Skip to main content

Encrypt Hardware Device Based on Cryptographic Algorithm

  • Conference paper
Intelligence Computation and Evolutionary Computation

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 180))

  • 3268 Accesses

Abstract

Information technology has been developing during the past decades, and encryption algorithms are most important to Information technology, in this paper we made some research about some famous international encryption algorithms, such as advanced encryption standard (AES), and Data encryption standard (DES). Smart Cards which are some high-end encryption card are now commonly used all around the world and becoming more and more ubiquitous. We also give a basic discussion of the smart card structure. Encryption algorithms were security enough from the perspective of math, but when realized in hardware, it may possess some electric characteristics, just like electromagnetic or power, which may be used by illegal users to attack the circuit, so the research development of relative resistance technology is important.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Computers 51(5), 541–552 (2002)

    MathSciNet  Google Scholar 

  2. Trichina, E., De Seta, D., Germani, L.: Simplified Adaptive Multiplicative Masking for AES. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 187–197. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Eberle, H.: A High-speed DES Implementa-tion for Network Applications. Technical Re-report, Digital Equipment Corporation Systems Research Center (September 1992)

    Google Scholar 

  4. Hoornaert, F., Goubert, J., Desmedt, Y.G.: Efficient Hardware Implementation of the DES. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 147–173. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  5. Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side Channel(s): Attacks and Assessment Methodologies. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003), http://www.research.ibm.com.intsecemf-paper.ps

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cong, C. (2013). Encrypt Hardware Device Based on Cryptographic Algorithm. In: Du, Z. (eds) Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing, vol 180. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31656-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31656-2_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31655-5

  • Online ISBN: 978-3-642-31656-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics