A
ACK, 15
AES, 2, 18, 24, 29–32, 39, 210–211
Application Specific Integrated Circuit (ASIC), 106, 115, 118, 123
Asymmetric cryptography, 2–5, 13, 51, 75, 80, 84, 120, 122, 132, 201, 202, 204, 212
Attack space, 6, 7, 11, 42, 45, 171, 179, 203,
Attestation Identity Key (AIK), 108
Authentication, 6, 9–11, 14–16, 47, 52, 55, 58, 62, 67–71, 73, 75–81, 86, 96, 99–100, 104, 107–108, 113, 118, 120, 127–129, 131, 137–138, 140–145, 167–168, 170, 172–173, 178, 186–188, 195, 204–205, 207–208, 212,
B
Bifurcation, 154
Biometrics, 10–11, 62, 67, 80, 128–134, 137–138, 140, 145, 147, 155, 157, 165, 188, 200, 205, 207–212
Birthday paradox, 29, 36, 38–39, 43
Block cipher, 18, 24, 28–29, 40
Bootstrap loading, 60–61, 83–90, 96, 98–99, 106–107, 200, 204, 210–211
Brute force attack, 7, 21, 24, 29, 36, 39, 42–43, 51, 171, 203
Buffer overflow, 61–62, 90–93, 107, 110, 206
C
Certifying Authority (CA), 75–76, 132
Clock skew, 140, 142–143, 196–197
Common Access Card (CAC), 174
Common Criteria (CC), 88
Core Root of Trust for Measurement (CRTM), 84, 106
Crossover, 154
Cryptography
Symmetric, 2, 5, 19, 21, 24, 84, 201–202, 204
Asymmetric, 2, 5, 84, 201–202, 204, 212
D
Deep Crack, 7
DES, 2, 7, 16, 18–19, 21–24, 28, 59, 118, 175
Dictionary attack, 7, 13, 42, 109, 179
Differential power analysis (DPA), 124, 126, 176
Diffie–Helman algorithm, 3
Digital Rights Management (DRM), 111–114, 181, 209
Direct Memory Access (DMA), 64, 87, 110
Dot, 154
E
Electric field sensor, 135, 153
Electrically erasable programmable read only memory (EEPROM), 175
Enrollment, 69–70, 129, 134, 136–137
Entangled photons, 35, 51, 54–55
Evaluation Assurance Level (EAL), 88
F
False Acceptance Rate (FAR), 130–133, 136–139, 154–155, 158–159, 165, 208–209, 212
False Rejection Rate (FRR), 130–133, 137–138, 154–155, 158–159, 165, 208–209, 212
Fast Fourier Transform (FFT), 164
Fingerprint, 9–11, 36, 67–69, 71, 128–130, 132, 134–136, 138, 140, 142–144, 147–155, 159, 165, 195–197, 208, 211
FPGA, 13, 65–66, 115–116, 118–125
G
Geolocation, 143–144, 182–187, 193, 209
GPS, 143–144, 182–183, 185–188, 196
H
Handprint, 10
Hardware based random number generator, 12, 43, 47, 49, 51, 70, 202–203
Hash Algorithms, 36, 63, 71, 111, 200, 203, 210–212
I
Impostor distribution, 130–131
Initial Program Load (IPL), 85
IP spoofing, 16
Iris scan, 69, 132, 138, 156–164, 208
J
Johnson–Nyquist noise, 47
K
Key
Generation, 13, 39, 41, 43, 47, 76, 200, 202, 210–211
Scheduling Algorithm, 25
Strength, 6
L
Lake, 154
Location fingerprint, 144
Location Specific Digital Fingerprint (LSDF), 195
Location technologies, 181–185, 187, 195, 209, 212
Lookup Table (LUT), 116–117, 189, 191
M
Man in the middle attack, 35, 71, 179,
Memory Management, 61, 91–94, 107–108, 110, 200, 206, 210–211
N
O
Optical scanner, 135, 138, 148, 150, 152–153
P
Password, 4–9, 11, 16, 25, 41–42, 53, 56, 63–64, 67, 91, 102–103, 118, 120, 167–168, 172,–173, 175, 177–179, 188,–189, 193, 203, 205, 207–208
Permutation attack, 42
Platform Configuration Register (PCR), 84–86, 89
Power spectrum, 44–47, 49–50, 136, 194–195, 209
PRG, 12–14, 25, 28, 43–44, 46–47, 52–54, 70, 178–179
Pseudo–random number generators, 12–13, 25, 43, 46, 106
Public Key Infrastructure (PKI), 62, 132, 202
Q
Quantum cryptography, 18, 31, 34–35, 50–51, 55, 210
Quantum devices, 49
R
Radio frequency measurements, 144
Radioactive decay, 13
Readback attack, 122
Retinal scan, 10, 69, 137, 161–165, 195, 208, 210
RFID, 10, 70, 137, 168–173, 208
Ridge ending, 154
Ring oscillators, 13
RNG, 43, 54–55, 70–71, 75, 144
S
Secure coprocessor, 58–59, 73–81, 173, 201–202, 204, 212
Secure Hash Algorithm (SHA), 36, 39, 63, 65, 69–70, 72, 111, 203, 210–211
Security Functional Requirement (SFR), 88
Security Target (ST), 88
Short ridge, 154
Shot noise, 47
Similarity score, 130
Simple power analysis (SPA), 124, 176
Smart card, 9–10, 13, 16, 55, 125, 137, 173–177, 208, 211
Spearphishing, 8
Speech recognition, 136
Spur, 154
Static Random Access Memory (SRAM), 123
Substitution attack, 42
Symmetric cryptography, 2, 5, 84, 201–202, 204
System on a Chip (SOC), 65
T
Tamper evident, 50, 55, 57–59, 62, 89, 104, 116, 205
Tamper resistance, 58–59, 62, 71, 74, 77, 94, 106, 108, 126, 205
Target of Evaluation (TOE), 88
Thermogram, 139
Time of flight (TOF), 192, 209
Tokens, 9, 33, 47, 68, 70–71, 81, 97, 103, 167, 171, 173, 177–179, 200, 208–212
Triple DES, 3DES, 2, 18–19, 23–24, 59, 175
Trojan horse, 46, 50–51, 53, 83, 86, 103
Trusted Computing Base (TCB), 88–89
Trusted Computing Group (TCG), 62, 96, 107, 109, 207
Trusted Computing Platform Alliance (TCPA), 105–106, 114
Trusted Execution Technology (TET, TXT), 63–65, 94–99, 200, 206–207, 210, 211
Trusted path, 8
Trusted Platform Module (TPM), 62–65, 84–86, 90, 94–100, 105–111, 113–114, 118, 140, 200, 203, 205–207, 210–211
Trusted Third Party (TTP), 58
Two factor authentication, 9–10, 47, 71, 137
U
Ultrasonic scanner, 60, 135, 148, 152
V
W
Wireless access point (Wi–Fi), 25, 141–142, 144, 189–194, 209
3.145.204.201