Cryptographic Algorithms on Reconfigurable Hardware

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Author(s): Francisco Rodriguez-Henriquez, N.A. Saqib, Arturo Díaz Pérez, Cetin Kaya Koc
Series: Signals and Communication Technology
Edition: 1
Publisher: Springer
Year: 2006

Language: English
Pages: 384
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;

Front-Matter......Page 1
1 Introduction......Page 25
2 A Brief Introduction to Modern Cryptography......Page 30
3 Reconfigurable Hardware Technology......Page 57
4 Mathematical Background......Page 85
5 Prime Finite Field Arithmetic......Page 111
6 Binary Finite Field Arithmetic......Page 161
7 Reconfigurable Hardware Implementation of
Hash Functions......Page 211
8 General Guidelines for Implementing Block
Ciphers in FPGAs......Page 243
9 Architectural Designs For the Advanced
Encryption Standard......Page 267
10 Elliptic Curve Cryptography......Page 312
Back-Matter......Page 350