INDEX
A
ACK, 15
AES, 2, 18, 24, 29–32, 39, 210–211
Application Specific Integrated Circuit (ASIC), 106, 115, 118, 123
Asymmetric cryptography, 2–5, 13, 51, 75, 80, 84, 120, 122, 132, 201, 202, 204, 212
Attack space, 6, 7, 11, 42, 45, 171, 179, 203,
Attestation Identity Key (AIK), 108
Authentication, 6, 9–11, 14–16, 47, 52, 55, 58, 62, 67–71, 73, 75–81, 86, 96, 99–100, 104, 107–108, 113, 118, 120, 127–129, 131, 137–138, 140–145, 167–168, 170, 172–173, 178, 186–188, 195, 204–205, 207–208, 212,
B
Bifurcation, 154
Biometrics, 10–11, 62, 67, 80, 128–134, 137–138, 140, 145, 147, 155, 157, 165, 188, 200, 205, 207–212
Birthday paradox, 29, 36, 38–39, 43
Block cipher, 18, 24, 28–29, 40
Bootstrap loading, 60–61, 83–90, 96, 98–99, 106–107, 200, 204, 210–211
Brute force attack, 7, 21, 24, 29, 36, 39, 42–43, 51, 171, 203
Buffer overflow, 61–62, 90–93, 107, 110, 206
C
Certifying Authority (CA), 75–76, 132
Clock skew, 140, 142–143, 196–197
Common Access Card (CAC), 174
Common Criteria (CC), 88
Core Root of Trust for Measurement (CRTM), 84, 106
Crossover, 154
Cryptography
Symmetric, 2, 5, 19, 21, 24, 84, 201–202, 204
Asymmetric, 2, 5, 84, 201–202, 204, 212
D
Deep Crack, 7
DES, 2, 7, 16, 18–19, 21–24, 28, 59, 118, 175
Dictionary attack, 7, 13, 42, 109, 179
Differential power analysis (DPA), 124, 126, 176
Diffie–Helman algorithm, 3
Digital Rights Management (DRM), 111–114, 181, 209
Direct Memory ...
Get Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.