Font Size: a A A

Hardware Implementation Of Bluetooth Authentication And Encryption

Posted on:2005-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:L F WeiFull Text:PDF
GTID:2168360122975041Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Bluetooth is a global standard of data and audio communication through wireless transfer. It attracts more and more attention as a new technique. Bluetooth technology that has a good future has got rapidly development in recent years.Bluetooth is designed as a wireless cable replacement to connect a wide range of devices. It provides a short range, peer-to-peer wireless communications between two units. It's important to avoid the data been attacked or stolen the same time we ensure the data is transferred correctly.To realize data encryption and communication protection, Bluetooth system provides encryption in application layer and link layer. These operation including authentication and encryption is used by and each Bluetooth device and executed in the equal layer. Unassailable algorithm protects data and ensures the operations execute correctly and rapidly. Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. But processing will be slow when realize a complex algorithm in software. So, in time-critical applications or processing-contained devices, a hardware implementation is preferable.This thesis will support the high-performance information security development platform as part of the "863 program". The principle of the algorithm in authentication and encryption and hardware implementation architecture is introduced in the thesis.
Keywords/Search Tags:Bluetooth, authentication, encryption
PDF Full Text Request
Related items