FPGA Implementation and Comparative Analysis of DES and AES Encryption Algorithms Using Verilog File I/O Operations

Author(s):  
Akshada Muneshwar ◽  
B. K. N. Srinivasarao ◽  
Ajay Chunduri
Author(s):  
Maksat Kalimoldayev ◽  
Sakhybay Tynymbayev ◽  
Miras Magzom ◽  
Dana Tananova ◽  
Sergey E. Lyshevski

2020 ◽  
Vol 224 ◽  
pp. 01043
Author(s):  
Larissa Cherckesova ◽  
Olga Safaryan ◽  
Pavel Razumov ◽  
Dmitry Medvedev ◽  
Veronica Kravchenko ◽  
...  

This report is devoted to the comparative analysis of the lightweight NASH block encryption algorithm and the algorithm presented by USA National Security Agency in 2013 – SPECK. Their detailed description is given, the analysis is made. The task of the study is to investigate and analyze cryptographic encryption algorithms used in devices with limited capabilities such as microcontrollers. The study of lightweight encryption algorithms and their application for cybersecurity tasks is necessary to create the latest cryptographic systems aimed at preventing various types of attacks. The study revealed that the NASH block encryption algorithm showed more optimized performance, since the number of rounds of cipher execution is less than that Speck algorithm, which provides greater stability of algorithm with least number of executable rounds.


2018 ◽  
Vol 51 (6) ◽  
pp. 312-317 ◽  
Author(s):  
David Smekal ◽  
Jan Hajny ◽  
Zdenek Martinasek

2020 ◽  
Vol 79 ◽  
pp. 103324 ◽  
Author(s):  
Prateek Sikka ◽  
Abhijit R Asati ◽  
Chandra Shekhar

2020 ◽  
Vol 5 (20) ◽  
pp. 42-47
Author(s):  
Vivek Ranjan ◽  
Kailash Patidar ◽  
Rishi Kushwaha

In our approach the combination of RC4 and Blowfish algorithms with chaos mapping (RC4BC) has been presented for the image encryption. In the first phase image dataset has been considered. Then weight values have been calculated based on the image pixels. It has been calculated based on the attribute pixel, corelated pixels and the analytical factors of the edges. Then substitution has been performed through RC4 encryption mechanism. The substitution has been performed based on 8 sub blocks for the first time. After that different random substation has been applied based on the reallocation of bytes up to 16 rounds. Final substitution has been performed by the blowfish and chaos mapping. By this method the pixels of the images are rotated and shuffled with the XOR operation along with 16-byte reshuffling in each iteration. A total of 50 rounds have been considered for the shuffling, rotation and mapping. Then for comparative analysis peak signal to noise ratio (PSNR) and mean square error (MSE) have been calculated. Our results show that it is efficient in terms of MSE and PSNR values.


Sign in / Sign up

Export Citation Format

Share Document