Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/13595
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMEENAKSHI-
dc.date.accessioned2011-04-08T07:10:49Z-
dc.date.available2011-04-08T07:10:49Z-
dc.date.issued2008-01-03-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/13595-
dc.descriptionME THESISen_US
dc.description.abstractWith introduction of new technologies inventors are more concerned about the security of the new inventions they are bringing out. Data security is becoming ever more important in embedded and portable electronic devices. External interfaces to memory in digital devices and communication interfaces to other digital devices are more vulnerable to probing. The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. These technique were sufficient to prevent the unauthorized access of the device but if the attack is at the device interface level not to access the system but to get the knowledge of complete architecture of device, algorithm used etc. This is very serious security threat from IP (intellectual property) point of view. So nowadays apart from the user authentication check device architecture information and algorithm are encrypted so as to avoid any kind of reverse engineering. The analysis techniques used by atta...en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD 383;111-
dc.subjectFPGAen_US
dc.subjectVHDLen_US
dc.subjectSHAen_US
dc.subjectAlgorithmen_US
dc.subjectHardware Securityen_US
dc.titleIMPLEMENTATION OF SHA ALGORITHM USING VHDL FOR HARDWARE SECURITYen_US
Appears in Collections:M.E./M.Tech. Electronics & Communication Engineering

Files in This Item:
File Description SizeFormat 
thesis.pdf1.03 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.