A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware
IEEE Transactions on Computers
System-on-a-Chip: Design and Test
System-on-a-Chip: Design and Test
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
I-WAP: An Intelligent WAP Site Management System
IEEE Transactions on Mobile Computing
Why WAP May Never Get off the Ground
Computer
Systolic Modular Multiplication
IEEE Transactions on Computers
Exploiting Parallelism in Hardware Implementations of the DES
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A High-Speed DES Implementation for Network Applications
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Montgomery Modular Exponentiation on Reconfigurable Hardware
ARITH '99 Proceedings of the 14th IEEE Symposium on Computer Arithmetic
WAP Enabling Existing HTML Applications
AUIC '00 Proceedings of the First Australasian User Interface Conference
Hi-index | 0.00 |
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated to security layer of Wireless Application Protocol (WAP), is the Wireless Transport Layer Security (WTLS). In this paper, an efficient architecture for the hardware implementation of WTLS is proposed. The introduced system supports bulk encryption, authentication and data integrity. The proposed architecture operates alternatively for a set of ciphers, IDEA, DES, RSA, D.H., SHA-1 and MD5. It is based on two reconfigurable design units: the Reconfigurable Authentication Unit and the Reconfigurable Integrity Unit. These units operate alternatively for different ciphers and achieve to allocate minimized resources, at the same time. The introduced security system has been implemented in an FPGA device. The supported ciphers performance is compared with previously published works, and it has been proven superior to them, in most of the cases. The system's synthesis results prove that the proposed architecture is a flexible and powerful solution for WTLS integration of today's and future wireless networks. The system can be applied to wireless communications servers and mobile devices also. Finally, the proposed architecture can be used as a powerful security engine, in WAP communication networks, with special security demands.