IEICE ESS Fundamentals Review
Online ISSN : 1882-0875
ISSN-L : 1882-0875
Proposed by HWS (Hardware Security)
Secure LSI Design: Solutions to Hardware Security and Hardware Vulnerability
Makoto IKEDA
Author information
JOURNAL FREE ACCESS

2018 Volume 12 Issue 2 Pages 126-132

Details
Abstract

Information security and safety in the IoT era strongly depends on the protection of information through communication and IoT devices. Encryption techniques and hardware protection are becoming important means of preventing illegal data manipulation and abstraction through communication channels and at IoT devices. Cryptography has always been regarded as “unnecessary and undesirable” things. Hardware is regarded as having low flexibility, meaning that software is preferred, except for a few exceptions. In addition, hardware implementation is often regarded as the second option that follows ever changing cryptographic algorithm. This sometimes means thar some cryptographic algorithms that would drastically improve the convenience and security of IT devices are not utilized because of their insufficient performance. Here, we expect the widespcead use of such cryptographic algorithms and we introduce typical cryptographic algorithms from the aspect of performance perspectives in hardware implementation.

Content from these authors
© 2018 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top