Haben Sie Fragen? Einfach anrufen, wir helfen gerne: Tel. 089/210233-0
oder besuchen Sie unser Ladengeschäft in der Pacellistraße 5 (Maxburg) 80333 München
+++ Versandkostenfreie Lieferung innerhalb Deutschlands
Haben Sie Fragen? Tel. 089/210233-0

Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis

24,90 €*

Sofort verfügbar, Lieferzeit: 1-3 Tage

Produktnummer: 18d1f50d5d441e41f39a6a4cae2b2e72bc
Autor: Novotny, Martin
Themengebiete: Hardwareentwurf Kryptologie Multiplizierer Skalierbarkeit
Veröffentlichungsdatum: 24.03.2010
EAN: 9783899663518
Auflage: 1
Sprache: Englisch
Seitenzahl: 194
Produktart: Kartoniert / Broschiert
Verlag: Bochumer Universitätsverlag Westdeutscher Universitätsverlag
Produktinformationen "Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis"
Cryptography and cryptanalysis call for efficient hardware modules. For example, when mounting an attack against a cipher, the attacker's budget and/or hardware resources are typically limited. Efficient implementation of hardware modules allows faster attack and improves cost-performance ratio. In the first part of this thesis, the author focuses on hardware architectures operating over elements of binary finite fields in normal basis representation. Such architectures are applicable e.g. in Elliptic Curve Cryptography, which finds its use in constantly expanding areas of applications. Four new architectures of digit-serial normal basis multipliers are presented. Based on these architectures, a novel structure of a normal basis arithmetic unit is proposed. As the unit is both small and scalable, the design constraints can be met optimally. The second part of the thesis focuses on the cryptanalysis of the A5/1 cipher used in GSM communications. Hardware architectures of two attacks against the A5/1 cipher are presented. They represent the first real-world implementations of attacks against A5/1 reported in open literature. The attacks have been implemented using an existing low-cost special-purpose hardware device: COPACOBANA. The attacks are designed to utilize both the properties of the cipher and the features of underlying reconfigurable hardware. Presented design approaches can be reused when designing attacks against similar ciphers.

Sie möchten lieber vor Ort einkaufen?

Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.

Juristische Fachbuchhandlung
Georg Blendl

Parcellistraße 5 (Maxburg)
8033 München

Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen