Design of RC5 Algorithm using Pipelined Architecture 

Abstract

Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secure data transmission for communication purposes. The information should be sent confidentially over the network without fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. Secure transmission require cryptographic algorithm. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data dependent rotations. RC5 has a variable word size, variable number of rounds and a variable length secret key. The encryption and decryption algorithms are exceptionally simple. The requirements of hardware implementation of these algorithms are less power consumption, allocation of resources, re-configurability, architecture efficiency and cost efficiency. This paper aims to the speed, improve performance and throughput. It’s organized as brief introduction about algorithm, RC5 algorithm, System on Chip architecture, pipelined architecture, and results. 

Authors and Affiliations

R. Sanju Abraham , A. ARUN

Keywords

Related Articles

Micro-cantilever Sensors for Detection of Pesticide Contents in the Water-table of Malwa Region in Punjab  

Biosensors based on microcantilevers have become a promising tool for directly detecting biomolecular interactions with great accuracy. Microcantilevers translate molecular recognition of biomolecules into nanomechani...

Improving the efficiency of Monitoring & detecting Intruders in MANET  

Rely on mobile ad hoc networks so many intrusion detection techniques projected based on each node reflexively monitoring the data forwarding by its next hop. This paper projected valued evaluations of false positives an...

A Comprehensive Study of Data Mining and Application 

Data mining refers to extracting or ―mining‖ knowledge from large amounts of data. Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learni...

A SURVEY ON CLOUD DATA SECURITY USING ENCRYPTIOIN TECHNIQUE 

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructures are provided as services of the internet. It allows consumers and business to use application without installation a...

A Survey of Performance based Secure Routing Protocols in MANET 

An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...

Download PDF file
  • EP ID EP115243
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

R. Sanju Abraham, A. ARUN (2013). Design of RC5 Algorithm using Pipelined Architecture . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 647-651. https://europub.co.uk/articles/-A-115243