Design of RC5 Algorithm using Pipelined Architecture 

Abstract

Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secure data transmission for communication purposes. The information should be sent confidentially over the network without fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. Secure transmission require cryptographic algorithm. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data dependent rotations. RC5 has a variable word size, variable number of rounds and a variable length secret key. The encryption and decryption algorithms are exceptionally simple. The requirements of hardware implementation of these algorithms are less power consumption, allocation of resources, re-configurability, architecture efficiency and cost efficiency. This paper aims to the speed, improve performance and throughput. It’s organized as brief introduction about algorithm, RC5 algorithm, System on Chip architecture, pipelined architecture, and results. 

Authors and Affiliations

R. Sanju Abraham , A. ARUN

Keywords

Related Articles

ADVANCED HARDWARE ARCHITECTUREFOR ADABOOSTBASEDREALTIMEOBJECT DETECTION  

Abstract—In this paper, we present a work of new hardware architecture to a Flexible Parallel Hardware Architecture for AdaBoost-Based Real-Time Object Detection. Here, we anticipate that optimizations in terms of power...

A comparative study of Level II fuzzy sets and Type II fuzzy sets  

This paper reviews and compares theories of level II fuzzy sets and type II fuzzy sets. Two approaches for the usefulness of level II fuzzy sets are reviewed one is in database modeling while other is in GIS. Type II...

Trust in Cloud Computing

Cloud computing is the most recent technology in the Information technology industry which a lot of companies and government are putting much concern to make sure that they have benefited from this new innovation. Howeve...

High Performance Computing: A Survey 

This paper surveys techniques used for high performance computing. High performance computing is used to develop machines which provide computing power like super computers. It concentrates on both software as well...

Survey on Network Security, Threats & Firewalls  

Network security is an important task that must be seriously considered when designing a network. It defined as the policies and procedures followed by a network administrator to protect the network devices from th...

Download PDF file
  • EP ID EP115243
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

R. Sanju Abraham, A. ARUN (2013). Design of RC5 Algorithm using Pipelined Architecture . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 647-651. https://europub.co.uk./articles/-A-115243