Implementation and optimisation of FPGA based network security system using VHDL
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
The combination of traditional microprocessors and Field Programmable Gate Array(FPGAs) is developing as a future platform for intensive computational computing, combining thebest aspects of traditional microprocessor front-end development with the reconfigurability of FPGAsfor computation-intensive problemsThis paper present the IDEA algorithm with regard to FPGA and the very high speed integrated circuit hardware description language. Synthesizing and implementation of the VHDL code carried out on Xilinxproject navigator, ISE suite. In this paper , an efficient hardware design of the IDEA using modulo (2n+1) multiplier as the basic module proposed for faster, smaller and low power IDEA hardware circuit. Experimental measurement result show that the proposed design is faster and smaller and also consume less power than similar hardware implementation making it a viable option for efficient This paper talks of IDEA 64 bit plain text, 128 bit key and 64 bit cipher text.
Authors and Affiliations
Pravinkumartiwari , ,Momd. abdullah , , Rajesh nema
The Blu-ray Disc Technology - An Optical Storage Medium
As technology becomes more advanced, the demand for compact disc units with a higher quality becomes greater. The thrust for an advanced format of data storage on optical disc led to revolutionary introduction of...
STUDY OF VARIOUS ISSUES IN VOICE TRANSLATION
In today’s world the language translation plays an important role. Requirement of speech translation is increasing day by day. In this paper, we have reviewed various approaches to translate the actual voice/speech. T...
Intrusion Detection and Classification Using Improved ID3 Algorithm of Data Mining
Intrusion detection technology exists a lot of problems, such as low performance, low intelligent level, high false alarm rate, high false negative rate and so on. There is a need to develop some robust decision tr...
A Comparative Study On Some New Steganographic Techniques
In this paper, we present some new methods and develop techniques with algorithms for hiding text behind the gray scale image. Steganographic technique allows the sender to communicate information to the receiver w...
Mining web Graphs for Endorsement
— As the exponential detonation of different stuffing generated on the Lattice, Endorsement techniques have become gradually more obligatory. Inestimable dissimilar kinds of endorsement are made on the Lattice ever...