INDEX

A

ACK, 15

AES, 2, 18, 24, 2932, 39, 210211

Application Specific Integrated Circuit (ASIC), 106, 115, 118, 123

Asymmetric cryptography, 25, 13, 51, 75, 80, 84, 120, 122, 132, 201, 202, 204, 212

Attack space, 6, 7, 11, 42, 45, 171, 179, 203,

Attestation Identity Key (AIK), 108

Authentication, 6, 911, 1416, 47, 52, 55, 58, 62, 6771, 73, 7581, 86, 96, 99100, 104, 107108, 113, 118, 120, 127129, 131, 137138, 140145, 167168, 170, 172173, 178, 186188, 195, 204205, 207208, 212,

B

Bifurcation, 154

Biometrics, 1011, 62, 67, 80, 128134, 137138, 140, 145, 147, 155, 157, 165, 188, 200, 205, 207212

BIOS, 8485, 109

Birthday paradox, 29, 36, 3839, 43

Block cipher, 18, 24, 2829, 40

Blowfish, 18, 2831,

Bootstrap loading, 6061, 8390, 96, 9899, 106107, 200, 204, 210211

Brownian motion, 4849

Brute force attack, 7, 21, 24, 29, 36, 39, 4243, 51, 171, 203

Buffer overflow, 6162, 9093, 107, 110, 206

C

Capacitive scanner, 135, 153

Certifying Authority (CA), 7576, 132

Clock skew, 140, 142143, 196197

Common Access Card (CAC), 174

Common Criteria (CC), 88

Core Root of Trust for Measurement (CRTM), 84, 106

CRC, 2526

Crossover, 154

Cryptography

Symmetric, 2, 5, 19, 21, 24, 84, 201202, 204

Asymmetric, 2, 5, 84, 201202, 204, 212

D

Deep Crack, 7

DES, 2, 7, 16, 1819, 2124, 28, 59, 118, 175

Dictionary attack, 7, 13, 42, 109, 179

Differential power analysis (DPA), 124, 126, 176

Diffie–Helman algorithm, 3

Digital Rights Management (DRM), 111114, 181, 209

Direct Memory Access (DMA), 64, 87, 110

DNA, 128, 139140

Dot, 154

E

Electric field sensor, 135, 153

Electrically erasable programmable read only memory (EEPROM), 175

Endorsement Key (EK), 107108

Enrollment, 6970, 129, 134, 136137

Entangled photons, 35, 51, 5455

Evaluation Assurance Level (EAL), 88

F

False Acceptance Rate (FAR), 130133, 136139, 154155, 158159, 165, 208209, 212

False Rejection Rate (FRR), 130133, 137138, 154155, 158159, 165, 208209, 212

Fast Fourier Transform (FFT), 164

Fingerprint, 911, 36, 6769, 71, 128130, 132, 134136, 138, 140, 142144, 147155, 159, 165, 195197, 208, 211

FIPS, 59, 72

FPGA, 13, 6566, 115116, 118125

G

Geolocation, 143144, 182187, 193, 209

GPS, 143144, 182183, 185188, 196

H

Handprint, 10

Hardware based random number generator, 12, 43, 47, 49, 51, 70, 202203

Hash Algorithms, 36, 63, 71, 111, 200, 203, 210212

I

IDEA, 18, 24, 28

Impostor distribution, 130131

Initial Program Load (IPL), 85

IP spoofing, 16

Iris scan, 69, 132, 138, 156164, 208

J

Johnson–Nyquist noise, 47

K

Key

Distribution, 5154

Generation, 13, 39, 41, 43, 47, 76, 200, 202, 210211

Scheduling Algorithm, 25

Storage, 8, 13, 5354, 65

Strength, 6

Keystroke timing, 11, 51, 134

L

LaGrande, 63, 91, 94, 206

Lake, 154

Location fingerprint, 144

Location Specific Digital Fingerprint (LSDF), 195

Location technologies, 181185, 187, 195, 209, 212

Lookup Table (LUT), 116117, 189, 191

M

Man in the middle attack, 35, 71, 179,

Memory Management, 61, 9194, 107108, 110, 200, 206, 210211

Memory pointers, 61, 9293

N

Nuclear decay, 4950

O

One–time pad, 18, 202

Optical scanner, 135, 138, 148, 150, 152153

P

Password, 49, 11, 16, 25, 4142, 53, 56, 6364, 67, 91, 102103, 118, 120, 167168, 172,–173, 175, 177179, 188,–189, 193, 203, 205, 207208

Permutation attack, 42

Phishing, 8, 64, 71, 182

Platform Configuration Register (PCR), 8486, 89

Power spectrum, 4447, 4950, 136, 194195, 209

PRG, 1214, 25, 28, 4344, 4647, 5254, 70, 178179

Pseudo–random number generators, 1213, 25, 43, 46, 106

Public Key Infrastructure (PKI), 62, 132, 202

Q

Quantum cryptography, 18, 31, 3435, 5051, 55, 210

Quantum devices, 49

R

Radio frequency measurements, 144

Radioactive decay, 13

RC4, 18, 2428

Readback attack, 122

Retinal scan, 10, 69, 137, 161165, 195, 208, 210

RFID, 10, 70, 137, 168173, 208

Ridge ending, 154

Ring oscillators, 13

RNG, 43, 5455, 7071, 75, 144

Rootkit, 102, 109

S

Secure coprocessor, 5859, 7381, 173, 201202, 204, 212

Secure Hash Algorithm (SHA), 36, 39, 63, 65, 6970, 72, 111, 203, 210211

Security Functional Requirement (SFR), 88

Security Target (ST), 88

Short ridge, 154

Shot noise, 47

Similarity score, 130

Simple power analysis (SPA), 124, 176

Smart card, 910, 13, 16, 55, 125, 137, 173177, 208, 211

Spearphishing, 8

Speech recognition, 136

Spur, 154

SSL, 24, 70

Static Random Access Memory (SRAM), 123

Stream cipher, 18, 24

Substitution attack, 42

Symmetric cryptography, 2, 5, 84, 201202, 204

SYN, 15, 16

System on a Chip (SOC), 65

T

Tamper evident, 50, 55, 5759, 62, 89, 104, 116, 205

Tamper resistance, 5859, 62, 71, 74, 77, 94, 106, 108, 126, 205

Target of Evaluation (TOE), 88

TCP/IP, 1416, 121, 197

Thermal noise, 13, 4748

Thermogram, 139

Time of flight (TOF), 192, 209

Tokens, 9, 33, 47, 68, 7071, 81, 97, 103, 167, 171, 173, 177179, 200, 208212

Trilobite, 195196

Triple DES, 3DES, 2, 1819, 2324, 59, 175

Trojan horse, 46, 5051, 53, 83, 86, 103

Trusted Computing Base (TCB), 8889

Trusted Computing Group (TCG), 62, 96, 107, 109, 207

Trusted Computing Platform Alliance (TCPA), 105106, 114

Trusted Execution Technology (TET, TXT), 6365, 9499, 200, 206207, 210, 211

Trusted path, 8

Trusted Platform Module (TPM), 6265, 8486, 90, 94100, 105111, 113114, 118, 140, 200, 203, 205207, 210211

Trusted Third Party (TTP), 58

Two factor authentication, 910, 47, 71, 137

U

Ultrasonic scanner, 60, 135, 148, 152

V

Voice print, 910

Voice recognition, 136137

W

WEP, 2425, 28

White noise, 4447, 143

Wireless access point (Wi–Fi), 25, 141142, 144, 189194, 209

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.204.201