Design of RC5 Algorithm using Pipelined Architecture
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secure data transmission for communication purposes. The information should be sent confidentially over the network without fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. Secure transmission require cryptographic algorithm. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data dependent rotations. RC5 has a variable word size, variable number of rounds and a variable length secret key. The encryption and decryption algorithms are exceptionally simple. The requirements of hardware implementation of these algorithms are less power consumption, allocation of resources, re-configurability, architecture efficiency and cost efficiency. This paper aims to the speed, improve performance and throughput. It’s organized as brief introduction about algorithm, RC5 algorithm, System on Chip architecture, pipelined architecture, and results.
Authors and Affiliations
R. Sanju Abraham , A. ARUN
“Cloud Service Utilization” Journey to cloud...
As we know that cloud computing is an emerging area, the services provided by the cloud is helpful to overcome the limitation of Information Technology. Such as Globalization, Security, Storage and the most impor...
Evaluating QOSMOS Using Markov Decision Process Model
Service discovery has been recognized as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such systems, it is necessary to identify ser...
Fruits Sorting and Grading using Fuzzy Logic
Now a days, the classification and grading is performed based on observations and through experience. The system utilizes image-processing techniques to classify and grade fruits. The developed system starts the...
Image Steganography With LSB
:The rapid development of data transfer through internet has made it easier to send the data accurate and faster to the destination, but in order to transfer the data securely to the destination without any modif...
http://ijarcet.org/wp-content/uploads/IJARCET-VOL-1-ISSUE-8-242-247.pdf
Abstract--E-learning has been a topic of increasing interest in recent years, due to the fact that increased scheduling flexibility as well as tool support can now be offered at a widely affordable level. As a result,...