+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Embedded Cryptography 3. Edition No. 1. ISTE Invoiced

  • Book

  • 352 Pages
  • February 2025
  • John Wiley and Sons Ltd
  • ID: 6036222

Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms.

The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field.

Embedded Cryptography 3 is dedicated to white-box cryptography, randomness and key generation, as well as real world applications and attacks in the wild.

Table of Contents

Preface xiii
Emmanuel PROUFF, Guénaël RENAULT, Matthieu RIVAIN and Colin O'FLYNN

Part 1. White-Box Cryptography 1

Chapter 1. Introduction to White-Box Cryptography 3
Pierre GALISSANT and Louis GOUBIN

1.1. Introductory remarks 3

1.2. Basic notions for white-box cryptography 6

1.3. Proposed (and broken) solutions 9

1.4. Generic strategies to build white-box implementations 12

1.5. Applications of white-box cryptography 15

1.6. Notes and further references 17

1.7. References 19

Chapter 2. Gray-Box Attacks against White-Box Implementations 23
Aleksei UDOVENKO

2.1. Introduction 23

2.2. Specifics of white-box side-channels 24

2.3. Fault injections 30

2.4. Exact matching attack 35

2.5. Linear decoding analysis/algebraic attacks 39

2.6. Countermeasures against the algebraic attack 43

2.7. Conclusions 49

2.8. Notes and further references 50

2.9. References 50

Chapter 3. Tools for White-Box Cryptanalysis 53
Philippe TEUWEN

3.1. Introduction 53

3.2. Tracing programs 55

3.3. Target recognition 57

3.4. Acquiring traces for side-channel analysis 59

3.5. Preprocessing traces 61

3.6. Differential computation analysis 62

3.7. Linear decoding analysis also known as algebraic attack 64

3.8. Injecting faults 65

3.9. Differential fault analysis 67

3.10. Coping with external encodings 69

3.11. Conclusion 70

3.12. Notes and further references 70

3.13. References 72

Chapter 4. Code Obfuscation 73
Sebastian SCHRITTWIESER and Stefan KATZENBEISSER

4.1. Introduction 73

4.2. Obfuscation methods 76

4.3. Attacks against obfuscation 85

4.4. Application of code obfuscation 87

4.5. Conclusions 89

4.6. Notes and further references 89

4.7. References 90

Part 2. Randomness and Key Generation 93

Chapter 5. True Random Number Generation 95
Viktor FISCHER, Florent BERNARD and Patrick HADDAD

5.1. Introduction 95

5.2. TRNG design 96

5.3. Randomness and sources of randomness 97

5.4. Randomness extraction and digitization 100

5.5. Post-processing of the raw binary signal 104

5.6. Stochastic modeling and entropy rate management of the TRNG 105

5.7. TRNG testing and testing strategies 109

5.8. Conclusion 113

5.9. Notes and further references 113

5.10. References 114

Chapter 6. Pseudorandom Number Generation 115
Jean-René REINHARD and Sylvain RUHAULT

6.1. Introduction 115

6.2. PRNG with ideal noise source 116

6.3. PRNG with imperfect noise sources 121

6.4. Standard PRNG with inputs 125

6.5. Notes and further references 128

6.6. References 129

Chapter 7. Prime Number Generation and RSA Keys 131
Marc JOYE and Pascal PAILLIER

7.1. Introduction 131

7.2. Primality testing methods 133

7.3. Generation of random units 133

7.4. Generation of random primes 136

7.5. RSA key generation 140

7.6. Exercises 143

7.7. Notes and further references 144

7.8. References 146

Chapter 8. Nonce Generation for Discrete Logarithm-Based Signatures 151
Akira TAKAHASHI and Mehdi TIBOUCHI

8.1. Introduction 151

8.2. The hidden number problem and randomness failures 153

8.3. Lattice attacks 154

8.4. Fourier transform attack 160

8.5. Preventing randomness failures 166

8.6. Notes and further references 167

8.7. Acknowledgment 169

8.8. References 169

Chapter 9. Random Error Distributions in Post-Quantum Schemes 173
Thomas PREST

9.1. Introduction 173

9.2. Why post-quantum schemes need random errors 174

9.3. Distributions for random errors 178

9.4. Sampling algorithms 184

9.5. Notes and further references 193

9.6. References 197

Part 3. Real-World Applications 203

Chapter 10. ROCA and Minerva Vulnerabilities 205
Jan JANCAR, Petr SVENDA and Marek SYS

10.1. The Return of Coppersmith's Attack 206

10.2. Minerva 216

10.3. References 222

Chapter 11. Security of Automotive Systems 225
Lennert WOUTERS, Benedikt GIERLICHS and Bart PRENEEL

11.1. Introduction 225

11.2. The embedded automotive attacker 226

11.3. An overview of automotive attacks 227

11.4. Application of physical attacks in automotive security 231

11.5. Case study: Tesla Model X keyless entry system 233

11.6. Conclusion 237

11.7. References 237

Chapter 12. Practical Full Key Recovery on a Google Titan Security Key 245
Laurent IMBERT, Victor LOMNE, Camille MUTCHLER and Thomas ROCHE

12.1. Introduction 245

12.2. Preliminaries 246

12.3. Reverse-engineering and vulnerability of the ECDSA algorithm 249

12.4. A key-recovery attack 252

12.5. Take-home message 255

12.6. References 255

Chapter 13. An Introduction to Intentional Electromagnetic Interference Exploitation 257
José LOPES ESTEVES

13.1. IEMI: history and definition 257

13.2. Information security threats related to electromagnetic susceptibility 259

13.3. Electromagnetic fault injection 260

13.4. Destruction, denial of service 261

13.5. Denial of service on radio front-ends 261

13.6. Signal injection in communication interfaces 262

13.7. Signal injection attacks on sensors and actuators 262

13.8. IEMI-covert channel 263

13.9. Electromagnetic watermarking 269

13.10. Conclusion 273

13.11. References 274

Chapter 14. Attacking IoT Light Bulbs 279
Colin O'FLYNN and Eyal RONEN

14.1. Introduction 279

14.2. Preliminaries 280

14.3. Hardware AES and AES-CTR attacks 282

14.4. AES-CCM bootloader attack 286

14.5. Application of attack 293

14.6. Notes and further references 294

14.7. References 295

List of Authors 297

Index 301

Summary of Volume 1 305

Summary of Volume 2 313

Authors

Emmanuel Prouff ANSSI, France. Guenael Renault ANSSI, France. Mattieu Rivain CryptoExperts, France. Colin O'Flynn Dalhousie University, Canada.