Chip Implementation of Text Encryption and Decryption Algorithms

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. It enables to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. A cryptographic algorithm is considered to be computationally secured if it cannot be broken with standard resources, either current or future and apart from the algorithm distribution of keys also more important is to make an efficient cryptosystem. TACIT Encryption Algorithm can produce best possible results if key size is the size of the packet expected to pass through the network is small. This paper gives the comparison of the various algorithms with TACIT Encryption Algorithm on the basis of parameters like key length, block size, type and features. The paper is based on the chip designing of the algorithm using VHDL programming language.

Authors and Affiliations

Vishwa Deepak Badoni , Mr. Arpit jain

Keywords

Related Articles

 Sequential Pattern Tree Mining

 Sequential pattern mining, which discovers the correlation relationships from the ordered list of events, is an important research field in data mining area. In our study, we have developed a Sequential Patter...

 An Integrated approach for color Image Segmentation using edge and color information

 Image segmentation is a fundamental and complex task in many image processing applications. In this paper, we propose a hybrid method for color image segmentation by integrating color edge information and seede...

 Towards Adapting NAS Mechanism over Solid State Disks

 Abstract: Flash memory storage such as SSDs (Solid State disks) have been gaining popularity due to its low energy consumption and durability in embedded systems and laptops. With the fast technical improvement,...

 Probabilistic Model for Single and Multi-Sensing Intrusion Detection in Wireless Sensor Networks

 Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and are capable of detecting the intruders. The process of detecting any suspected (anomalous) moving object(attacke...

 Selfish Node Detection in Replica Allocation over MANETs

 : MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wire...

Download PDF file
  • EP ID EP121429
  • DOI 10.9790/0661-16365661
  • Views 86
  • Downloads 0

How To Cite

Vishwa Deepak Badoni, Mr. Arpit jain (2014).  Chip Implementation of Text Encryption and Decryption Algorithms. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 56-61. https://europub.co.uk/articles/-A-121429