Design of RC5 Algorithm using Pipelined Architecture
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secure data transmission for communication purposes. The information should be sent confidentially over the network without fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. Secure transmission require cryptographic algorithm. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data dependent rotations. RC5 has a variable word size, variable number of rounds and a variable length secret key. The encryption and decryption algorithms are exceptionally simple. The requirements of hardware implementation of these algorithms are less power consumption, allocation of resources, re-configurability, architecture efficiency and cost efficiency. This paper aims to the speed, improve performance and throughput. It’s organized as brief introduction about algorithm, RC5 algorithm, System on Chip architecture, pipelined architecture, and results.
Authors and Affiliations
R. Sanju Abraham , A. ARUN
MULTI AGENT-BASED DISTRIBUTED DATA MINING
The Data Mining technology normally adopts data integration method to generate Data warehouse,on which to gather all data into a central site, and then run an algorithm against that data to extract the useful Module...
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL SYSTEM
Image mining is a vital technique which is used to mine knowledge from image. This is simply an expansion of data mining. The function of image mining is to retrieve similar image from huge database. The developm...
Open-Source Network Simulation Tools: An Overview
In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked comp...
An Efficient Face Recognition under Varying Image Conditions
Performance of the face verification system depends on many conditions. One of the most problematic is varying illumination condition. Making recognition more reliable under uncontrolled lighting conditions is one...
“Cloud Service Utilization” Journey to cloud...
As we know that cloud computing is an emerging area, the services provided by the cloud is helpful to overcome the limitation of Information Technology. Such as Globalization, Security, Storage and the most impor...