2018 Volume 12 Issue 2 Pages 126-132
Information security and safety in the IoT era strongly depends on the protection of information through communication and IoT devices. Encryption techniques and hardware protection are becoming important means of preventing illegal data manipulation and abstraction through communication channels and at IoT devices. Cryptography has always been regarded as “unnecessary and undesirable” things. Hardware is regarded as having low flexibility, meaning that software is preferred, except for a few exceptions. In addition, hardware implementation is often regarded as the second option that follows ever changing cryptographic algorithm. This sometimes means thar some cryptographic algorithms that would drastically improve the convenience and security of IT devices are not utilized because of their insufficient performance. Here, we expect the widespcead use of such cryptographic algorithms and we introduce typical cryptographic algorithms from the aspect of performance perspectives in hardware implementation.