Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper gives a way of implementing a high-speed and reliable data conversion between UART and WLAN. After introducing the overview of our system, this paper shows the hardware structure and firmware design in brief. Then we analyze the bottleneck of the data conversion and give a way of how to improve and optimize the firmware to complete a high speed and reliable data conversion in detail. We...
Any endpoint with network connection may be our workbench as new computing models like cloud computing arise. We've designed a protocol to establish the user's trust in public endpoints covering hardware, firmware as well as software components. Three parties are involved for trust establishment: the user with a chip (MTPCM) to actively measure the platform, the endpoint owners who offer the platforms...
The implications of classical technology have been far-reaching and pervasive. In fact, few cryptographers would disagree with the understanding of I/O automata, which embodies the practical principles of software engineering. In this position paper we propose an analysis of lambda calculus (Kie), disconfirming that architecture and telephony can interfere to fulfill this mission.
Advance Encryption Standard (AES), has received significant interest over the past decade due to its performance and security level. In this paper, we propose a compact 8-bit AES crypto-processor for area constrained and low power applications where both encryption and decryption is needed. The cycle count of the design is the least among previously reported 8-bit AES architectures and the throughput...
This paper presents the results of the dependability validation of a cryptoprocessor to SEU effects. The dependability validation was carried out running a testbench, initially using functional simulation, and later using in-system hardware execution. For the fault injection, a modified memory cell and a strategy of pseudorandom generation of states into FSMs are proposed. The testbench was simulated...
Square root extraction over GF(2m) is introduced and a new hardware architecture for exponentiation over GF(2m) based on the square root extraction is proposed. Compared with the classical square-and-multiply architecture, the proposed architecture is shown to calculate exponentiation with fewer cycles over GF(2m) in most cases.
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of...
As well known, the courseware must work effectively. Given the current status of omniscient communication, cryptographers shockingly desire the unproven unification of redundancy and object-oriented languages, which embodies the confusing principles of metamorphic machine learning. In order to address this issue, we prove not only that erasure coding and Lamport clocks are rarely incompatible, but...
This paper presents the design and implementation of a Mobile Trusted Module (MTM), which should satisfy small area and low-power condition. Unlike the general Trusted Platform Module (TPM) for PCs, the MTM, that is to be employed in mobile devices, has very stringent limitations with respect to available power, circuit area and so on. Therefore, MTM needs the spatially-optimized architecture and...
This paper presents the design and implementation of a Mobile Trusted Module (MTM) which should satisfy small area and low-power condition. Unlike the general Trusted Platform Module (TPM) for PCs, the MTM, that is to be employed in mobile devices, has very stringent limitations with respect to available power, circuit area and so on. Therefore, a MTM needs the spatially-optimized architecture and...
This paper describes a Cuckoo-based Pattern Matching (CPM) engine based on a recently developed hashing algorithm called Cuckoo Hashing. We implement the improved parallel Cuckoo Hashing suitable for hardware-based multi-pattern matching with arbitrary length. CPM can rapidly update the static pattern set without reconfiguration while consuming the lowest amount of hardware. With the power of massively...
Elliptic Curve Point Multiplication is the main operation employed in all elliptic curve cryptosystems, as it forms the basis of the Elliptic Curve Discrete Logarithm Problem. Therefore, the efficient realization of an Elliptic Curve Point Multiplier is of fundamental importance, as its performance is decisive for the performance of the overall cryptosystem. This work presents the first practical...
Within the context of cryptographic hardware, the term scalability refers to the ability to process operands of any size, regardless of the precision of the underlying datapath or registers. In this paper we present a simple yet effective technique for increasing the scalability of a fixed-precision Montgomery multiplier. Our idea is to extend the datapath of a Montgomery multiplier in such a way...
Advanced Encryption Standard (AES) is adopted as the standard for symmetric key cryptosystem. Hash functions are used as building blocks in various cryptographic applications. Whirlpool is one of the best known hash function reported in the literature. Many hardware based implementations of AES and Whirlpool have been proposed on separate chips. This paper presents an efficient hardware design for...
The development of electronic methodologies is a confusing obstacle. Given the current status of linear-time epistemologies, cyberneticists dubiously desire the saturated hardware and architecture. In this paper, we argue that even though electronic methodologies can be made stable, adaptive, and relational, the well-known saturated hardware and architecture for the development of linked lists by...
This paper addresses design, hardware implementation and performance testing of AES algorithm. An optimized code for the Rijndael algorithm with 128-bit keys has been developed. The area and throughput are carefully trading off to make it suitable for wireless military communication and mobile telephony where emphasis is on the speed as well as on area of implementation.
Solutions to security problems are proposed to protect the architecture (secure architecture) and to secure data (cryptography). Security is based on five essential principles which are supposed to guarantee the correct execution of both, the program and the communication. These five principles are confidentiality (encryption), integrity, availability, authenticity and nonrepudiations. Embedded systems...
In this paper, improved architectures are proposed for implementation of S-Box and inverse S-Box needed in the Advanced encryption standard (AES) algorithm. These use combinational logic only for implementing SubByte (S-box) and InvSubByte (Inverse S-box). The composite field arithmetic used for implementing S-Box in lower-order Galois field (GF) investigated by several authors recently is used as...
Embedded systems have become pervasive in our society. Their reliable and trustworthy operation thus is essential, and it should come as no surprise that security has been acknowledged as a new dimension in modern embedded systems design. In this paper, we propose a high-security system primitive for secure embedded systems that combines the capabilities of programmable logic, TPM and TrustZone to...
We propose hardware architecture of the advanced encryption standard counter with the cipher block chaining-message authentication code (AES CCM) in the 802.16e standard. It has only one AES encryption core with composite field logic for SBOX. The logic is divided into two parts to perform one round at two clock cycles. In the proposed architecture, the counter (CTR) and the cipher block chaining-message...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.