Simulation of FPGA Based Buffered Security Enabled Encoders
| AUTHOR | Saha, Mousumi |
| PUBLISHER | LAP Lambert Academic Publishing (03/20/2012) |
| PRODUCT TYPE | Paperback (Paperback) |
Description
This book deals with the simulation of various Encoders through FPGA based system to add security in embedded systems. A buffered based implementation has been proposed which accept a stream of data form input port; store the data into the buffer. The encryption technique operates on the data to generate the intermediate encrypted data stream through simulated hardware. Triangular Encoder deals with string / block as input and produces the string / block as output based on the XOR operation. The XOR operation is done on a fixed size data block, which is taken from the buffer storage. The number of iterations depends on the size of the block of data bits in the data stream. This encoder follows the principle of block cipher technique and symmetric in nature, hence decoding is done following the same procedure. The buffer can store the encrypted data also. This simulation gives the hardware definition/ RTL for buffer based encryption.
Show More
Product Format
Product Details
ISBN-13:
9783848436125
ISBN-10:
3848436124
Binding:
Paperback or Softback (Trade Paperback (Us))
Content Language:
English
More Product Details
Page Count:
100
Carton Quantity:
78
Product Dimensions:
6.00 x 0.24 x 9.00 inches
Weight:
0.35 pound(s)
Country of Origin:
US
Subject Information
BISAC Categories
Computers | General
Descriptions, Reviews, Etc.
publisher marketing
This book deals with the simulation of various Encoders through FPGA based system to add security in embedded systems. A buffered based implementation has been proposed which accept a stream of data form input port; store the data into the buffer. The encryption technique operates on the data to generate the intermediate encrypted data stream through simulated hardware. Triangular Encoder deals with string / block as input and produces the string / block as output based on the XOR operation. The XOR operation is done on a fixed size data block, which is taken from the buffer storage. The number of iterations depends on the size of the block of data bits in the data stream. This encoder follows the principle of block cipher technique and symmetric in nature, hence decoding is done following the same procedure. The buffer can store the encrypted data also. This simulation gives the hardware definition/ RTL for buffer based encryption.
Show More
Your Price
$62.84
