Enhancing System Efficiency for Encryption Applications

October 16, 2014 // By Ahmed Majeed Khan, Asma Afzal, Khawar Khurshid (Ph.D)

Examples of such techniques include Advanced Encryption Standard (AES), Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA) and RC5.

Such a “block cipher” approach, however, puts a constraint on the throughput, data processing, and buffering capacities of the hardware since encryption has to be performed before the next chunk of data arrives.

To ensure the safe and secure transfer of data from source to destination, encryption has become a mandatory technology for secure applications. The most commonly used encryption techniques utilise a deterministic algorithm with an unvarying transformation operating on fixed-length blocks of data.
Cypress Semiconductor, encryption