Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design

In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are adopted to protect the security of network...

متن کامل

design of an analog fuzzy logic controller chip

fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...

15 صفحه اول

A New Design of Encryption/Decryption for Field Applications

Using the concept of one-time pad, in 2009, Ramasamy et al. proposed a new encryption/decryption algorithm for field applications. So the whole protocol has a short valid lifetime such that the secret information captured becomes irrelevant after a lapse of time. However, this article presents that Ramasamy et al.’s method is still vulnerable. Based on the geometric property of line, we propose...

متن کامل

Security Module: Security Design Patterns

Description Software design patterns are solutions to problems that arise regularly during software design. They are meant to serve as readily applicable, time-saving strategies for software development. The structured documentation that accompanies a properly defined pattern allows developers to quickly identify and apply patterns to a given problem. Security patterns are software design patte...

متن کامل

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Soft Computing and Software Engineering

سال: 2012

ISSN: 2251-7545

DOI: 10.7321/jscse.v2.n7.3