A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography

Abstract

My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which provokes high security. The transferred information was stored securely in the memory unit. By implementing this design, the results can be accomplished that the optimized area is required to integrate the chip with the gate count of 22618, here shown that gate elements are reduced up to 53.98% in comparison with earlier methods and also providing the similar security as well as reduced power consumption of 43.907mw.

Authors and Affiliations

M. Suresh Kumar, G. S. S. Prasad

Keywords

Related Articles

Optimum Loss Allocation in Radial Distribution Systems

In this paper, the proposed method has the advantage that no assumptions are made in the allocation of real power losses as opposed other algorithms available in the literature. A detailed comparison of the real loss...

Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network

Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses...

Ensuring Data Sender Privacy And Reduce Communication&Computation Overhead In WSN

Wireless sensor system is an accumulation of sensor hubs .These sensor hubs sense information to base station when occasion is recognized. Attackers infusing fake messages aggravating the information conveyance in WS...

Secured Architecture To Access Cloud Based Services

Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such...

Multi Credential Routing a New Event Dissemination Strategy Which Strengthens The Weak Subscription Confidentiality

The provisioning of basic safety devices such as authentication and confidentiality is extremely challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is not easy to ge...

Download PDF file
  • EP ID EP28125
  • DOI -
  • Views 261
  • Downloads 1

How To Cite

M. Suresh Kumar, G. S. S. Prasad (2014). A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk./articles/-A-28125