Loading

Generalized Architecture for Reconfigurable Hardware Security Incorporating PKI
P.P. Rahoof1, Latha R Nair2, V.P. Thafasal Ijyas3

1P.P. Rahoof, Divison, Department of Computer Science and Engineering, Cochin University of Science and Technology, (Kerala), India.
2Latha R Nair, Divison, Department of Computer Science and Engineering, Cochin University of Science and Technology, (Kerala), India.
3V.P. Thafasal Ijyas, Department of Electrical Engineering, College of Engineering, King Khalid University, Abha, KSA.
Manuscript received on 10 October 2019 | Revised Manuscript received on 19 October 2019 | Manuscript Published on 02 November 2019 | PP: 172-176 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B10280982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1028.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Software-based techniques represent the dominant paradigm for the implementation of network security. Due to the rapidly growing and dynamic nature of contemporary networks security threats are becoming challenging and the overheads of a purely software approach are mounting to enormous proportions. Higher scales of hardware integration have also produced novel types of hardware threats and attacks which cannot be addressed by a purely software approach. Hence the interest in hardware security approaches is increasing. In this paper, we propose a general architecture for hardware-based security that can address the custom security needs of the users. The architecture incorporates the security model adopted in the Public Key Infrastructure (PKI) model for security.
Keywords: Authentication, MAC, Encryption, Security, AES, FPGA, PKI.
Scope of the Article: Plant Cyber Security