SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                                                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                      Volume 1, Issue 4, June 2012




         Performance Comparison of Symmetric Data
                  Encryption Techniques
                                              Deepak Kumar Dakate, Pawan Dubey
                                                                        Original                          Encrypted
Abstract- In present scenario various data encryption
                                                                                  Encryption                               Decryption
                                                                         data                              data
algorithms are available for data security which has always                        Process                                  Process
been important in all aspects of life. Data may contain
confidential form of information that one want to secure from                  Key                                   Key
any third party access. As we are having number of
cryptographic algorithm so sometimes it can create little bit
                                                                                                                                  Original
confusion to select best one. This paper provides a view to                                                                     data
choose the best available one on the basis of their performance
parameter. It can be all the more important as technology                Encryption Algorithm               Decryption Algorithm
continues to control various operations in our day to day life
Reprogrammable devices are highly attractive options for                 Fig1: Symmetric Encryption/Decryption Process of
hardware implementations of encryption algorithms as they                     Blowfish Algorithm
provide cryptographic algorithm agility, physical security, and
potentially much higher performance, therefore this paper
investigates a hardware design to efficiently implement a special
type block ciphers in VHDL and its comparative analysis in
                                                                            II. HARDWARE IMPLEMENTATION USING VHDL
different parameter variation . This hardware design is applied
to the new secret and variable size key block cipher called                  VHDL (Very High Speed Integrated Circuit Hardware
Blowfish designed to meet the requirements of the previous               Description Language) was chosen as a language used to
known standard and to increase security and to improve                   describe the improvement suggested to algorithm stated
performance. The proposed algorithm will be used a variable              above. VHDL has many features appropriate for describing
key size.
                                                                         the behaviour of electronic components ranging from simple
  Index Terms— Blowfish Encryption, RTL, S BOX, VHDL.
                                                                         logic gates to complete microprocessors and custom chips.
                                                                         Features of VHDL allow electrical aspects of circuit
                                                                         behaviour (such as rise and fall times of signals, delays
                 I. INTRODUCTION                                         through gates, and functional operation) to be precisely
Blowfish Encryption Algorithm:                                           described .[2]
                                                                            This paper also is presenting a mix of VHDL architecture
     If the world is to have a secure, unpatented, and freely-           (structural and behavioural) in order to write the deign code
available encryption algorithm by the turn of the century, we            of the encryption algorithm that describe improved blowfish
need to develop several candidate encryption algorithms                  algorithm. The presented architecture allows keeping the
now. These algorithms can then be subjected to years of                  flexibility of the algorithm by taking advantage of generic
public scrutiny and cryptanalysis. Then, the hope is that one            VHDL coding. It executes one round per clock cycle,
or more candidate algorithms will survive this process, and              computes the round and the key round in parallel and
can eventually become a new standard.                                    supports both encryption and decryption at a minimal cost.[3]
   Blowfish, a new secret-key block cipher, is proposed. It is
a Feistel network, iterating a simple encryption function 16                                    III.PLATFORM USED
times. The block size is 64 bits, and the key can be any length
up to 448 bits. Blowfish is security treatment which applies               With the help of VHDL as a description language for
its special kind of encryption process to secure the data in an
                                                                         hardware Altera Quartus II has been used as a platform to
easy and efficient way. Moreover Blowfish is a variable key
                                                                         develop the logic and for other analysis.
size encryption algorithm which is based on block cipher
technology. It is a symmetric kind of algorithm that uses
same key for encryption as well as for decryption.[1]
    Figure given below shows the symmetric encryption
process with the application of public key.
                                                                                       IV.ENCRYPTION DEVELOPMENT

                                                                            As to develop the logic, key generation is one of the
   Manuscript received May, 2012.
   Deepak Kumar Dakate, Electronics And Communication, RGPV,Bhopal       complex schedule of Blowfish encryption because of the fact
Gyan   Ganga    College  of   Technology, Jabalpur   (M.P.)  (e-mail:    that it includes variable size key. So for the development of
deepakdakate@gmail.com). Jabalpur, India.                                the key the use of S BOX (Substitution Box) can be a greater
   Pawan Dubey, Master of Engineering,JEC Jabalpur. Gyan Ganga College
of Technology, Jabalpur (M.P.) (e-mail: pawan_dubey54@yahoo.com).
                                                                         aid for developing of logic of this algorithm.
Jabalpur, India


                                                                                                                                             163
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                               International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                                    Volume 1, Issue 4, June 2012



                                                                                          RTL view in fig3 shows that one single S BOX can output
                                                                                       32 bits of data while taking 8 bit as an input, so that use of
                                                                                       four S BOX with the logic shown in fig2 can develop a key of
                                                                                       size 128 bits. For the development of key variation the
                                                                                       configuration of S Boxes can be changed.


                                                                                         So with the help of generated key following process is
                                                                                       pursued for encryption implementation


                                                                                              Individual Module’s VHDL Compilation



                                                                                           Individual Module’s VHDL Entry Development


Fig2: Key Generation using Fiestel Network for
     Blowfish Encryption                                                               Individual Module’s RTL Generation and Simulation


   Above figure shows the key generation concept of this
particular implementation using VHDL. As we provide 8 bit                              Crypto Architecture VHDL Design and Simulation
input to single S Box, which outputs 32 bits data, similarly in
case of rest of S Boxes the same concept to be followed. After
which addition and XOR operation generates the key which                               Crypto Algorithm Development and Simulation
is used for data encryption.
                                                                                                Steps for Encryption Design.[5]
                           DualReadPortRAM:u_DualReadPortRAM

             CLK_I          A_CLK_I

            W_EN_I          A_EN_I
                                                                                                  V.POWER PERFORMANCE ANALYSIS
                       1    A_WE_I
                            B_CLK_I
                                                 B_DATA_O[31..0]   R_DATA_O[31..0]        In variable key size Blowfish algorithm the power
           R_EN_I           B_EN_I

     W_ADDR_I[7..0]         A_ADDR_I[7..0]
                                                                                       requirement can be analyzed and compared with other
     W_DATA_I[31..0]        A_DATA_I[31..0]                                            algorithms by varying the key size under certain limit for
     R_ADDR_I[7..0]         B_ADDR_I[7..0]
                                                                                       same logic to generate the same condition that other
                                                                                       algorithm follows in terms of key size.

Fig3: RTL View of Single S BOX after Software
      Simulation.
                                                                                       Table 1: Power Analysis For different Key Size.[4][6]

                                                                                       S.        Algorithms         Key Size                 Power
                                                                                       No.                                              Consumption(mW)

                                                                                       1         BLOWFISH           128                 29.86

                                                                                       2         AES                128                 2000

                                                                                       3         IDEA               128                 58

                                                                                       4         Rijndael           128                 82


                                                                                         Power analysis for128 bits key size Blowfish encryption
                                                                                       can be compared with other symmetric algorithm which also
                                                                                       use 128 bits key size.


Fig4: Waveform Screenshot of Software Simulation


                                                                                                                                                           164
ISSN: 2278 – 1323
                                                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                             Volume 1, Issue 4, June 2012

                                                                                      VI.TIMING ANALYSIS


                                                                Table2: Speed comparison      Analysis of Blowfish
                                                                Algorithm with AES,IDEA and Rijndael Algorithm
                                                                S.     Algorithms    Key Size         Speed (MB/Sec)
                                                                No.
                                                                1         Blowfish             128                 64.386
                                                                2         Rijndael             128                 61.010
                                                                3         Rijndael             192                 53.145
                                                                4         Rijndael             256                 48.229
                                                                5         DES                  128                 21.340




Fig5:Software Screenshot of Poer Analysis.




                                                                Fig7: Timing Optimization of Blowfish, Rijndael and
                                                                      DES

                                                                                        VII. CONCLUSION

                                                                   Above mentioned concept presented a low power, high
                                                                throughput Blowfish cryptographic implementation. The
                                                                proposed scheme allows 29.86 mW power for 128 bits to be
                                                                dissipate which is also very less as compared to other shown
                                                                algorithms. The result also shows superiority of blowfish
Fig6: Power comparison chart of Blowfish Algorithm(B)           algorithm over other algorithms on timing constraint.
with AES(A),IDEA(I) and Rijndael (R)Algorithm.

   Figure6 demonstrate the power comparison analysis of                               I. ACKNOWLEDGMENT
Blowfish Algorithm, AES,IDEA and Rijndael Algorithm.
From figure it is clear that blowfish consumes negligible                                         II.
amount of power as compared to other algorithm. Among of           Author thanks Mr. Avinash Gaur for his valuable guidance
these AES consumes most amount of power. IDEA And               for this paper. Author is very thankful to his colleague for
Rijndael consumes more power than blowfish but less than        giving time to time advice for different section of paper.
AES.


                            ‘



                                                                                                                                    165
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                    International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                         Volume 1, Issue 4, June 2012


                        III. REFERENCES


[1] B. Schneier, Description of a New Variable-Length Key, 64-Bit Block
Cipher (Blowfish),Fast Software Encryption, Cambridge Security Workshop
Proceedings (December 1993), Springer-Verlag, 1994

[2] M. Thaduri, S.-M. Yoo, An efficient VLSI implementation of IDEA
encryption algorithm using VHDL, SCIENCEDIRECT ,5 JUNE 2004

.[3] Afaf M. Ali Al-Neaimi, New Approach for Modifying Blowfish
Algorithm by Using Multiple Keys, IJCSNS, March 2011.

[4]NIKOS SKLAVOS, ALEXANDROS PAPAKONSTANTINOU,
SPYROS THEOHARIS and ODYSSEAS KOUFOPAVLOU, Low-power
Implementation of an Encryption/DecryptionSystem with Asynchronous
Techniques, VLSI Design, 2002 Vol. 15

[5] P. Karthigai Kumar, K. Baskaran , An ASIC implementation of low
power and high throughput blowfish crypto algorithm ,SCIENCEDIRECT ,6
April 2010.

[6] M. STRACHACKI and S. SZCZEPAŃSKI, Power equalization of AES
FPG Aimplementation, bulletin of the polish academy of sciences technical
sciences, Vol. 58, No. 1, 2010




                         Deepak Kumar Dakate: Completed B.E. in
Electronics & Communication Engineering. Pursuing M. tech in digital
communication from Gyan Ganga College Of Technology
,Jabalpur(M.P.).Area of research is communication and cryptography




                        Pawan Dubey: Completed M.E. in Microwave
Engineering from JEC Jabalpur. Working as an Asst. Professor at Gyan
Ganga College Of Technology ,Jabalpur(M.P.).Area of research is Biometric
Recognition, Antenna and Communication




                                                                                                                                                166

Contenu connexe

Tendances

IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmIJARIIT
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...ijtsrd
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 
A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data securityeSAT Journals
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
 
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographicImplementation of hummingbird cryptographic
Implementation of hummingbird cryptographiceSAT Publishing House
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 

Tendances (19)

IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data security
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographicImplementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 

En vedette

Ten Things About Social Media You Should Know Slideshare 1233613242878686 1
Ten Things About Social Media You Should Know Slideshare 1233613242878686 1Ten Things About Social Media You Should Know Slideshare 1233613242878686 1
Ten Things About Social Media You Should Know Slideshare 1233613242878686 1dcigroups
 
The bones of a nice Python script
The bones of a nice Python scriptThe bones of a nice Python script
The bones of a nice Python scriptsaniac
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloeSAT Journals
 
Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Othersnathanurag
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)Mecheko Sha
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardPrasad Prabhu
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardShafaan Khaliq Bhatti
 

En vedette (14)

Ten Things About Social Media You Should Know Slideshare 1233613242878686 1
Ten Things About Social Media You Should Know Slideshare 1233613242878686 1Ten Things About Social Media You Should Know Slideshare 1233613242878686 1
Ten Things About Social Media You Should Know Slideshare 1233613242878686 1
 
625 634
625 634625 634
625 634
 
The bones of a nice Python script
The bones of a nice Python scriptThe bones of a nice Python script
The bones of a nice Python script
 
Tv shot semana 38
Tv shot semana 38Tv shot semana 38
Tv shot semana 38
 
C010521418
C010521418C010521418
C010521418
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
 
Network Security
Network SecurityNetwork Security
Network Security
 
Deroure Repo3
Deroure Repo3Deroure Repo3
Deroure Repo3
 
Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Others
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
DES
DESDES
DES
 

Similaire à 163 166

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 

Similaire à 163 166 (20)

262 265
262 265262 265
262 265
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
40520130101005
4052013010100540520130101005
40520130101005
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

163 166

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Performance Comparison of Symmetric Data Encryption Techniques Deepak Kumar Dakate, Pawan Dubey  Original Encrypted Abstract- In present scenario various data encryption Encryption Decryption data data algorithms are available for data security which has always Process Process been important in all aspects of life. Data may contain confidential form of information that one want to secure from Key Key any third party access. As we are having number of cryptographic algorithm so sometimes it can create little bit Original confusion to select best one. This paper provides a view to data choose the best available one on the basis of their performance parameter. It can be all the more important as technology Encryption Algorithm Decryption Algorithm continues to control various operations in our day to day life Reprogrammable devices are highly attractive options for Fig1: Symmetric Encryption/Decryption Process of hardware implementations of encryption algorithms as they Blowfish Algorithm provide cryptographic algorithm agility, physical security, and potentially much higher performance, therefore this paper investigates a hardware design to efficiently implement a special type block ciphers in VHDL and its comparative analysis in II. HARDWARE IMPLEMENTATION USING VHDL different parameter variation . This hardware design is applied to the new secret and variable size key block cipher called VHDL (Very High Speed Integrated Circuit Hardware Blowfish designed to meet the requirements of the previous Description Language) was chosen as a language used to known standard and to increase security and to improve describe the improvement suggested to algorithm stated performance. The proposed algorithm will be used a variable above. VHDL has many features appropriate for describing key size. the behaviour of electronic components ranging from simple Index Terms— Blowfish Encryption, RTL, S BOX, VHDL. logic gates to complete microprocessors and custom chips. Features of VHDL allow electrical aspects of circuit behaviour (such as rise and fall times of signals, delays I. INTRODUCTION through gates, and functional operation) to be precisely Blowfish Encryption Algorithm: described .[2] This paper also is presenting a mix of VHDL architecture If the world is to have a secure, unpatented, and freely- (structural and behavioural) in order to write the deign code available encryption algorithm by the turn of the century, we of the encryption algorithm that describe improved blowfish need to develop several candidate encryption algorithms algorithm. The presented architecture allows keeping the now. These algorithms can then be subjected to years of flexibility of the algorithm by taking advantage of generic public scrutiny and cryptanalysis. Then, the hope is that one VHDL coding. It executes one round per clock cycle, or more candidate algorithms will survive this process, and computes the round and the key round in parallel and can eventually become a new standard. supports both encryption and decryption at a minimal cost.[3] Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 III.PLATFORM USED times. The block size is 64 bits, and the key can be any length up to 448 bits. Blowfish is security treatment which applies With the help of VHDL as a description language for its special kind of encryption process to secure the data in an hardware Altera Quartus II has been used as a platform to easy and efficient way. Moreover Blowfish is a variable key develop the logic and for other analysis. size encryption algorithm which is based on block cipher technology. It is a symmetric kind of algorithm that uses same key for encryption as well as for decryption.[1] Figure given below shows the symmetric encryption process with the application of public key. IV.ENCRYPTION DEVELOPMENT As to develop the logic, key generation is one of the Manuscript received May, 2012. Deepak Kumar Dakate, Electronics And Communication, RGPV,Bhopal complex schedule of Blowfish encryption because of the fact Gyan Ganga College of Technology, Jabalpur (M.P.) (e-mail: that it includes variable size key. So for the development of deepakdakate@gmail.com). Jabalpur, India. the key the use of S BOX (Substitution Box) can be a greater Pawan Dubey, Master of Engineering,JEC Jabalpur. Gyan Ganga College of Technology, Jabalpur (M.P.) (e-mail: pawan_dubey54@yahoo.com). aid for developing of logic of this algorithm. Jabalpur, India 163 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 RTL view in fig3 shows that one single S BOX can output 32 bits of data while taking 8 bit as an input, so that use of four S BOX with the logic shown in fig2 can develop a key of size 128 bits. For the development of key variation the configuration of S Boxes can be changed. So with the help of generated key following process is pursued for encryption implementation Individual Module’s VHDL Compilation Individual Module’s VHDL Entry Development Fig2: Key Generation using Fiestel Network for Blowfish Encryption Individual Module’s RTL Generation and Simulation Above figure shows the key generation concept of this particular implementation using VHDL. As we provide 8 bit Crypto Architecture VHDL Design and Simulation input to single S Box, which outputs 32 bits data, similarly in case of rest of S Boxes the same concept to be followed. After which addition and XOR operation generates the key which Crypto Algorithm Development and Simulation is used for data encryption. Steps for Encryption Design.[5] DualReadPortRAM:u_DualReadPortRAM CLK_I A_CLK_I W_EN_I A_EN_I V.POWER PERFORMANCE ANALYSIS 1 A_WE_I B_CLK_I B_DATA_O[31..0] R_DATA_O[31..0] In variable key size Blowfish algorithm the power R_EN_I B_EN_I W_ADDR_I[7..0] A_ADDR_I[7..0] requirement can be analyzed and compared with other W_DATA_I[31..0] A_DATA_I[31..0] algorithms by varying the key size under certain limit for R_ADDR_I[7..0] B_ADDR_I[7..0] same logic to generate the same condition that other algorithm follows in terms of key size. Fig3: RTL View of Single S BOX after Software Simulation. Table 1: Power Analysis For different Key Size.[4][6] S. Algorithms Key Size Power No. Consumption(mW) 1 BLOWFISH 128 29.86 2 AES 128 2000 3 IDEA 128 58 4 Rijndael 128 82 Power analysis for128 bits key size Blowfish encryption can be compared with other symmetric algorithm which also use 128 bits key size. Fig4: Waveform Screenshot of Software Simulation 164
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 VI.TIMING ANALYSIS Table2: Speed comparison Analysis of Blowfish Algorithm with AES,IDEA and Rijndael Algorithm S. Algorithms Key Size Speed (MB/Sec) No. 1 Blowfish 128 64.386 2 Rijndael 128 61.010 3 Rijndael 192 53.145 4 Rijndael 256 48.229 5 DES 128 21.340 Fig5:Software Screenshot of Poer Analysis. Fig7: Timing Optimization of Blowfish, Rijndael and DES VII. CONCLUSION Above mentioned concept presented a low power, high throughput Blowfish cryptographic implementation. The proposed scheme allows 29.86 mW power for 128 bits to be dissipate which is also very less as compared to other shown algorithms. The result also shows superiority of blowfish Fig6: Power comparison chart of Blowfish Algorithm(B) algorithm over other algorithms on timing constraint. with AES(A),IDEA(I) and Rijndael (R)Algorithm. Figure6 demonstrate the power comparison analysis of I. ACKNOWLEDGMENT Blowfish Algorithm, AES,IDEA and Rijndael Algorithm. From figure it is clear that blowfish consumes negligible II. amount of power as compared to other algorithm. Among of Author thanks Mr. Avinash Gaur for his valuable guidance these AES consumes most amount of power. IDEA And for this paper. Author is very thankful to his colleague for Rijndael consumes more power than blowfish but less than giving time to time advice for different section of paper. AES. ‘ 165 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 III. REFERENCES [1] B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994 [2] M. Thaduri, S.-M. Yoo, An efficient VLSI implementation of IDEA encryption algorithm using VHDL, SCIENCEDIRECT ,5 JUNE 2004 .[3] Afaf M. Ali Al-Neaimi, New Approach for Modifying Blowfish Algorithm by Using Multiple Keys, IJCSNS, March 2011. [4]NIKOS SKLAVOS, ALEXANDROS PAPAKONSTANTINOU, SPYROS THEOHARIS and ODYSSEAS KOUFOPAVLOU, Low-power Implementation of an Encryption/DecryptionSystem with Asynchronous Techniques, VLSI Design, 2002 Vol. 15 [5] P. Karthigai Kumar, K. Baskaran , An ASIC implementation of low power and high throughput blowfish crypto algorithm ,SCIENCEDIRECT ,6 April 2010. [6] M. STRACHACKI and S. SZCZEPAŃSKI, Power equalization of AES FPG Aimplementation, bulletin of the polish academy of sciences technical sciences, Vol. 58, No. 1, 2010 Deepak Kumar Dakate: Completed B.E. in Electronics & Communication Engineering. Pursuing M. tech in digital communication from Gyan Ganga College Of Technology ,Jabalpur(M.P.).Area of research is communication and cryptography Pawan Dubey: Completed M.E. in Microwave Engineering from JEC Jabalpur. Working as an Asst. Professor at Gyan Ganga College Of Technology ,Jabalpur(M.P.).Area of research is Biometric Recognition, Antenna and Communication 166