Simulation and Synthesis for TACIT Network Security in Hardware Description Language Environment

Abstract

 In cryptography, it is necessary to encrypt and decrypt the data for code storage and security. Sometimes it is very difficult to secure physically all access networks. The research paper has introduced a new block cipher cryptographic symmetric key algorithm named “TACIT Encryption and Decryption Technique” and its implementation in hardware description language environment. There are already many algorithms supporting to encryption and decryption process over networks, but limited to their block size and key size. In the new TACIT network security algorithm, the key size and text size may be of ‘n’ bits and it provides better results if key size is larger than block size. In the research, it is emphasized to develop chip for network security and it verified by experimentation on Sparten-3 FPGA synthesis. It is possible to enhance network performance and security by exploiting modern features in Field Programmable Gate Arrays (FPGA), which allow the modeling of encryption and decryption algorithm on System-on-Programmable-Chip (SOPC). The work is carried out on modeling and simulation tools, Xilinx ISE 14.2 and Model SimEE 10.1b student’s edition of Mentor Graphics Company.

Authors and Affiliations

Yogesh Kumar Sharma*

Keywords

Related Articles

EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E - BANKING IN SUDAN

T[b]This study aimed to measure the application of security requirements for e - banking, according to a series of ISO 27000 standards in Sudanese banks. The study is based on a set of hypotheses; planning for the cr...

PARAMETRIC ANALYSIS OF SPUR GEAR TO DETERMINE THE EFFECT OF

Stress produced in gear is an important aspect which have strong impact on designing of gear for particular application. Stress produced in matting gears depends on geometry of gear and geometry depends on pressure angl...

DESIGN, SYNTHESIS, CHARACTERIZATION OF SOME NEW SUBSTITUTED CHALCONES AND STUDIES THEIR ANTIMICROBIAL ACTIVITIES

Eight designed chalcones, named [1(p-benzenesulphonamidophenyl)-3-p-chloro-2-propene-1-one][2], [1(pbenzenesulphonamidophenyl)- 3-p-nitro-2-propene-1-one][3], [1(4-Ureido)phenyl-3-p-chlorophenyl-2-propene- 1-one][5], [1(...

Estimation of Weibull Parameters In Accelerated Life Testing Using Geometric Process With Type-Ii Censored Data

In Accelerated life testing (ALT), generally, the log linear function between life and stress is used to obtain the estimates of original parameters of the life. The log linear is just a simple re-parameterization of th...

PERFORMANCE CHARACTERISTICS OF A FOUR STROKE COMPRESSION IGNITION ENGINE BY VARYING DIAMETER OF THE INTAKE MANIFOLD

In automobiles an intake manifold is a part of engine that supplies and evenly distributes the air to the cylinder. The rate of airflow through an internal combustion engine is an important factor determining the amo...

Download PDF file
  • EP ID EP122337
  • DOI -
  • Views 53
  • Downloads 0

How To Cite

Yogesh Kumar Sharma* (30).  Simulation and Synthesis for TACIT Network Security in Hardware Description Language Environment. International Journal of Engineering Sciences & Research Technology, 3(9), 547-555. https://europub.co.uk/articles/-A-122337