Lightweight Security Hardware Architecture Using DWT and AES Algorithms
نویسندگان
چکیده
منابع مشابه
AES Based Security Architecture Of WIMAX Using OMNET++
Although WiMAX is considered to be the last mile protocol but its security still remains a question because it neither encrypts the MAC (Media access control) headers nor the media MAC management messages. Therefore, an attacker can easily launch passive attacks to monitor WiMAX traffic and can retrieve valuable information from unencrypted MAC management messages. This research paper focuses o...
متن کاملHybrid Security Algorithms for Data Transmission using AES-DES
The fast evolution of digital data exchange has forced the information security to be of much important in data storage and transmission. As large amount of data is transmitted over the network, it is preliminary to secure all types of data before sending them. The problem with AES, most extensively used encryption is that it uses many multi variant equations which are linear in nature. Thus it...
متن کاملA Highly Regular and Scalable AES Hardware Architecture
This article presents a highly regular and scalable AES hardware architecture, suited for full-custom as well as for semicustom design flows. Contrary to other publications, a complete architecture (even including CBC mode) that is scalable in terms of throughput and in terms of the used key size is described. Similarities of encryption and decryption are utilized to provide a high level of per...
متن کاملUMTS security: system architecture and hardware implementation
Universal mobile telecommunication system (UMTS) has specified security mechanisms with extra features compared to the security mechanisms of previous mobile communication systems (GSM, DECT). A hardware implementation of the UMTS security mechanism is presented in this paper. The proposed VLSI system supports the Authentication and Key Agreement procedure (AKA), the data confidentiality proced...
متن کاملA High-Speed Unified Hardware Architecture for 128 and 256-bit Security Levels of AES and Grøstl
One of the five final SHA-3 candidates, Grøstl, has been inspired by the Advanced Encryption Standard. This unique feature can be exploited in a large variety of practical applications. In order to have a better picture of the Grøstl-AES computational efficiency (high-level scheduling, internal pipelining, resource sharing, etc.), we designed a high-speed coprocessor for the Grøstl-based HMAC a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2018
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.2018edp7174