Tree Parity Machine Rekeying Architectures

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e. small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronisation of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration we evaluate characteristics of a standard-cell ASIC design realisation as IP-core in 0.18-micrometer CMOS-technology.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Tree Parity Machine Rekeying Architectures does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Tree Parity Machine Rekeying Architectures, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tree Parity Machine Rekeying Architectures will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-413282

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.