Secure Hybrid Crypto-system AES/RSA on FPGA for Data Communication
نویسندگان
چکیده
منابع مشابه
Secure Crypto and ECG Steganography Based Data Communication for Wireless Body Sensor Network
The acquisition, processing and secure transmission of a patient’s physiological and physical parameters to a remote location has been done by Patient Tele monitoring System (PTS). The PTS uses the wireless channel for communication of patient’s data which is not secure as wireless channel is open for information being hacked by unauthorized person easily , where there is no patient’s privacy t...
متن کاملSecure and Efficient Crypto System Based On 128-Bit AES
The AES algorithm was selected in 2000 by the US National Institute of Standards and Technologies (NIST) as a replacement to the Data Encryption Standard (DES) cryptographic algorithm. It is based on Rijndael algorithm which is a symmetric-key algorithm that processes fixed data of 128-bit blocks. The AES algorithm is suited for an efficient implementation on a wide range of processors. It can ...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملA Spatial Crypto Technique for Secure Data Transmission
This paper presents a spatial encryption technique for secured transmission of data in networks. The algorithm is designed to break the ciphered data packets into multiple data which are to be packaged into a spatial template. A secure and efficient mechanism is provided to convey the information that is necessary for obtaining the original data at the receiver-end from its parts in the packets...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Malaysian Journal of Computing and Applied Mathematics
سال: 2020
ISSN: 2636-9400,2636-9397
DOI: 10.37231/myjcam.2020.3.1.38