Simulation and Synthesis for TACIT Network Security in Hardware Description Language Environment
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 9
Abstract
In cryptography, it is necessary to encrypt and decrypt the data for code storage and security. Sometimes it is very difficult to secure physically all access networks. The research paper has introduced a new block cipher cryptographic symmetric key algorithm named “TACIT Encryption and Decryption Technique” and its implementation in hardware description language environment. There are already many algorithms supporting to encryption and decryption process over networks, but limited to their block size and key size. In the new TACIT network security algorithm, the key size and text size may be of ‘n’ bits and it provides better results if key size is larger than block size. In the research, it is emphasized to develop chip for network security and it verified by experimentation on Sparten-3 FPGA synthesis. It is possible to enhance network performance and security by exploiting modern features in Field Programmable Gate Arrays (FPGA), which allow the modeling of encryption and decryption algorithm on System-on-Programmable-Chip (SOPC). The work is carried out on modeling and simulation tools, Xilinx ISE 14.2 and Model SimEE 10.1b student’s edition of Mentor Graphics Company.
Authors and Affiliations
Yogesh Kumar Sharma*
EVALUATION PERFORMANCE OF TRANSPORT VEHICLE ON DIFFERENT SURFACES
This study was carried out at farm of El-Gemmaiza Agriculture Research Station, El-Garbia Governorate Egypt, to determine the performance characteristics of an agricultural transport. The performance of this trans...
Human Detection Multi-Modal Biometric System
This paper proposes the multimodal biometrics system for identity verification of human being in a very efficient manner by using various traits such as, face, fingerprint, iris, voice and signature. Biometrics ba...
Proposed Algorithm for Network Traffic Classification Based On DB Scan
The trend of using internet is increasing rapidly. Everyone wants to share their information on the urgent basis but in the secured manner. Security issues have posed the giant problems within the organization. Ma...
Performance Enhancement of Household Refrigerators with Cooling of Compressor: A Review
This paper presents a review of experimental tests carried out to investigate the performance of a household refrigerator. The purpose of this review paper is to summarize the important published papers on the enh...
Optimized Design of Digital Phase Locked Loops for RF Carrier Acquisition
This paper presents optimized implementation of Digital Phase Locked Loops (DPLL) for generating RF carrier signal used for phase demodulation. The method used for designing DPLL is based on linear control theory...