tailieunhanh - Báo cáo hóa học: " Research Article Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip | Hindawi Publishing Corporation EURASIP Journal on Embedded Systems Volume 2007 Article ID 65751 9 pages doi 2007 65751 Research Article Supporting Symmetric 128-bit AES in Networked Embedded Systems An Elliptic Curve Key Establishment Protocol-on-Chip Roshan Duraisamy 1 Zoran Salcic 1 Maurizio Adriano Strangio 2 and Miguel Morales-Sandoval3 1 Department of Electrical and Computer Engineering The University of Auckland Auckland 1142 New Zealand 2 Department of Information Systems and Production University of Rome Tor Vergata 00173 Rome Italy 3 Computer Science Department National Institute for Astrophysics Optics and Electronics 72840 Puebla Mexico Received 14 July 2006 Revised 2 November 2006 Accepted 12 December 2006 Recommended by Sandro Bartolini The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper we propose a pure hardware implementation of a key agreement protocol which uses the elliptic curve Diffie-Hellmann and digital signature algorithms and enables two parties a remote agent and a networked embedded system to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme AES . The resulting implementation is a protocol-on-chip that supports full 128-bit equivalent security PoC-128 . The PoC-128 has been implemented in an FPGA but it can also be used as an IP within different embedded applications. As 128-bit security is conjectured valid for the foreseeable future the PoC-128 goes well beyond the state of art in securing networked embedded devices. Copyright 2007 Roshan Duraisamy et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. INTRODUCTION Securing .

TÀI LIỆU LIÊN QUAN