An FPGA Design and Implementation of 4G Network Security Algorithm Based on SNOW3G

Author(s):  
Chaopeng Shen ◽  
Xiaotao Yan ◽  
Qiaozhen Liu ◽  
Jian Kang ◽  
Yang Liu ◽  
...  
2013 ◽  
Vol 433-435 ◽  
pp. 1597-1602
Author(s):  
Jian Shi ◽  
Song Deng ◽  
Wei Min Lin ◽  
Tao Zhang ◽  
Yuan Yuan Ma ◽  
...  

The firewall is one of the most important network security facility and is widely used as a base infrastructure in a large enterprise network. When policy changes, the administrator must find all the potential conflicts between existing policies to ensure network security. That's a waste of time and energy. Proceeding from the demands, this paper analyzes key points and difficulties in the design process for the tools, applies mature algorithm of policy conflict detection, and finally proposes a flexible and scalable design. The prototype system proves that the tool does effectively detect all conflicts in policy set, and in the form of reports for the administrator.


2013 ◽  
Vol 427-429 ◽  
pp. 806-809 ◽  
Author(s):  
Lei Wang ◽  
Yan Yan Yu ◽  
Qian Huang ◽  
Jun Yang ◽  
Zheng Peng Zhao

This paper introduces the principle of digital signature algorithm MD5, focused on the calculation phase of the algorithm, the algorithm structure iteration of the loop, and to optimize its calculation phase, and given FPGA design icon, the experiment can be drawn based on FPGA with less resource, fast implementation of the MD5 algorithm. The hardware implementation of the MD5 hash algorithm HMACs build encryption accelerator which has some practical value.


Author(s):  
Jorge Martinez-Carballido ◽  
Jorge Guevara-Escobedo ◽  
Juan M. Ramirez-Cortes ◽  
Ruben Alejos-Palomares

Sign in / Sign up

Export Citation Format

Share Document