Encyclopedia of Cryptography and Security

2011 Edition
| Editors: Henk C. A. van Tilborg, Sushil Jajodia

Tamper Detection

  • Tom Caddy
Reference work entry
DOI: https://doi.org/10.1007/978-1-4419-5906-5_229

Related Concepts


Tamper detection is the ability of a device to sense that an active attempt to compromise the device integrity or the data associated with the device is in progress; the detection of the threat may enable the device to initiate appropriate defensive actions.

Theory and Applications

The tamper detection design can be implemented to sense different types, techniques, and sophistication of tampering, depending on the perceived threats and risks.

The methods used for tamper detection are typically designed as a suite of sensors each specialized on a single threat type, some of which may be physical penetration, hot or cold temperature extremes, input voltage variations, input frequency variations, x-rays, and gamma rays.

Examples of techniques used to detect tampering may include any or all of the following: switches to detect the opening of doors or access covers, sensors to detect changes in light or...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    FIPS 140–2 National Institute of Standards and Technology (NIST) federal information processing standard. Cryptographic module validation programGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Tom Caddy
    • 1
  1. 1.InfoGard LaboratoriesSan Luis ObispoUSA