O'Reilly logo

Verilog Designer’s Library by Cupertino CA Bob Zeidman - Zeidman Consulting

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14 The Encrypter/Decrypter

Encryption and decryption of data is an important application today, as growing amounts of sensitive data need to be kept secret. A simple form of encryption, known as private key encryption, can be implemented using a Linear Feedback Shift Register (LFSR) as described in the previous chapter. With this form of encryption, the key is a value used to initialize or “seed” the LFSR, which then produces a psuedo-random sequence of values. Each value is then combined with each word of data, through XOR gates, to produce the encrypted word. To decrypt the data, the LFSR is again seeded with the key, and again each value is combined with each word of encrypted data, through XOR gates, to produce the original data ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required