Design of RC5 Algorithm using Pipelined Architecture
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secure data transmission for communication purposes. The information should be sent confidentially over the network without fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. Secure transmission require cryptographic algorithm. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data dependent rotations. RC5 has a variable word size, variable number of rounds and a variable length secret key. The encryption and decryption algorithms are exceptionally simple. The requirements of hardware implementation of these algorithms are less power consumption, allocation of resources, re-configurability, architecture efficiency and cost efficiency. This paper aims to the speed, improve performance and throughput. It’s organized as brief introduction about algorithm, RC5 algorithm, System on Chip architecture, pipelined architecture, and results.
Authors and Affiliations
R. Sanju Abraham , A. ARUN
ADVANCED HARDWARE ARCHITECTUREFOR ADABOOSTBASEDREALTIMEOBJECT DETECTION
Abstract—In this paper, we present a work of new hardware architecture to a Flexible Parallel Hardware Architecture for AdaBoost-Based Real-Time Object Detection. Here, we anticipate that optimizations in terms of power...
A comparative study of Level II fuzzy sets and Type II fuzzy sets
This paper reviews and compares theories of level II fuzzy sets and type II fuzzy sets. Two approaches for the usefulness of level II fuzzy sets are reviewed one is in database modeling while other is in GIS. Type II...
Trust in Cloud Computing
Cloud computing is the most recent technology in the Information technology industry which a lot of companies and government are putting much concern to make sure that they have benefited from this new innovation. Howeve...
High Performance Computing: A Survey
This paper surveys techniques used for high performance computing. High performance computing is used to develop machines which provide computing power like super computers. It concentrates on both software as well...
Survey on Network Security, Threats & Firewalls
Network security is an important task that must be seriously considered when designing a network. It defined as the policies and procedures followed by a network administrator to protect the network devices from th...