Electronic Security and Espionage
A Handbook on DIY
Luka Matic
Diese Publikation zitieren
Luka Matic, Electronic Security and Espionage (28.04.2024), Elektor, Aachen, ISBN: 9783895764660
174
Accesses
Accesses
2
Quotes
Quotes
Beschreibung / Abstract
Inhaltsverzeichnis
- BEGINN
- Chapter 1 â— All security problems solved perfectly - or perhaps not?
- 1.1 â— Popular misconceptions
- 1.2 â— Omnipresent, unrecognised, and unaddressed problems
- 1.3 â— Low tech rules - very unintuitive
- 1.4 â— My design philosophy and approach to security
- Chapter 2 â— Methods of Attack
- 2.1 â— Methods to counteract
- 2.2 â— Mathematical crypto-analysis
- 2.3 â— Buffer-overflow
- 2.4 â— Side-channel attacks
- 2.5 â— Hardware Trojans
- 2.6 â— Exploiting inherently insecure physical properties
- Chapter 3 â— Random Number Generators
- 3.1 â— A good RNG as a necessary link in the security chain
- 3.2 â— Types of RNGs available today and possible problems
- 3.3 â— Elektor TRNG solves some problems, but...
- Chapter 4 â— Cryptography on paper, computer, and in the real world
- 4.1 â— Why do cryptosystems fail?
- 4.2 â— More problems and more misconceptions
- 4.3 â— Black-box cryptography
- 4.4 â— Elektor OTP Crypto Shield
- 4.5 â— Tamper-evident Box solves some problems, but...
- Chapter 5 â— A few more cheap and highly secure gadgets
- 5.1 â— SD card-to-SD card copier
- 5.2 â— SD card-to-Cassette tape copier
- 5.3 â— ZMC80 system by Lee Alan Hart
- 5.4 â— Mg-flash analogue memory for Tamper-evident Box
- 5.5 â— Security by obscurity
- 5.6 â— MyNOR CPU-less computer by Dennis Kuschel
- Chapter 6 â— Hands-on!
- 6.1 â— TEMPEST attack demos
- 6.2 â— Buffer-overflow attack demos
- 6.3 â— SRAM burnt-in data recovery
- 6.4 â— Cold-boot attack demo
- Chapter 7 â— A few more ideas to work on
- 7.1 â— SIGSALY-2 “Reloaded†
- 7.2 â— Microwave oven - an innocuous machine?
- 7.3 â— “Funcard† system for secure digital signing and decryption
- 7.4 â— TEMPEST-proof terminal
- 7.5 â— False Morse signature generator
- 7.6 â— Encrypted ROMs
- 7.7 â— Asynchronous computers
- 7.8 â— DIY device-a supervisor for a “suspicious† commercial device
- â— Conclusion
- â— References
- â— Index