 275 |
| Reliable Key Recovery for Satellites | p. 277 |
| Satellite Recovery from Faults and Attacks | p. 279 |
| Testable and FPGA Security | p. 285 |
| Summary | p. 287 |
| References | p. 287 |
| Summary, Standards, and Ongoing Efforts | p. 291 |
| References | p. 294 |
| Index | p. 295 |
| Table of Contents provided by Ingram. All Rights Reserved. |