Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 6
Abstract
Security makes the people to stay in the sense of vital modern technological improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the level of hardware which decides the cost in trade basis. The work in this paper concentrates on KECCAK SHA-3 algorithm and the sponge construction encryption process with iterative permutation. Thus it leads to reduced amount of encryption time and more importantly provides the ultimate security level among the previous techniques followed so far. The algorithm uses the hashing function which is used for secured message authentication of data, digital signatures and password protection. The main advantage of this algorithm is it exhibits high level of parallelism. The hardware implementation process on FPGA is very fast and effective
Authors and Affiliations
Deepthi Barbara Nickolas#1, Mr. A. Sivasankar
Indoor Navigation on Google Maps and Indoor Localization Using RSS Fingerprinting
Contrasting to advances in street/outdoor navigation, wall mounted maps and signs continue to be the primary reference indoor navigation in hospitals, malls, museums, etc. The proliferation of mobile devices and the grow...
To Estimate The Range Of Process Parameters For Optimization Of Surface Roughness & Material Removal Rate In CNC Milling
CNC milling has become one of the most competent, productive and flexible manufacturing methods, for complicated or sculptured surfaces. With the rising demands of modern engineering products, the control of surface te...
Extended Kalman Filter based State Estimation of Wind Turbine
State estimation provides the best possible approximation for the state of the system by processing the available information. In the proposed work, the state estimation technique is used for the state estimation of wi...
Application of Entransy Dissipation Number as Performance Parameter for Heat Exchanger
A new physical quantity, entransy has been identified as a basis for optimizing heat transfer processes in terms of the analogy between heat and electrical conduction. This quantity, which will be referred to as entransy...
A Review: Shadow Detection And Shadow Removal from Images.
Shadows appear in remote sensing images due to elevated objects. Shadows cause hindrance to correct feature extraction of image features like buildings ,towers etc. in urban areas it may also cause false color...