Design of RC5 Algorithm using Pipelined Architecture 

Abstract

Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secure data transmission for communication purposes. The information should be sent confidentially over the network without fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. Secure transmission require cryptographic algorithm. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data dependent rotations. RC5 has a variable word size, variable number of rounds and a variable length secret key. The encryption and decryption algorithms are exceptionally simple. The requirements of hardware implementation of these algorithms are less power consumption, allocation of resources, re-configurability, architecture efficiency and cost efficiency. This paper aims to the speed, improve performance and throughput. It’s organized as brief introduction about algorithm, RC5 algorithm, System on Chip architecture, pipelined architecture, and results. 

Authors and Affiliations

R. Sanju Abraham , A. ARUN

Keywords

Related Articles

Improvement of the SARA strategies for MANET model 

Wireless ad-hoc networks are autonomous systems composed of mobile hosts that are free to move around arbitrarily. Routing is difficult in MANET’s since mobility may cause radio links to break frequently. When any...

 Use of Open Source Software in Engineering

The term Open Source Software (OSS) is widely described with the software that is available with its source code and a licensed to redevelop and redistributes it. Todays open source softwares are widely used for ev...

Low Power And Area Efficiency of SHA-1 and SHA-2 Hash Algorithm

This paper summarizes about the design of a Low Power and Efficiency of SHA-1 and SHA-2 Hash Functions capable of performing all members of the Secure Hash Algorithm (SHA) group of Hash Functions. The need for high-s...

Particle Swarm Optimization in Cryptanalysis of DES  

In this paper for the first time Particle Swarm Optimization is applied in the field of cryptanalysis of DES based on their ability to selectively explore the solution space of a given problem. PSO is a robust stoc...

Perspective Study on Resource Information Aggregation in Computational Grid  

Grid Computing is a mechanism of distributed computing to coordinate and share the networked resources, data domains, storage devices and processing power across geographically distributed locations. In the compu...

Download PDF file
  • EP ID EP115243
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

R. Sanju Abraham, A. ARUN (2013). Design of RC5 Algorithm using Pipelined Architecture . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 647-651. https://europub.co.uk./articles/-A-115243