Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/13595
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | MEENAKSHI | - |
dc.date.accessioned | 2011-04-08T07:10:49Z | - |
dc.date.available | 2011-04-08T07:10:49Z | - |
dc.date.issued | 2008-01-03 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/13595 | - |
dc.description | ME THESIS | en_US |
dc.description.abstract | With introduction of new technologies inventors are more concerned about the security of the new inventions they are bringing out. Data security is becoming ever more important in embedded and portable electronic devices. External interfaces to memory in digital devices and communication interfaces to other digital devices are more vulnerable to probing. The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. These technique were sufficient to prevent the unauthorized access of the device but if the attack is at the device interface level not to access the system but to get the knowledge of complete architecture of device, algorithm used etc. This is very serious security threat from IP (intellectual property) point of view. So nowadays apart from the user authentication check device architecture information and algorithm are encrypted so as to avoid any kind of reverse engineering. The analysis techniques used by atta... | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | TD 383;111 | - |
dc.subject | FPGA | en_US |
dc.subject | VHDL | en_US |
dc.subject | SHA | en_US |
dc.subject | Algorithm | en_US |
dc.subject | Hardware Security | en_US |
dc.title | IMPLEMENTATION OF SHA ALGORITHM USING VHDL FOR HARDWARE SECURITY | en_US |
Appears in Collections: | M.E./M.Tech. Electronics & Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
thesis.pdf | 1.03 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.