Electronic Security and Espionage

A Handbook on DIY

Luka Matic

Diese Publikation zitieren

Luka Matic, Electronic Security and Espionage (28.04.2024), Elektor, Aachen, ISBN: 9783895764660

174
Accesses
2
Quotes

Beschreibung / Abstract

Inhaltsverzeichnis

  • BEGINN
  • Chapter 1 ● All security problems solved perfectly - or perhaps not?
  • 1.1 ● Popular misconceptions
  • 1.2 ● Omnipresent, unrecognised, and unaddressed problems
  • 1.3 ● Low tech rules - very unintuitive
  • 1.4 ● My design philosophy and approach to security
  • Chapter 2 ● Methods of Attack
  • 2.1 ● Methods to counteract
  • 2.2 ● Mathematical crypto-analysis
  • 2.3 ● Buffer-overflow
  • 2.4 ● Side-channel attacks
  • 2.5 ● Hardware Trojans
  • 2.6 ● Exploiting inherently insecure physical properties
  • Chapter 3 ● Random Number Generators
  • 3.1 ● A good RNG as a necessary link in the security chain
  • 3.2 ● Types of RNGs available today and possible problems
  • 3.3 ● Elektor TRNG solves some problems, but...
  • Chapter 4 ● Cryptography on paper, computer, and in the real world
  • 4.1 ● Why do cryptosystems fail?
  • 4.2 ● More problems and more misconceptions
  • 4.3 ● Black-box cryptography
  • 4.4 ● Elektor OTP Crypto Shield
  • 4.5 ● Tamper-evident Box solves some problems, but...
  • Chapter 5 ● A few more cheap and highly secure gadgets
  • 5.1 ● SD card-to-SD card copier
  • 5.2 ● SD card-to-Cassette tape copier
  • 5.3 ● ZMC80 system by Lee Alan Hart
  • 5.4 ● Mg-flash analogue memory for Tamper-evident Box
  • 5.5 ● Security by obscurity
  • 5.6 ● MyNOR CPU-less computer by Dennis Kuschel
  • Chapter 6 ● Hands-on!
  • 6.1 ● TEMPEST attack demos
  • 6.2 ● Buffer-overflow attack demos
  • 6.3 ● SRAM burnt-in data recovery
  • 6.4 ● Cold-boot attack demo
  • Chapter 7 ● A few more ideas to work on
  • 7.1 ● SIGSALY-2 “Reloaded†
  • 7.2 ● Microwave oven - an innocuous machine?
  • 7.3 ● “Funcard† system for secure digital signing and decryption
  • 7.4 ● TEMPEST-proof terminal
  • 7.5 ● False Morse signature generator
  • 7.6 ● Encrypted ROMs
  • 7.7 ● Asynchronous computers
  • 7.8 ● DIY device-a supervisor for a “suspicious† commercial device
  • ● Conclusion
  • ● References
  • ● Index

Ähnliche Titel

    Mehr von diesem Autor