Cryptographic Coprocessor for Data Integrity Algorithms

被引:0
|
作者
Svasta, Paul [1 ]
Marghescu, Andrei [1 ]
Neacsa, Traian [1 ]
机构
[1] Univ Politehn Bucuresti, CETTI, Bucharest, Romania
来源
PROCEEDINGS OF THE 2014 37TH INTERNATIONAL SPRING SEMINAR ON ELECTRONICS TECHNOLOGY (ISSE) - ADVANCES IN ELECTRONIC SYSTEM INTEGRATION | 2014年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cryptography, for message/data integrity assurances, that are vital for a security product, are used Hash functions. The Hash algorithm is based on a one-way-function that maps an arbitrary-length data to a fixed-length output. This paper will present the usage of the newest hash algorithm SHA-3 - Keccak into an electronic module based on FPGA. This will work, along with an ARM Cortex-A9 microprocessor, as a cryptographic coprocessor. The implemented hardware solution significantly increased the computational speed of the signal data processing.
引用
收藏
页码:91 / 94
页数:4
相关论文
共 50 条
  • [31] S/390 CMOS cryptographic coprocessor architecture: Overview and design considerations
    Yeh, PC
    Smith, RM
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1999, 43 (5-6) : 777 - 794
  • [32] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
    Thabit, Fursan
    Can, Ozgu
    Wani, Rizwan Uz Zaman
    Qasem, Mohammed Ali
    Thorat, S. B.
    Alkhzaimi, Hoda A. A.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [33] Use-case Based Early Performance Simulation of Cryptographic Coprocessor
    Ghosh, Prokash
    Chakravarthy, Kalyana
    2013 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2013, : 56 - 59
  • [34] FPGA implementation of expandable RSA pubic-key cryptographic coprocessor
    Meng, Qiang
    Liu, Yuan-feng
    Dai, Zi-bin
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 552 - +
  • [35] Rapid prototype of a fast data encryption standard with integrity processing for cryptographic applications
    Guendouz, H
    Bouaziz, S
    ISCAS '98 - PROCEEDINGS OF THE 1998 INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-6, 1998, : E434 - E437
  • [36] Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
    Rahul, B.
    Kuppusamy, K.
    IETE JOURNAL OF RESEARCH, 2023, 69 (09) : 6053 - 6064
  • [37] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    CYBERNETICS AND SYSTEMS, 2023,
  • [38] PROOF OF SOUNDNESS (INTEGRITY) OF CRYPTOGRAPHIC PROTOCOLS
    SIMMONS, GJ
    JOURNAL OF CRYPTOLOGY, 1994, 7 (02) : 69 - 77
  • [39] On Physical Obfuscation of Cryptographic Algorithms
    Bringer, Julien
    Chabanne, Herve
    Icart, Thomas
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 88 - 103
  • [40] Principles and performance of cryptographic algorithms
    Preneel, B
    Rijmen, V
    Bosselaers, A
    DR DOBBS JOURNAL, 1998, 23 (12): : 126 - 131