HIGH-SPEED SECURITY ARCHITECTURES

Communication networks are continually growing and getting faster with current network speeds in the range of gigabits per second (Gbps). A major research challenge is providing data security over such networks in real-time. As the demand for higher levels of security continues and as network providers offer faster networks, the ability to provide data confidentiality, integrity and authentication at real-time speeds will be essential.

At ECIT research is being carried out into high-speed security hardware architectures for the provision of data security in real-time applications such as high-speed communication networks and satellite communications. High-speed architectures of the following algorithms have been investigated:

  • Private-key algorithms: AES, DES, SHACAL-2
  • Asymmetric algorithms: RSA,ECC
  • Hash functions:  SHA-1, SHA-2, Whirlpool, SHA-3 candidates

High Speed Architecture diagram