System-on-Chip Architectures and Implementations for Private-Key Data Encryption

System-on-Chip Architectures and Implementations for Private-Key Data Encryption

by: Máire McLoone(Author),John V. McCanny(Author)

Publisher: Springer
Edition:2003rd

Publication Date: 31 Dec. 2003

Language: English

Print Length: 174 pages

ISBN-10: 9780306478826

ISBN-13: 9780306478826

Book Description

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Inteet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation. In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.

About the Author

Review From the reviews:”Security has become a very critical issue in the provision of mobile services. The demands for effective and secure communications in wireless networks are especially notable in the electronics area. … This is an easy book to read. It focuses on efficient hardware implementation for private key algorithms. … From the technical point of view, the book is very good, with enough explanations and solution trade-offs.” (IEEE Circuits & Devices Magazine, Vol. 21 (6), 2005)

获取PDF电子书代发服务10立即求助
1111

未经允许不得转载:Wow! eBook » System-on-Chip Architectures and Implementations for Private-Key Data Encryption

评论