Cryptographic Algorithms on Reconfigurable Hardware- P2

Cryptographic Algorithms on Reconfigurable Hardware- P2: This chapter presents a complete outhne for this Book. It explains the main goals pursued, the strategies chosen to achieve those goals, and a summary of the material to be covered throughout this Book. | 8 Brief Introduction to Modern Cryptography Applications secure email digital cash e-commerce tirewalls etc. Authentication Protocols SSUTLS WTLS IPSEC IEEE etc. Security Services Confidentiality Integrity Authentication Non-repudlatlon -------------------------------- __ Cryptographic Primitives Encryption Decryptlon Slgnature Verifl cation Public-Key Cryptography RSA DSA ECC Private-Key Cryptography AES DES RC4 etc. Computer Arithmetic Addition Substraction Squaring Multiplication Division Exponentiation Square Root Computation Fig. . A Hierarchical Six-Layer Model for Information Security Applications portant cryptographic applications in the industry are studied and analyzed. Furthermore alternatives for the implementation of cryptographic algorithms on various software and hardware platforms are also discussed. Introduction A cryptographic cipher system can hide the actual contents of every message by transforming enciphering it before transmission or storage. The techniques needed to protect data belong to the field of cryptography which can be defined as follows. Definition . We define Cryptography as the discipline that studies the mathematical techniques related to Information security such as providing the security services of confidentiality data integrity authentication and nonrepudiation. In the wide sense cryptography addresses any situation in which one wishes to limit the effects of dishonest users 110 . Security services which include confidentiality data integrity entity authentication and data origin authentication 228 are defined below. Please purchase PDF Split-Merge on to remove this watermark. Secret Key Cryptography 9 Confidentiality It guarantees that the sensitive information can only be accessed by those users entities authorized to unveil it. When two or more parties are involved in a communication the purpose of confidentiality is to guarantee that only those two parties can .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.