09.08.2013 Views

FPGA Based Network Security architecture for High Speed Networks

FPGA Based Network Security architecture for High Speed Networks

FPGA Based Network Security architecture for High Speed Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

Certificate ii<br />

Acknowledgement iii<br />

Abstract iv<br />

List of Figures vii<br />

List of Tables viii<br />

1 Introduction 2<br />

1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

1.3 Our Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5<br />

1.4 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />

2 Background 8<br />

2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />

2.2 Symmetric key Cryptosystem . . . . . . . . . . . . . . . . . . . . . 8<br />

2.2.1 IDEA Encryption Algorithm . . . . . . . . . . . . . . . . . . 8<br />

2.3 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />

2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

3 Modulo (2 16 + 1) multiplier <strong>for</strong> IDEA Cipher 20<br />

3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

3.2 Diminished-one Number Representation . . . . . . . . . . . . . . . 20<br />

3.2.1 Basic Operations . . . . . . . . . . . . . . . . . . . . . . . . 21<br />

3.3 Algorithm <strong>for</strong> the proposed multiplier . . . . . . . . . . . . . . . . . 21<br />

3.4 Proposed multiplier <strong>architecture</strong> . . . . . . . . . . . . . . . . . . . . 26<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!