System-on-Chip Architectures and Implementations for Private-Key Data Encryption

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, whic...

Full description

Bibliographic Details
Main Authors: McLoone, Máire, McCanny, John V. (Author)
Format: eBook
Language:English
Published: New York, NY Springer US 2003, 2003
Edition:1st ed. 2003
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 04179nmm a2200397 u 4500
001 EB000623437
003 EBX01000000000000000476519
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9781461500438 
100 1 |a McLoone, Máire 
245 0 0 |a System-on-Chip Architectures and Implementations for Private-Key Data Encryption  |h Elektronische Ressource  |c by Máire McLoone, John V. McCanny 
250 |a 1st ed. 2003 
260 |a New York, NY  |b Springer US  |c 2003, 2003 
300 |a XIV, 160 p  |b online resource 
505 0 |a 1 Background Theory -- 1.1. Introduction -- 1.2. Cryptographic Algorithms -- 1.3. Cryptanalysis -- 1.4. Hardware-Based Cryptographic Implementation -- 1.5. AES Development Effort -- 1.6. Rijndael Algorithm Finite Field Mathematics -- 1.7. Conclusions -- 2 Des Algorithm Architectures and Implementations -- 2.1. Introduction -- 2.2. DES Algorithm Description -- 2.3. DES Modes of Operation -- 2.4. Triple-DES -- 2.5. Review of Previous Work -- 2.6. Generic Parameterisable DES IP Architecture Design -- 2.7. Novel Key Scheduling Method -- 2.8. Conclusions -- 3 Rijndael Architectures and Implementations -- 3.1. Introduction -- 3.2. Rijndael Algorithm Description -- 3.3. Review of Rijndael Hardware Implementations -- 3.4. Design of High Speed Rijndael Encryptor Core -- 3.5. Encryptor/Decryptor Core -- 3.6. Performance Results -- 3.7. Conclusions -- 4 Further Rijndael Algorithm Architectures and Implementations -- 4.1. Introduction -- 4.2. Look-Up Table Based Rijndael Architecture -- 4.3. Rijndael Modes of Operation -- 4.4. Overall Generic AES Architecture -- 4.5. Conclusions -- 5 Hash Algorithms and Security Applications -- 5.1. Introduction -- 5.2. Internet Protocol Security (IPSec) -- 5.3. IPSec Authentication Algorithms -- 5.4. IPSec Cryptographic Processor Design -- 5.5. Performance Results -- 5.6. IPSec Cryptographic Processor Use in Other Applications -- 5.7. SHA-384/SHA-512 Processor -- 5.8. Conclusions -- 6 Concluding Summary and Future Work -- 6.1. Concluding Summary -- 6.2. Future work -- Appendix A - Modulo Arithmetic -- Appendix B - DES Algorithm Permutations and S-Boxes -- Appendix C - LUTs Utilised in Rijndael Algorithm -- Appendix D - LUTs in LUT-Based Rijndael Architecture -- Appendix E - SHA-384/SHA-512 Constants -- References 
653 |a Coding and Information Theory 
653 |a Coding theory 
653 |a Cryptography 
653 |a Electrical and Electronic Engineering 
653 |a Electrical engineering 
653 |a Data Structures and Information Theory 
653 |a Electronic circuits 
653 |a Information theory 
653 |a Data encryption (Computer science) 
653 |a Data structures (Computer science) 
653 |a Cryptology 
653 |a Electronic Circuits and Systems 
700 1 |a McCanny, John V.  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
028 5 0 |a 10.1007/978-1-4615-0043-8 
856 4 0 |u https://doi.org/10.1007/978-1-4615-0043-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation. In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation