Learn More
The main applications of the hash functions are met in the fields of communication's integrity and signature authentication. Many hash algorithms have been investigated and developed in the last years. This work is related to hash functions FPGA implementation. Field programmable gate arrays (FPGAs) being reconfigurable, flexible and physically secure are a(More)
In this paper, we propose an elliptic curve key generation processor over GF(2 163) scheme based on the Montgomery scalar multiplication algorithm. The new architecture is performed using polynomial basis. The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion. For real time implementation, the architecture has(More)
Cellular Automata (CAs) have been applied successfully to several physical systems, processes and scientific problems that involve local interactions, such as image processing, data encryption and byte error correcting codes. In this paper, we analyze the cellular automata, and we propose a reconfigurable cryptosystem based on 2-D Von Neumann cellular(More)
The continued growth of both wired and wireless communications has triggered the revolution for the generation of new cryptographic algorithms. Hash functions are common and important cryptographic primitives, which are very critical for data integrity assurance and data origin authentication security services. Many hash algorithms have been investigated(More)
The Advanced Encryption Standard (AES) has been studied by designers with the goal to improve its performances in terms of area, power consumption and frequency. In this paper, we present the implementation details of the AES encryption 128-bit, the MixColumns transformation and the SubBytes transformation. The latter can be implemented using a multi-stage(More)
The Advanced Encryption Standard (AES) is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications. Fault injection attacks are powerful cryptanalysis techniques against the AES algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the(More)
—The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications. In this paper, we proposed a new design for the SHA-256 and SHA-512(More)
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In our previous research work, we have mathematically proven that, under some conditions, this mode of operation can admit a chaotic behavior according to Devaney. In this paper, we have developed the quantitative(More)
Since the beginning of study of the Secure Hash function (SHA), it has been thoroughly studied by designers with the goal of reducing the area, frequency, throughput and power consumption of the hardware implementation of this cryptosystem. The Secure Hash function algorithm has become the default choice for security services in numerous applications.(More)