Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer Engineering

2005

University of Tennessee, Knoxville

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Hardware Design And Implementation Of Role-Based Cryptography, Scott Edward Fields Dec 2005

Hardware Design And Implementation Of Role-Based Cryptography, Scott Edward Fields

Masters Theses

Traditional public key cryptographic methods provide access control to sensitive data by allowing the message sender to grant a single recipient permission to read the encrypted message. The Need2Know® system (N2K) improves upon these methods by providing role-based access control. N2K defines data access permissions similar to those of a multi-user file system, but N2K strictly enforces access through cryptographic standards. Since custom hardware can efficiently implement many cryptographic algorithms and can provide additional security, N2K stands to benefit greatly from a hardware implementation. To this end, the main N2K algorithm, the Key Protection Module (KPM), is being specified in …