Chip Implementation of Text Encryption and Decryption Algorithms
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. It enables to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. A cryptographic algorithm is considered to be computationally secured if it cannot be broken with standard resources, either current or future and apart from the algorithm distribution of keys also more important is to make an efficient cryptosystem. TACIT Encryption Algorithm can produce best possible results if key size is the size of the packet expected to pass through the network is small. This paper gives the comparison of the various algorithms with TACIT Encryption Algorithm on the basis of parameters like key length, block size, type and features. The paper is based on the chip designing of the algorithm using VHDL programming language.
Authors and Affiliations
Vishwa Deepak Badoni , Mr. Arpit jain
Fetching the hidden information of web through specific Domains
Abstract: Now days, most of the people find the information over the internet by visiting various number of web pages and also by following the links under those web pages. A user has the ability to browse for data...
Ict As A Change Agent For Socialization And Social Engineering
Abstract: The future communication has been predicted to depend to a great degree on electronic modes; academics businessmen and professionals in various fields, purpose, various uses of ICT facilities and new media gene...
A Novel Method of Generating (Stream Cipher) Keys forSecure Communication
Abstract: Security is an important part of computer science that deals with the protection of importantinformation from access, change or modified, and delete, so there are many ways to improve the security ofinfor...
Filter Based addressing protocol for effective Node Auto configuration in Ad hoc Network
MANET is used for many distributed network, the lack of a centralized administration makes these networks attractive for several distributed applications, such as sensing, Internet access to deprived communities, and dis...
[u][/u]Effect of Different Mobility Patterns on AODV and OLSR using Different TCP variants
Abstract: In this paper the effect of TCP variant (new reno, tahoe and Sack) is analyzed by using karan’s and nagle theorem by moving nodes at different mobility models on OLSR and AODV protocol. In this nagle theorem is...