FPGA Based Network Security architecture for High Speed Networks
FPGA Based Network Security architecture for High Speed Networks
FPGA Based Network Security architecture for High Speed Networks
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Contents<br />
Certificate ii<br />
Acknowledgement iii<br />
Abstract iv<br />
List of Figures vii<br />
List of Tables viii<br />
1 Introduction 2<br />
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />
1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />
1.3 Our Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5<br />
1.4 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />
2 Background 8<br />
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />
2.2 Symmetric key Cryptosystem . . . . . . . . . . . . . . . . . . . . . 8<br />
2.2.1 IDEA Encryption Algorithm . . . . . . . . . . . . . . . . . . 8<br />
2.3 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />
2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />
3 Modulo (2 16 + 1) multiplier <strong>for</strong> IDEA Cipher 20<br />
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />
3.2 Diminished-one Number Representation . . . . . . . . . . . . . . . 20<br />
3.2.1 Basic Operations . . . . . . . . . . . . . . . . . . . . . . . . 21<br />
3.3 Algorithm <strong>for</strong> the proposed multiplier . . . . . . . . . . . . . . . . . 21<br />
3.4 Proposed multiplier <strong>architecture</strong> . . . . . . . . . . . . . . . . . . . . 26<br />
v