Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 6
Abstract
Security makes the people to stay in the sense of vital modern technological improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the level of hardware which decides the cost in trade basis. The work in this paper concentrates on KECCAK SHA-3 algorithm and the sponge construction encryption process with iterative permutation. Thus it leads to reduced amount of encryption time and more importantly provides the ultimate security level among the previous techniques followed so far. The algorithm uses the hashing function which is used for secured message authentication of data, digital signatures and password protection. The main advantage of this algorithm is it exhibits high level of parallelism. The hardware implementation process on FPGA is very fast and effective
Authors and Affiliations
Deepthi Barbara Nickolas#1, Mr. A. Sivasankar
Channel Capacity Analysis of MIMO System in Correlated Nakagami-m Fading Environment
We consider Vertical Bell Laboratories Layered Space-Time (V-BLAST) systems in correlated multiple-input multiple-output (MIMO) Nakagami-m fading channels with equal power allocated to each transmit antenna and also we c...
Microcontroller Based Photovoltaic MPPT Charge Controller
In the present world there is a lot of increase in energy demand. It is time for us to come up with innovative solutions as we are going short of our available resources. Though the utilization of solar energy is v...
Diversity in Recommender System
Recommendation system is an activated area of research that helps to allow users to find the preferable items quickly and to avoid the possible information overloads. Recommender systems use data on past user prefe...
Fault Tolerance Mechanism using Clustering for Power Saving in Wireless Sensor Networks
The dependability of wireless device networks (WSN) is laid low with faults which will occur attributable to varied reasons like malfunctioning hardware, software system glitches, dislocation, or environmental haza...
Tool Path Optimization of Contouring Operation and Machining Strategies for Turbo Machinery Blades
Today many industries use CNC machines for production of turbo machinery components like turbine blades, impellers, rotors, propellers etc. Turbine blades are complex shapes and difficult to machine on CNC. Contour...