Science & Engineering Research Support soCiety (SERSC)
Data communication is vulnerable to eavesdropping, forgery and modification in common internet environment. To guarantee the confidentiality and data integrity, cryptographic algorithms and cryptographic modules including symmetric key, public key, hash function, random number generator and digital signature are being used to accomplish the services. Cryptographic modules basically contain cryptographic algorithms such as AES, ARIA, SEED, RSAES, SHA-256, ECDSA and DH. Also the cryptographic modules have to have the extra functions for self-tests, EMI/EMC, etc.