1st Edition

Circuits and Systems for Security and Privacy

Edited By Farhana Sheikh, Leonel Sousa Copyright 2016
    406 Pages 11 Color & 109 B/W Illustrations
    by CRC Press

    406 Pages 11 Color & 109 B/W Illustrations
    by CRC Press

    406 Pages 11 Color & 109 B/W Illustrations
    by CRC Press

    Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.

    Introduction
    Farhana Sheikh and Leonel Sousa

    Mathematics and Cryptography
    David O. Novick

    Block Ciphers
    Deniz Toz, Josep Balasch, and Farhana Sheikh

    Secure Hashing: SHA-1, SHA-2, and SHA-3
    Ricardo Chaves, Leonel Sousa, Nicolas Sklavos, Apostolos P. Fournaris, Georgina Kalogeridou, Paris Kitsos, and Farhana Sheikh

    Public Key Cryptography
    Nathaniel Pinckney, David Money Harris, Nan Jiang, Kyle Kelley, Samuel Antao, and Leonel Sousa

    Physically Unclonable Functions: A Window into CMOS Process Variations
    Raghavan Kumar, Xiaolin Xu, Wayne Burleson, Sami Rosenblatt, and Toshiaki Kirihata

    Random Number Generators for Cryptography
    Viktor Fischer and Patrick Haddad

    Side-Channel Attacks
    Josep Balasch, Oscar Reparaz, Ingrid Verbauwhede, Sorin A. Huss, Kai Rohde, Marc Stöttinger, and Michael Zohne

    Remarks and Conclusion
    Farhana Sheikh and Leonel Sousa

    Biography

    Farhana Sheikh earned her B.Eng. in systems and computer engineering with high distinction, as well as the Chancellor’s Medal, from Carleton University. She earned her M.Sc. and Ph.D. in electrical engineering and computer science from the University of California, Berkeley. She has worked as a software engineer, senior manager, senior research scientist, and staff scientist at several prestigious technology companies. She is currently a senior staff scientist and the technical manager of a digital communications lab for an industry-leading Fortune 500 technology corporation. An IEEE senior member, Dr. Sheikh has coauthored several publications, filed more than 10 patents, and received numerous awards.

    Leonel Sousa earned his Ph.D. in electrical and computer engineering from the Instituto Superior Técnico, Universidade de Lisboa, where he is currently full professor. He is also senior researcher with the Instituto de Engenharia de Sistemas e Computadores - Investigação e Desenvolvimento. He has contributed to 200+ technical papers, for which he received many awards. An IEEE and ACM senior member and IET fellow, Dr. Sousa has served as keynote presenter and program, general, and topic chair at numerous conferences. He has edited three special issues and is presently associate editor of several journals. He is also editor-in-chief of the EURASIP Journal on Embedded Systems.

    "[This book] discusses side-channel attacks and efficient implementations, analysis of advantages, disadvantages, and attack-resistance on various topics such as symmetric-key algorithms, public-key algorithms, hash functions, RNGs, and PUFs. This definitely makes the book stand out from rest. … The book is suitable for unfamiliar readers to learn more about the topic as well as a comprehensive resource for more experienced readers to quickly become familiar with the recent trends in this area. It helps the reader to design efficient accelerators used in security applications as well as the development of security-aware circuits and systems. The topics covered make the book suitable for both industry and academia. Furthermore, the authors discuss real implementations of security systems suitable for both commercial products as well as academic applications. Another positive aspect is the contributions from experts on each topic. This makes the book an ultimate state-of-the-art reference. … The presentation, style of writing, and coverage of side-channel attacks is very good. … [This book is] an extremely valuable addition to the literature on security and privacy that certainly stands out as unique."
    —Dr. Tony Thomas, Indian Institute of Information Technology and Management, Kerala