Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 6

Abstract

 Security makes the people to stay in the sense of vital modern technological improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the level of hardware which decides the cost in trade basis. The work in this paper concentrates on KECCAK SHA-3 algorithm and the sponge construction encryption process with iterative permutation. Thus it leads to reduced amount of encryption time and more importantly provides the ultimate security level among the previous techniques followed so far. The algorithm uses the hashing function which is used for secured message authentication of data, digital signatures and password protection. The main advantage of this algorithm is it exhibits high level of parallelism. The hardware implementation process on FPGA is very fast and effective

Authors and Affiliations

Deepthi Barbara Nickolas#1, Mr. A. Sivasankar

Keywords

Related Articles

Channel Capacity Analysis of MIMO System in Correlated Nakagami-m Fading Environment

We consider Vertical Bell Laboratories Layered Space-Time (V-BLAST) systems in correlated multiple-input multiple-output (MIMO) Nakagami-m fading channels with equal power allocated to each transmit antenna and also we c...

 Microcontroller Based Photovoltaic MPPT Charge Controller

 In the present world there is a lot of increase in energy demand. It is time for us to come up with innovative solutions as we are going short of our available resources. Though the utilization of solar energy is v...

 Diversity in Recommender System

 Recommendation system is an activated area of research that helps to allow users to find the preferable items quickly and to avoid the possible information overloads. Recommender systems use data on past user prefe...

 Fault Tolerance Mechanism using Clustering for Power Saving in Wireless Sensor Networks

 The dependability of wireless device networks (WSN) is laid low with faults which will occur attributable to varied reasons like malfunctioning hardware, software system glitches, dislocation, or environmental haza...

 Tool Path Optimization of Contouring Operation and Machining Strategies for Turbo Machinery Blades

 Today many industries use CNC machines for production of turbo machinery components like turbine blades, impellers, rotors, propellers etc. Turbine blades are complex shapes and difficult to machine on CNC. Contour...

Download PDF file
  • EP ID EP141124
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Deepthi Barbara Nickolas#1, Mr. A. Sivasankar (2013).  Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 4(6), 2438-2441. https://europub.co.uk/articles/-A-141124