Explore chapters and articles related to this topic
Deep Learning Techniques for Side-Channel Analysis
Published in Sandeep Saini, Kusum Lata, G.R. Sinha, VLSI and Hardware Implementations Using Modern Machine Learning Methods, 2021
Varsha Satheesh Kumar, S. Dillibabu Shanmugam, N. Sarat Chandra Babu
Though cryptographic primitives are theoretically secure, their implementation might be vulnerable due to reasons such as lack of awareness about the adversity and knowledge about validation methodologies. The adopted countermeasure should be adequately vetted to avoid a chain of problems. The adopted evaluation method must be a standard one; otherwise, a proper framework has to be developed and augmented with existing standards for ease of invalidation. Validating security for countermeasure techniques needs a comprehensive testing process, which is lacking in existing standards such as FIPS-140-2 (conformance style testing) and Common Criteria (evaluation style testing). The focus here is on the development of a framework for secure implementation of crypto-primitives against implementation attacks. The framework should be fast, effective, and reliable for analysis. To achieve this effectively, the objective is divided into multiple stages, as shown in Figure 13.1.
BIST for Online Evaluation of PUFs and TRNGs
Published in Mark Tehranipoor, Domenic Forte, Garrett S. Rose, Swarup Bhunia, Security Opportunities in Nano Devices and Emerging Technologies, 2017
Siam U Hussain, Mehrdad Majzoobi, Farinaz Koushanfar
There have been a few studies on online hardware evaluation of TRNGs. Four tests (frequency test, poker test, run test, long run test) from FIPS 140–2 [37] were implemented on FPGA for hardware-based online testing of randomness in Reference 13. They evaluate two TRNG designs presented in References 45 and 46 based on those four tests. In Reference 14, 8 tests out of 15 NIST randomness tests were simplified for constant test sequence length and implemented in hardware (FPGA). Reference 15 implemented 9 tests from the NIST suite for on-the-fly testing of TRNGs. While operations like counting ones and zeros, finding the maximal longest run of the same value and keeping track of a random walk were implemented in hardware, all other operations including addition, multiplication, etc. were performed in an on-chip processor. The latter two work focus only on the implementation of the tests; they do not provide any TRNG evaluation results.
Contemporary Wireless Technologies
Published in G. S. V. Radha Krishna Rao, G. Radhamani, WiMAX, 2007
G. S. V. Radha Krishna Rao, G. Radhamani
WPA2 (Wi-Fi Protected Access 2) provides network administrators with a high level of assurance that only authorized users can access the network. Based on the ratified IEEE 802.11i standard, WPA2 provides government-grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2-compliant AES encryption algorithm. WPA2 can be enabled in two versions — WPA2-Personal and WPA2-Enterprise. WPA2-Personal protects unauthorized network access by utilizing a setup password. WPA2-Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.
Addressing some of bill of lading issues using the Internet of Things and blockchain technologies: a digitalized conceptual framework
Published in Maritime Policy & Management, 2023
Elnaz Irannezhad, Hamed Faroqi
In terms of security, six main vulnerabilities are as follows: (i) tampering with data; (ii) identity stealing; (iii) IoT communication channel attack; (iv) collusion; (v) spamming; and (vi) network disconnection. Due to sophisticated cryptography encryption algorithms, not only transactions information are tamper-proof but also the privacy of identities are maintained due to introducing private and public keys. Nevertheless, the encrypted private keys stored on machines connected to the internet are vulnerable to hacking attempts. There have also been evidences of hacking the offline security modules or hardware wallets. To create more confidence in securing the storage of private keys, standards can be adopted such as security standard ‘FIPS 140–2 level 4 certification’ which has been used by the US Government to approve cryptographic modules. Moreover, the data flow from and to the smart gates can be tampered, but this can be prevented by encrypting protocols and confidential IoT-based communication channels (see e.g. Yaqoob et al. 2019).