翻訳と辞書
Words near each other
・ Cryptolechia tetraspilella
・ Cryptolechia transfossa
・ Cryptolechia trimaculata
・ Cryptolechia tyrochyta
・ Cryptolechia varifascirupta
・ Cryptolechia veniflua
・ Cryptolechia vespertina
・ Cryptolechia viridisignata
・ Cryptolechia zeloxantha
・ Cryptolechia zhengi
・ Cryptogrammaceae
・ Cryptogrammoideae
・ Cryptogramophone Records
・ Cryptograms (album)
・ Cryptographic accelerator
Cryptographic engineering
・ Cryptographic hash function
・ Cryptographic High Value Product
・ Cryptographic key types
・ Cryptographic log on
・ Cryptographic Message Syntax
・ Cryptographic Modernization Program
・ Cryptographic Module Testing Laboratory
・ Cryptographic Module Validation Program
・ Cryptographic nonce
・ Cryptographic primitive
・ Cryptographic protocol
・ Cryptographic Quarterly
・ Cryptographic Service Provider
・ Cryptographically Generated Address


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Cryptographic engineering : ウィキペディア英語版
Cryptographic engineering

Cryptographic Engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments.
Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), computer engineering (hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists,
and electrical engineers need to collaborate.
Below are the main topics that are specifically related to cryptographic engineering:
Cryptographic implementations
* Hardware architectures for public-key and secret-key cryptographic algorithms
* Cryptographic processors and co-processors
* Hardware accelerators for security protocols (security processors, network processors, etc.)
* True and pseudorandom number generators
* Physically unclonable functions (PUFs)
* Efficient software implementations of cryptography for embedded processors
Attacks against implementations and countermeasures against these attacks
* Side channel attacks and countermeasures
* Fault attacks and countermeasures
* Hardware tamper resistance
* Hardware trojans
Tools and methodologies
* Computer aided cryptographic engineering
* Verification methods and tools for secure design
* Metrics for the security of embedded systems
* Secure programming techniques
Applications
* Cryptography in wireless applications (mobile phone, WLANs, analysis of standards, etc.)
* Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)
* FPGA design security
* Hardware IP protection and anti-counterfeiting
* Reconfigurable hardware for cryptography
* Smart card processors, systems and applications
* Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)
* Secure storage devices (memories, disks, etc.)
* Technologies and hardware for content protection
* Trusted computing platforms
Interactions between cryptographic theory and implementation issues
* New and emerging cryptographic algorithms and protocols targeting embedded devices
* Non-classical cryptographic technologies
* Special-purpose hardware for cryptanalysis
* Formal methods for secure hardware
==Major issues==

In modern practice, cryptographic engineering is deployed in crypto systems. Like most engineering design, these are wholly human creations. Most crypto systems are computer software, either embedded in firmware or running as ordinary executable files under an operating system. In some system designs, the cryptography runs under manual direction, in others, it is run automatically, often in the background. Like other software design, and unlike most other engineering, there are few external constraints.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Cryptographic engineering」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.