Encrypt Hardware Device Based on Cryptographic Algorithm

被引:0
|
作者
Cong, Chen [1 ]
机构
[1] Guangxi Wuzhou Univ, Dept Comp Sci, Wuzhou, Peoples R China
来源
INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION | 2013年 / 180卷
关键词
information security; AES; DES;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information technology has been developing during the past decades, and encryption algorithms are most important to Information technology, in this paper we made some research about some famous international encryption algorithms, such as advanced encryption standard (AES), and Data encryption standard (DES). Smart Cards which are some high-end encryption card are now commonly used all around the world and becoming more and more ubiquitous. We also give a basic discussion of the smart card structure. Encryption algorithms were security enough from the perspective of math, but when realized in hardware, it may possess some electric characteristics, just like electromagnetic or power, which may be used by illegal users to attack the circuit, so the research development of relative resistance technology is important.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
  • [1] FPGA based Hardware Implementation of Hybrid Cryptographic Algorithm for Encryption and Decryption
    Shende, Vikrant
    Kulkarni, Meghana
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 416 - 419
  • [2] Reconfigurable hardware synthesis of the IDEA cryptographic algorithm
    Abdallah, AE
    Damaj, IW
    COMMUNICATING PROCESS ARCHITECTURES 2004, 2004, 62 : 387 - 416
  • [3] Helping Johnny Encrypt: Toward Semantic Interfaces for Cryptographic Frameworks
    Indela, Soumya
    Kulkami, Mukul
    Nayak, Kartik
    Dumitras, Tudor
    ONWARD!'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL SYMPOSIUM ON NEW IDEAS, NEW PARADIGMS, AND REFLECTIONS ON PROGRAMMING AND SOFTWARE, 2016, : 180 - 196
  • [4] Agent Protection based on the use of cryptographic hardware
    Munoz, Antonio
    Mana, Antonio
    Harjani, Rajesh
    Montenegro, Marioli
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 985 - 990
  • [5] A solution based on cryptographic hardware to protect agents
    Muñoz, Antonio
    Maña, Antonio
    Antón, Pablo
    Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, 2010, : 400 - 407
  • [6] Fault-based Attacks on Cryptographic Hardware
    Polian, Ilia
    Kreuzer, Martin
    PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
  • [7] A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm
    Kamucheka, Tendayi
    Nelson, Alexander
    Andrews, David
    Huang, Miaoqing
    2022 21ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT 2022), 2022, : 112 - 112
  • [8] Design of digital image encrypt algorithm based on SVD
    Wang, Suli
    Sun, Xinde
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 942 - 945
  • [9] Embedded cryptographic hardware
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2007, 53 (2-3) : 69 - 71
  • [10] Embedded cryptographic hardware
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    INTEGRATION-THE VLSI JOURNAL, 2007, 40 (01) : 1 - 2