|
Cryptographic Engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), computer engineering (hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate. Below are the main topics that are specifically related to cryptographic engineering: Cryptographic implementations * Hardware architectures for public-key and secret-key cryptographic algorithms * Cryptographic processors and co-processors * Hardware accelerators for security protocols (security processors, network processors, etc.) * True and pseudorandom number generators * Physically unclonable functions (PUFs) * Efficient software implementations of cryptography for embedded processors Attacks against implementations and countermeasures against these attacks * Side channel attacks and countermeasures * Fault attacks and countermeasures * Hardware tamper resistance * Hardware trojans Tools and methodologies * Computer aided cryptographic engineering * Verification methods and tools for secure design * Metrics for the security of embedded systems * Secure programming techniques Applications * Cryptography in wireless applications (mobile phone, WLANs, analysis of standards, etc.) * Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.) * FPGA design security * Hardware IP protection and anti-counterfeiting * Reconfigurable hardware for cryptography * Smart card processors, systems and applications * Security in commercial consumer applications (pay-TV, automotive, domotics, etc.) * Secure storage devices (memories, disks, etc.) * Technologies and hardware for content protection * Trusted computing platforms Interactions between cryptographic theory and implementation issues * New and emerging cryptographic algorithms and protocols targeting embedded devices * Non-classical cryptographic technologies * Special-purpose hardware for cryptanalysis * Formal methods for secure hardware ==Major issues== In modern practice, cryptographic engineering is deployed in crypto systems. Like most engineering design, these are wholly human creations. Most crypto systems are computer software, either embedded in firmware or running as ordinary executable files under an operating system. In some system designs, the cryptography runs under manual direction, in others, it is run automatically, often in the background. Like other software design, and unlike most other engineering, there are few external constraints. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Cryptographic engineering」の詳細全文を読む スポンサード リンク
|