Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3728))

  • 1278 Accesses

Abstract

Wireless Communications have become a very attractive and interesting sector for the provision of electronic services. Mobile networks are available almost anytime, anywhere and the user’s acceptance of wireless hand-held devices is high. The services, are offered, are strongly increasing due to the different large range of the users’ needs. In our days, the wireless communication protocols have specified security layers, which support security with high level strength. These wireless protocols security layers use encryption algorithms, which in many cases have been proved unsuitable and outdated for hardware implementations. The software and especially the hardware implementations of these layers are proved hard process for a developer/implementer. The performance results of those implementations are not often acceptable for the wireless communication standards and demands. Especially in the hand held devices and mobile communications applications with high speed and performance specifications such implementation solutions are not acceptable. In this talk, first, the mobile communication protocols are introduced and their security layers are described. The software implementations results of the used cryptographic algorithms are given for a fair comparison with hardware. The available hardware devices and latest technologies are described. The VLSI implementation approaches are also demonstrated in details with emphasis on the problems that a hardware implementer has to solve. Flexible solutions are proposed in order the implementation problems to be faced successfully with today’s needs of the mobile data transfers. Finally, recommendations and observations for the wireless security engines are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koufopavlou, O., Selimis, G.N., Sklavos, N., Kitsos, P. (2005). Cryptography: Circuits and Systems Approach. In: Paliouras, V., Vounckx, J., Verkest, D. (eds) Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation. PATMOS 2005. Lecture Notes in Computer Science, vol 3728. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556930_82

Download citation

  • DOI: https://doi.org/10.1007/11556930_82

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29013-1

  • Online ISBN: 978-3-540-32080-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics