Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 6
Abstract
Security makes the people to stay in the sense of vital modern technological improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the level of hardware which decides the cost in trade basis. The work in this paper concentrates on KECCAK SHA-3 algorithm and the sponge construction encryption process with iterative permutation. Thus it leads to reduced amount of encryption time and more importantly provides the ultimate security level among the previous techniques followed so far. The algorithm uses the hashing function which is used for secured message authentication of data, digital signatures and password protection. The main advantage of this algorithm is it exhibits high level of parallelism. The hardware implementation process on FPGA is very fast and effective
Authors and Affiliations
Deepthi Barbara Nickolas#1, Mr. A. Sivasankar
Modelling of Photovoltaic Cell/Module under Environmental Disturbances using MATLAB /Simulink
Integration of photovoltaic power to grid is one of the major interests. Design, study and analysis of key components in a photovoltaic power system from generation of power to integration to main grid are very crucial....
Development on Gas Leak Detection and Location System Based on Wireless Sensor Networks: A Review
Gas leakage detection and monitoring may cause heavy economic :losses and serious environmental pollution, through wireless sensor network is considered to be more economical for industries gas leakage. Main purpose of t...
Investigation of Corrossion Effects of Jatropha Biodiesel on the Injector of an Engine Fuel System
This paper presents an investigation into the corrosive behaviour of biodiesel on the injector of the fuel system of a diesel engine. The experimental study was based on the methods of weight loss and scanning electron m...
Optimal Location of Multiple FACTS Device Using Sensitivity Methods
In recent years, electric power systems, greater demands have been placed on the transmission network. Maintaining power system stability becomes difficult and challenging problem. FACTS technology have new opportunities...
Comparitive Study Of Diffrent Multiplier Architectures
This paper presents a comparative analysis of three different multiplier architectures. The three multipliers architecture are array multiplier, a column bypass multiplier, and a array multiplier using Reversal Log...