A Cryptographic Based Implementation Of Secure Hash Algorithm By Using Microblaze Processor
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Hash function is simply an algorithm that takes a string of any length and reduces it to a unique fixed length string. Hash functions are used to ensure data and message integrity, password validity as well as the basis of many other cryptographic systems. Due to the tremendous developments within the wired and wireless communications, new algorithms and new security standards are developed. Among these hash algorithms are widely used. Performance in security applications can be improved by accelerating the algorithms in hardware. This encryption subsystem is implemented by an embedded processor combined with specific hardware. In this paper, SHA (Secure Hash Algorithm) application is presented. A Xilinx Spartan-3 FPGA is employed to implement MicroBlaze based embedded system.
Authors and Affiliations
Balu Srinivas Jangareddi, G. Sridevi
Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks
The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...
Robust Image Watermarking using Three Domains of SVD
In this paper robust watermarking scheme is proposed using SVD. Initially singular value decomposition is applied to the host image. After SVD, watermark is embedded in three domains i.e., in D, U and V. Watermark is...
Effective Load Balancing Technique And Memory Management In Cloud
Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numb...
Power Optimization In Digital Circuits Using Scan-Based BIST
Technology provides smaller, faster and lower energy devices which allow more powerful and compact circuit- ry. Thermal and shot-noise estimations alone suggest that the fault rate of an individual Nano scale device...
Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...