首页> 外文会议>International Conference on Computational Intelligence and Security(CIS 2005) pt.2; 20051215-19; Xi'an(CN) >Design and Implementation of Crypto Co-processor and Its Application to Security Systems
【24h】

Design and Implementation of Crypto Co-processor and Its Application to Security Systems

机译:加密协处理器的设计与实现及其在安全系统中的应用

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we will present the design and implementation of the crypto coprocessors which can be used for providing the RFID security. By analyzing the power consumption characteristics of our crypto coprocessors, we can see which crypto algorithms can be used for highly resource constrained applications such as RFID. To provide the security mechanism such as integrity and authentication between the RFID tag and the RFID reader, crypto algorithm or security protocol should be implemented at the RFID tag and reader. Moreover, the security mechanism in the RFID tag should be implemented with low power consumption because the resources of RFID tag are highly constrained, that is, the RFID tag has low computing capability and the security mechanism which operates in the RFID tag should be low power consumed. After investigating the power consumption characteristics of our designed crypto processors, we will conclude which crypto algorithm is suitable for providing the security of RFID systems.
机译:在本文中,我们将介绍可用于提供RFID安全性的密码协处理器的设计和实现。通过分析我们的加密协处理器的功耗特性,我们可以看到哪些加密算法可用于资源高度受限的应用(例如RFID)。为了在RFID标签和RFID阅读器之间提供诸如完整性和身份验证之类的安全机制,应在RFID标签和阅读器上实施加密算法或安全协议。而且,由于RFID标签的资源受到高度限制,即RFID标签的计算能力较低,并且在RFID标签中运行的安全机制应为低功耗,因此RFID标签中的安全机制应以低功耗实现。消耗。在研究了我们设计的加密处理器的功耗特性之后,我们将得出结论,哪种加密算法适合于提供RFID系统的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号