High-speed security

High-speed security

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Communications Engineer — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Most companies today take the risks of unwanted network intrusion, theft, sabotage and malicious damage very seriously. Historically, only high-end networking equipment required, or could justify, the additional cost of implementing security features onto a final network design. However, the explosion of home networking and the growing number of connected users, and hence possible system attacks, have produced a widespread requirement for low-cost, high-performance security solutions. Different applications have, of course, different security requirements for data privacy, integrity and authentication. In today's communications networks, populated by applications demanding increasing amounts of bandwidth, the ultimate goal of a transparent security processing solution in the end system is impossible to achieve through software. A high-performing secure solution can only be achieved through the use of some form of hardware assistance, specifically designed to off-load the main CPU or network processor from performing the required mathematically intensive security algorithms. The article reviews some of the options.

Related content

This is a required field
Please enter a valid email address