Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Security of Public Key Cryptosystems Based on Integer Factorization
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Hi-index | 0.00 |
Securing data in communication systems is the most common real-life cryptographic problem. Basic security services require both encryption and authentication. Modern public-key cryptography depends on a handful of algebraic problems, trying to achieve the best possible security while remaining extremely efficient and practical. This paper is concerned with the implementation of public key encryption algorithm on a Texas Instruments TMS320C31 Digital Signal Processor. The implemented algorithm is fully capable of ciphering and then deciphering real time data using floatingpoint arithmetic. After coding, debugging and compiling, code has been downloaded in flash of development board. Both the software and hardware integration are then successfully tested using a custom developed hardware system.