Abstract
Information technology has been developing during the past decades, and encryption algorithms are most important to Information technology, in this paper we made some research about some famous international encryption algorithms, such as advanced encryption standard (AES), and Data encryption standard (DES). Smart Cards which are some high-end encryption card are now commonly used all around the world and becoming more and more ubiquitous. We also give a basic discussion of the smart card structure. Encryption algorithms were security enough from the perspective of math, but when realized in hardware, it may possess some electric characteristics, just like electromagnetic or power, which may be used by illegal users to attack the circuit, so the research development of relative resistance technology is important.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Computers 51(5), 541–552 (2002)
Trichina, E., De Seta, D., Germani, L.: Simplified Adaptive Multiplicative Masking for AES. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 187–197. Springer, Heidelberg (2003)
Eberle, H.: A High-speed DES Implementa-tion for Network Applications. Technical Re-report, Digital Equipment Corporation Systems Research Center (September 1992)
Hoornaert, F., Goubert, J., Desmedt, Y.G.: Efficient Hardware Implementation of the DES. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 147–173. Springer, Heidelberg (1985)
Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side Channel(s): Attacks and Assessment Methodologies. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003), http://www.research.ibm.com.intsecemf-paper.ps
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cong, C. (2013). Encrypt Hardware Device Based on Cryptographic Algorithm. In: Du, Z. (eds) Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing, vol 180. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31656-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-31656-2_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31655-5
Online ISBN: 978-3-642-31656-2
eBook Packages: EngineeringEngineering (R0)