Simulation and Synthesis for TACIT Network Security in Hardware Description Language Environment
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 9
Abstract
In cryptography, it is necessary to encrypt and decrypt the data for code storage and security. Sometimes it is very difficult to secure physically all access networks. The research paper has introduced a new block cipher cryptographic symmetric key algorithm named “TACIT Encryption and Decryption Technique” and its implementation in hardware description language environment. There are already many algorithms supporting to encryption and decryption process over networks, but limited to their block size and key size. In the new TACIT network security algorithm, the key size and text size may be of ‘n’ bits and it provides better results if key size is larger than block size. In the research, it is emphasized to develop chip for network security and it verified by experimentation on Sparten-3 FPGA synthesis. It is possible to enhance network performance and security by exploiting modern features in Field Programmable Gate Arrays (FPGA), which allow the modeling of encryption and decryption algorithm on System-on-Programmable-Chip (SOPC). The work is carried out on modeling and simulation tools, Xilinx ISE 14.2 and Model SimEE 10.1b student’s edition of Mentor Graphics Company.
Authors and Affiliations
Yogesh Kumar Sharma*
INVESTIGATION ON VARIOUS DESIGN PARAMETERS WHICH AFFECT THE BANDGAP OF TWO DIMENSIONAL PHOTONIC CRYSTAL STRUCTURE
An emerging element in optical fiber communication, 2D Photonic Crystal is an artificial periodic structure having a bandgap which shows a prohibition of a range of wavelengths to pass away through it. Various...
A REVIEW ON CURRENT TECHNIQUES OF TRIANGULATION OF IMAGE POINTS FROM TWO IMAGE FRAMES FOR 3-D MODERNIZATION
Obstacle detection is a main key of autonomous vehicles. When communicating with huge robots in unstructured background, resilient obstacle detection is required. Few of the existing methods are mainly suited for the b...
Development of Multi-focus Image Fusion Technique using Discrete Wavelet Transform (DWT) for Digital Images
Image fusion is the process which combines information of multiple images from the same scene. The resultant fused image is a new image that have the most desirable information and characteristics of each input i...
Wormhole Attack Elimination in Mobile Ad-hoc Networks With OPTIMIZED Multipath Algorithm
Communication has different terms for different users in the technology. Wireless and Ad-hoc communication are two main communication medium which are fulfilling different domain requirement for the users. Talking abou...
AN INVENTORY MODEL FOR CONSTANT DETERIORATION UNDER SELLING PRICE DEMAND RATE USING PARTIAL BACKLOGGING
In this study, we investigate the inventory model over a period of fixed planning for a deteriorating item having a selling price demand rate in which shortages are allowed and are partially backlogged. The re...