Abstract:Cryptography is one of the key elements in providing security for modern e-commerce systems. It is well known that software-based encryption has built-in security weaknesses due to storing and managing digital certificates/keys in a highrisk environment such as a local hard disk or software. This makes embedded hardware encryption a superior solution. However, most existing embedded hardware encryption modules need additional dedicated software in order to implement a secure e-commerce application, which incre… Show more
“…One of the main advantages of using DSP hardware using that it can provide more computing power and higher flexibility than that of VLSI chips or smart cards ,also it provides a low cost due to mass production. Another significant advantage is nearly every computer have a PCI interface and communication ports that support DSP boards [5].…”
Section: Hardware Cryptosystemmentioning
confidence: 99%
“…Embedded hardware, such as smart cards, and especially DSP (digital signal processors) is an ideal solution [5]. One of the main advantages of using DSP hardware using that it can provide more computing power and higher flexibility than that of VLSI chips or smart cards ,also it provides a low cost due to mass production.…”
Section: Hardware Cryptosystemmentioning
confidence: 99%
“…The data confidentiality and data integrity are considered as two of the most important functions of modern cryptography. Confidentiality can be achieved by using encryption algorithms or ciphers, whereas integrity can be provided by the use of authentication techniques [5]. Two of the cornerstones of modern cryptography are public key encryption as implemented via public-key cryptosystems and digital signatures as implemented by signature schemes.…”
Section: Information Securitymentioning
confidence: 99%
“…Any software which requires access to the private key must ensure that the key is protected from hackers. Most of the existing technology fail to keep a strong assurance of the protection of private keys in the software environment [5].…”
Section: Information Securitymentioning
confidence: 99%
“…As an extension of mobile technology, users are able to send and receive data across the world using the mobile communication networks [5].…”
“…One of the main advantages of using DSP hardware using that it can provide more computing power and higher flexibility than that of VLSI chips or smart cards ,also it provides a low cost due to mass production. Another significant advantage is nearly every computer have a PCI interface and communication ports that support DSP boards [5].…”
Section: Hardware Cryptosystemmentioning
confidence: 99%
“…Embedded hardware, such as smart cards, and especially DSP (digital signal processors) is an ideal solution [5]. One of the main advantages of using DSP hardware using that it can provide more computing power and higher flexibility than that of VLSI chips or smart cards ,also it provides a low cost due to mass production.…”
Section: Hardware Cryptosystemmentioning
confidence: 99%
“…The data confidentiality and data integrity are considered as two of the most important functions of modern cryptography. Confidentiality can be achieved by using encryption algorithms or ciphers, whereas integrity can be provided by the use of authentication techniques [5]. Two of the cornerstones of modern cryptography are public key encryption as implemented via public-key cryptosystems and digital signatures as implemented by signature schemes.…”
Section: Information Securitymentioning
confidence: 99%
“…Any software which requires access to the private key must ensure that the key is protected from hackers. Most of the existing technology fail to keep a strong assurance of the protection of private keys in the software environment [5].…”
Section: Information Securitymentioning
confidence: 99%
“…As an extension of mobile technology, users are able to send and receive data across the world using the mobile communication networks [5].…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.