Encrypt Hardware Device Based on Cryptographic Algorithm

  • Conference paper
Intelligence Computation and Evolutionary Computation

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 180))

  • 3295 Accesses

Abstract

Information technology has been develo** during the past decades, and encryption algorithms are most important to Information technology, in this paper we made some research about some famous international encryption algorithms, such as advanced encryption standard (AES), and Data encryption standard (DES). Smart Cards which are some high-end encryption card are now commonly used all around the world and becoming more and more ubiquitous. We also give a basic discussion of the smart card structure. Encryption algorithms were security enough from the perspective of math, but when realized in hardware, it may possess some electric characteristics, just like electromagnetic or power, which may be used by illegal users to attack the circuit, so the research development of relative resistance technology is important.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 245.03
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 320.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Computers 51(5), 541–552 (2002)

    MathSciNet  Google Scholar 

  2. Trichina, E., De Seta, D., Germani, L.: Simplified Adaptive Multiplicative Masking for AES. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 187–197. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Eberle, H.: A High-speed DES Implementa-tion for Network Applications. Technical Re-report, Digital Equipment Corporation Systems Research Center (September 1992)

    Google Scholar 

  4. Hoornaert, F., Goubert, J., Desmedt, Y.G.: Efficient Hardware Implementation of the DES. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 147–173. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  5. Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side Channel(s): Attacks and Assessment Methodologies. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003), http://www.research.ibm.com.intsecemf-paper.ps

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cong, C. (2013). Encrypt Hardware Device Based on Cryptographic Algorithm. In: Du, Z. (eds) Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing, vol 180. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31656-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31656-2_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31655-5

  • Online ISBN: 978-3-642-31656-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation