<P>Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algori
Cryptographic Algorithms on Reconfigurable Hardware
✍ Scribed by Francisco Rodríguez-Henríquez, Arturo Díaz Pérez, Nazar Abbas Saqib, Çetin Kaya Koç (auth.)
- Publisher
- Springer US
- Year
- 2007
- Tongue
- English
- Leaves
- 384
- Series
- Signals and Communication Technology
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis on the practical aspects of reconfigurable hardware design, explaining the basic mathematics related and giving a comprehensive description of state-of-the-art implementation techniques. The authors show how high-speed cryptographic algorithms implementations can be achieved on reconfigurable hardware devices without posing prohibited high requirements for hardware resources. The material in this book will be of interest to engineering professionals, programmers, hardware designers, and graduate students interested in the development of security and cryptographic mechanisms at a beginning/intermediate level.
✦ Table of Contents
Front Matter....Pages I-XXVI
Introduction....Pages 1-5
A Brief Introduction to Modern Cryptography....Pages 7-33
Reconfigurable Hardware Technology....Pages 35-62
Mathematical Background....Pages 63-88
Prime Finite Field Arithmetic....Pages 89-138
Binary Finite Field Arithmetic....Pages 139-188
Reconfigurable Hardware Implementation of Hash Functions....Pages 189-220
General Guidelines for Implementing Block Ciphers in FPGAs....Pages 221-244
Architectural Designs For the Advanced Encryption Standard....Pages 245-289
Elliptic Curve Cryptography....Pages 291-328
Back Matter....Pages 329-362
✦ Subjects
Communications Engineering, Networks; Data Structures, Cryptology and Information Theory; Circuits and Systems; Computer Hardware; Computer Communication Networks; Signal, Image and Speech Processing
📜 SIMILAR VOLUMES
<div><div>Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation&nbsp;involve much&
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic
<p>This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also
<p><span>This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and