Architectures for Advanced Cryptographic Systems

Architectures for Advanced Cryptographic Systems

Guido Bertoni (Politecnico di Milano, Italy), Jorge Guajardo (Infineon Technologies AG, Germany) and Christof Paar (Ruhr Universitat Bochum, Germany)
DOI: 10.4018/978-1-59140-186-5.ch001
OnDemand PDF Download:


In the last 20-30 years, the world of modern cryptography has been largely dominated by traditional systems such as the Data Encryption Standard and the RSA algorithm. Such systems have provided a secure way for storing and transmitting information and they are nowadays incorporated in many network protocols and secure storage media. More recently, the increasing advance of crypto-analytical techniques and tools and the emergence of new applications, for example wireless communications and mobile computing, have stimulated the research and development of innovative cryptographic algorithms. These newer systems require a more detailed and sophisticated mathematical formalization and operations, which are not normally supported by general-purpose processors. For example, many basic operations required to implement recently proposed cryptographic algorithms, such as the Advanced Encryption Standard or Elliptic Curve Cryptosystems, are based on arithmetic in finite fields (or Galois fields). This chapter is, thus, intended to give an overview of such developments in modern cryptography. In particular, it aims at giving the reader a comprehensive understanding of innovative cryptosystems, their basic structure, alternative existing hardware architectures to implement them, and their performance requirements and characterizations. Emphasis will be made throughout on two important cases: the Advanced Encryption Standard and Elliptic Curve Cryptosystems.

Complete Chapter List

Search this Book:
Table of Contents
Maria Grazia Fugini, Carlo Bellettini
Chapter 1
Guido Bertoni, Jorge Guajardo, Christof Paar
In the last 20-30 years, the world of modern cryptography has been largely dominated by traditional systems such as the Data Encryption Standard and... Sample PDF
Architectures for Advanced Cryptographic Systems
Chapter 2
Diana Berbecaru, Corrado Derenale, Antonio Lioy
The technical solutions and organizational procedures used to manage certificates are collectively named Public Key Infrastructure (PKI). The... Sample PDF
Digital Certificates and Public-Key Infrastructures
Chapter 3
Gerald Maradan, Pierre Cotte, Thierry Fornas
Securing data is becoming of the utmost strategic importance in today’s digital environment. Open wide networks such as the Internet and... Sample PDF
Smart Card Applications and Systems: Market Trend and Impact on Other Technological Development
Chapter 4
Duminda Wijesekera, Sushil Jajodia
Advances in application areas such as Internet-based transactions, cooperating coalitions, and workflow systems have brought new challenges to... Sample PDF
A Flexible Authorization Framework
Chapter 5
Abdelmounaam Rezgui, Athman Rouguettaya, Zaki Malik
Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably.... Sample PDF
Enforcing Privacy on the Semantic Web
Chapter 6
Secure Data Dissemination  (pages 198-229)
Elisa Berino, Barbara Carminati, Elena Ferrari
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after... Sample PDF
Secure Data Dissemination
Chapter 7
Eduardo Fernandez-Medina, Sabrina De Capitani di Vimercati, Ernesto Damiani, Mario Piattini, Pierangela Samarati
Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the... Sample PDF
Multimedia Security and Digital Rights Management Technology
Chapter 8
Ping Lin, K. Selçuk Candan
The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of... Sample PDF
Data and Application Secutiry for Distributed Application Hosting Services
Chapter 9
Eduardo B. Fernandez, Michael Thomsen, Minjie H. Fernandez
Platforms for web services have been reduced to two basic approaches: Microsoft .NET and Sun ONE (J2EE). We compare here these two platforms with... Sample PDF
Comparing the Security Architectures of Sun ONE and Microsoft .NET
About the Authors