VLSI implementation of text to image encryption algorithm based on private key encryption

A. Suresh, A. S. Remya Ajai
{"title":"VLSI implementation of text to image encryption algorithm based on private key encryption","authors":"A. Suresh, A. S. Remya Ajai","doi":"10.1109/ICEEOT.2016.7755647","DOIUrl":null,"url":null,"abstract":"In cryptographic applications, the data sent to a remote host are encrypted at the source machine using an encryption key and then the encrypted data are sent to the destination machine, where it is decrypted to get the original data. Thus the attacker will not have the encryption key which is required to get the original data and so a hacker can do nothing with any cryptographic system. Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs) are used for hardware implementations of cryptographic algorithms. As FPGA devices progressed both in terms of resources and performance, the latest FPGAs provide solutions that are easily customizable for system connectivity, DSP, and data processing applications. In this paper, implementation of an efficient cryptographic algorithm is done in Xilinx SPARTEN 3E FPGA. Also the algorithm is analyzed by calculating the number of all possible key permutations.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEOT.2016.7755647","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

In cryptographic applications, the data sent to a remote host are encrypted at the source machine using an encryption key and then the encrypted data are sent to the destination machine, where it is decrypted to get the original data. Thus the attacker will not have the encryption key which is required to get the original data and so a hacker can do nothing with any cryptographic system. Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs) are used for hardware implementations of cryptographic algorithms. As FPGA devices progressed both in terms of resources and performance, the latest FPGAs provide solutions that are easily customizable for system connectivity, DSP, and data processing applications. In this paper, implementation of an efficient cryptographic algorithm is done in Xilinx SPARTEN 3E FPGA. Also the algorithm is analyzed by calculating the number of all possible key permutations.
VLSI实现了基于私钥加密的文本到图像加密算法
在加密应用程序中,发送到远程主机的数据在源机器上使用加密密钥进行加密,然后将加密的数据发送到目标机器,在目标机器上对其进行解密以获得原始数据。因此,攻击者将无法获得获得原始数据所需的加密密钥,因此黑客无法对任何加密系统做任何事情。可编程器件如现场可编程门阵列(fpga)用于加密算法的硬件实现。随着FPGA设备在资源和性能方面的进步,最新的FPGA提供了易于定制的解决方案,用于系统连接,DSP和数据处理应用。本文在Xilinx SPARTEN 3E FPGA上实现了一种高效的加密算法。通过计算所有可能的键排列的个数,对算法进行了分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信