Implementation of Multinomial Standard Product for RSA State Identify Algorithm
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 5
Abstract
This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential and authentication methods.It supports multiple key sizes like 128 bits,256 bits,512 bits.RSA gets its security from factorization problem. The RSA encryption/decryption uses polynomial modular multiplication its makes the processing time faster and used comparatively smaller amount of space in the FPGA due to its reusability each block is coded with verilog high description language. Verilog code is synthesized and simulated using Xilinx-ISE 12.2.
Authors and Affiliations
S. Surya Prasad Guttula, B. Ratna Raju, G. N Swamy, K. Padma Raju
Content Based Image Retrieval based on Dual Tree Discrete Wavelet Transform
Today in various fields like space research, medicine, cartography and oncology large number of images are available. Searching a relevant image from these database is becoming a tedious process. Content Based Image...
A Survey on Peer to Peer sharing using Cloud Based Mobile Social TV (Cloud MoV)
The fast increasing power of personal mobile devices (Smartphone, tablets, etc.) provides more advanced features like news, game app, health tips etc and social interactions to users in day to day life. This developm...
An Improved Performance of MANET using AODV Protocol for Black Hole Detection
Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been propo...
Incorporating Human Behavioral Patterns in Big Data Text Analytics
One of the modern day emerging technologies include Big Data Analysis. Big Data refers to the huge terabytes of data being collected on internet web sites such as Facebook, Twitter etc, Machine data such as sensors an...
Privacy Preserving using Slicing Technique
Privacy Preserving on microdata publishing different anonymization techniques named as generalization and bucketization have been proposed. In generalization amount of information loses on high-dimensional data. Buc...