On determination of LFSR structures to assure more reliable and secure designs of cryptographic systems

Afaq Ahmad, Samarth Arora, Ahmed Al Maashri, Sayyid Samir Al-Busaidi, Ali Al Shidhani

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (SciVal)

Abstract

This paper presents an algorithmic procedure for determining the cryptographic key properties and hence matching with the required complexity and strength to assure a more reliable and secure designs of cryptographic systems. The designed algorithm is capable to provide the cryptographic key structure based on optimum solution approach. Using the Hardware Description Language (HDL), Verilog, the key can be realized on Field Programmable Gate Array (FPGA) platform and then translated into Printed Circuit Board (PCB).

Original languageEnglish
Title of host publicationProceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization
Subtitle of host publicationTrends and Future Directions, ICRITO 2014
EditorsBalvinder Shukla, Sunil Kumar Khatri, P. K. Kapur
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479968961
DOIs
Publication statusPublished - Jan 19 2015
Event2014 3rd International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2014 - Noida, India
Duration: Oct 8 2014Oct 10 2014

Publication series

NameProceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2014

Other

Other2014 3rd International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2014
Country/TerritoryIndia
CityNoida
Period10/8/1410/10/14

Keywords

  • Crptographickey
  • HDL
  • LFSR
  • Pocker test
  • Psedonoise sequence
  • autocorrelation
  • serial test

ASJC Scopus subject areas

  • Modelling and Simulation
  • Software
  • Information Systems

Fingerprint

Dive into the research topics of 'On determination of LFSR structures to assure more reliable and secure designs of cryptographic systems'. Together they form a unique fingerprint.

Cite this