Performance Comparison of Symmetric Data Encryption Techniques
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
In present scenario various data encryption algorithms are available for data security which has always been important in all aspects of life. Data may contain confidential form of information that one want to secure from any third party access. As we are having number of cryptographic algorithm so sometimes it can create little bit confusion to select best one. This paper provides a view to choose the best available one on the basis of their performance parameter. It can be all the more important as technology continues to control various operations in our day to day life Reprogrammable devices are highly attractive options for hardware implementations of encryption algorithms as they provide cryptographic algorithm agility, physical security, and potentially much higher performance, therefore this paper investigates a hardware design to efficiently implement a special type block ciphers in VHDL and its comparative analysis in different parameter variation . This hardware design is applied to the new secret and variable size key block cipher called Blowfish designed to meet the requirements of the previous known standard and to increase security and to improve performance. The proposed algorithm will be used a variable key size.
Authors and Affiliations
Deepak Kumar Dakate , Pawan Dubey
A Framework for Email Clustering and Automatic Answering Method (Formal Approach)
T- The mail-box consisting of number of emails in which many attributes or files are existing in a single email and hence they can be considered as a database. It is not easy to find out the important email or me...
EFFICIENT LOCALIZED DEPLOYMENT ALGORITHM WITH BALANCED ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions , such as temperature, sound, pressure, motion or pollutants. WSN...
Design and implementation of low power 16 bit ALU with clock gating
The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern.In this paper a low power 16 bit ALU is...
PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI
In computer science distributed systems could be more secured with a distributed trust model based on PKI. PKI provides a framework to verify the identities of each entities of given domain. Network and device heterogene...
Energy Enhancement in AOMDV
Mobile computing is evolving rapidly with advances in wireless communications and wireless networking protocols. To facilitate communication, most wireless network devices are portable and battery-powered, and th...