Implementation and optimisation of FPGA based network security system using VHDL
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
The combination of traditional microprocessors and Field Programmable Gate Array(FPGAs) is developing as a future platform for intensive computational computing, combining thebest aspects of traditional microprocessor front-end development with the reconfigurability of FPGAsfor computation-intensive problemsThis paper present the IDEA algorithm with regard to FPGA and the very high speed integrated circuit hardware description language. Synthesizing and implementation of the VHDL code carried out on Xilinxproject navigator, ISE suite. In this paper , an efficient hardware design of the IDEA using modulo (2n+1) multiplier as the basic module proposed for faster, smaller and low power IDEA hardware circuit. Experimental measurement result show that the proposed design is faster and smaller and also consume less power than similar hardware implementation making it a viable option for efficient This paper talks of IDEA 64 bit plain text, 128 bit key and 64 bit cipher text.
Authors and Affiliations
Pravinkumartiwari , ,Momd. abdullah , , Rajesh nema
ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD
Hybrid cloud combines the external public services and the internal private cloud providing services thereby enhancing the capabilities to secure, manage and govern the entire cloud spectrum. In this paper, online...
Integration between 3G Cellular and Wireless LAN Network
One of the prime objectives in future mobile communications is implementing seamless roaming between heterogeneous wireless networks. 3G Cellular network and Wireless LAN will complement each other to provide ubi...
Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm
Advanced Encryption Standard (AES) is the symmetric key standard for encryption and decryption. In this work, a 128-bit AES encryption and decryption using Rijndael Algorithm is designed and synthesized using veril...
A survey on AODV routing protocol for AD-HOC Network
Now a day, Ad-hoc network has become an indivisible part for communication for mobile devices. There are different types of topology for implementation of Ad-hoc network. AODV is one of them which are a reactive protocol...
Anomaly Exposure in Network Traffic and its collision: a Survey
Antagonistic network traffic is frequently "diverseā from kind traffic in ways that can be classified without knowing the way of the attack. Anomaly exposure is a significant problem that has been investigates wi...