Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design

AI-generated keywords: Encryption-Decryption Module Internet Information Security SOC Design AES and 3DES Encryption Algorithms High-Speed Chip Module

AI-generated Key Points

  • Paper title: "Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design" by Yixin Liu, Haipeng Zhang, and Tao Feng
  • Focuses on developing a high-speed chip module for securing network data through efficient encryption-decryption techniques
  • Utilizes AES and 3DES algorithms to safeguard internet information
  • Utilization of System on Chip (SOC) design methodology based on Intellectual Property (IP) core
  • Implementation of hardware-based encryption-decryption techniques to enhance data security and alleviate CPU load
  • Adoption of two parallel AES cores in the hardware solution for improved speed and flexibility in key length configurations and encryption algorithm modes
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Yixin Liu, Haipeng Zhang, Tao Feng

International Journal of Soft Computing And Software Engineering (JSCSE),Vol.2,No.7, 2012
11 pages, 5 figures, 4 tables, 14 references
License: CC BY-NC-SA 3.0

Abstract: In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are adopted to protect the security of network data. The following points are focused: (1) The SOC (System on Chip) design methodology based on IP (Intellectual Property) core is used. AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) IP (Intellectual Property) cores are embedded in the chip module, peripheral control sub-modules are designed to control the encryption-decryption module, which is capable of shortening the design period of the chip module. (2) The implementation of encryption-decryption with hardware was presented, which improves the safety of data through the encryption-decryption chip and reduce the load of CPU. (3) In our hardware solution, two AES (Advanced Encryption Standard) cores are used to work in parallel, which improves the speed of the encryption module. Moreover, the key length of AES (Advanced Encryption Standard) encryption algorithm is designed with three optional configurations at 128 bits, 256 bits and 192 bits respectively and six optional encryption algorithm modes: CBC (Cipher Block Chaining) mode, ECB (Electronic Code Book) mode, GCM (Galois/Counter Mode) mode, XTS(cipherteXT Stealing) mode, CTR (CounTeR) mode and 3DES respectively, which adds the flexibility to its applications.

Submitted to arXiv on 24 Jan. 2014

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1401.6375v1

The paper titled "Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design" by Yixin Liu, Haipeng Zhang, and Tao Feng focuses on developing a high-speed chip module for securing network data through efficient encryption-decryption techniques. The design process utilizes AES and 3DES algorithms to safeguard internet information. Key points highlighted in the study include utilization of a System on Chip (SOC) design methodology based on Intellectual Property (IP) core, implementation of hardware-based encryption-decryption techniques to enhance data security and alleviate CPU load, adoption of two parallel AES cores in the hardware solution for improved speed and flexibility in key length configurations and encryption algorithm modes. Overall, this research presents a comprehensive approach towards enhancing internet information security through efficient encryption-decryption techniques embedded within a high-speed chip module.
Created on 01 May. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.