Simulation and Synthesis for TACIT Network Security in Hardware Description Language Environment
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 9
Abstract
In cryptography, it is necessary to encrypt and decrypt the data for code storage and security. Sometimes it is very difficult to secure physically all access networks. The research paper has introduced a new block cipher cryptographic symmetric key algorithm named “TACIT Encryption and Decryption Technique” and its implementation in hardware description language environment. There are already many algorithms supporting to encryption and decryption process over networks, but limited to their block size and key size. In the new TACIT network security algorithm, the key size and text size may be of ‘n’ bits and it provides better results if key size is larger than block size. In the research, it is emphasized to develop chip for network security and it verified by experimentation on Sparten-3 FPGA synthesis. It is possible to enhance network performance and security by exploiting modern features in Field Programmable Gate Arrays (FPGA), which allow the modeling of encryption and decryption algorithm on System-on-Programmable-Chip (SOPC). The work is carried out on modeling and simulation tools, Xilinx ISE 14.2 and Model SimEE 10.1b student’s edition of Mentor Graphics Company.
Authors and Affiliations
Yogesh Kumar Sharma*
ASSESSMENT OF WATER QUALITY STATUS OF YAMUNA RIVER AND ITS TREATMENT BY ELECTRODE BASED TECHNIQUES
The objective of this study is to reveal the present condition of pollution level of the water of Yamuna River in Delhi due to direct injection of untreated domestic drains and industrial effluents. Very expensive...
SMART CONTROLLER TO MAINTAIN SAFE DISTANCE BETWEEN VEHICLES
Due to the increasing number of road accidents there has been a growing demand for better road safety features. This paper aims to explain a system which can provide a better and secure driving experience which ca...
Performance Comparison of Adaptive Algorithms for Noise Cancellation
Adaptive filtering is widely researched topic in the present era of communication. When the received signal is continuously corrupted by noise or interference where both the noise and signal changes continuously,...
EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E - BANKING IN SUDAN
T[b]This study aimed to measure the application of security requirements for e - banking, according to a series of ISO 27000 standards in Sudanese banks. The study is based on a set of hypotheses; planning for the cr...
Square Shaped DRA with Square Patch
A square shaped dielectric resonator antenna has gain of 5.28 dB with bandwidth of 343MHz .It could be developed for possible application in many systems which are wireless system like WLAN if properly scaled to...