Design And Implementation of Reconfigurable Rijndael Encryption Algorithms For Reconfigurable Mobile Terminals

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

In any wireless communication security is crucial during data transmission. The encryption and decryption of data is the ajor role in the wireless communication for security of the data. ncryption algorithms are used to ensure the security in the ransmission channels. Similarly the area and the power onsumption is another major thing to be viewed since most of the mobile terminals are battery operated. So a mobile erminal which has an encryption unit with less area and power consumption is appreciated. This paper deals with the Advanced Encryption Standard (AES) which works on a 128 bit data encrypting it with 128,192,256 bits of keys (ciphers) in a single hardware unit.

Authors and Affiliations

L. Thulasimani , M. Madheswaran

Keywords

Related Articles

A Brief Overview Of Software Testing Metrics

Metrics are gaining importance and acceptance in corporate sectors as organizations grow, mature and strive to improve enterprise qualities. Measurement of a test process is a required competence for an effective softwar...

Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM

Many crucial applications of MANETs like the battlefield, onference and disaster recovery defines the needs for group communications either one-to-many or many-to-many form. Multicast plays an important role in bandwidt...

Cryptosystem for Information Security

This paper introduces a symmetric cryptosystem for information. Algorithms are described for implementing the proposed method. Cryptanalysis of the proposed scheme is reported along with similar analysis for two popular...

Public key cryptosystem and a key exchange protocol using tools of non-abelian group

Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a lock of encrypted data. We...

Correlating Dimensions of Inheritance Hierarchy with Complexity & Reuse

Inheritance is the vital feature of any object oriented software which provides reuse of exiting classes for designing new classes. Higher reuse provides higher productivity and greater quality. Inheritance hierarchy is...

Download PDF file
  • EP ID EP129431
  • DOI -
  • Views 131
  • Downloads 0

How To Cite

L. Thulasimani, M. Madheswaran (2010). Design And Implementation of Reconfigurable Rijndael Encryption Algorithms For Reconfigurable Mobile Terminals. International Journal on Computer Science and Engineering, 2(4), 1003-1011. https://europub.co.uk/articles/-A-129431