An asynchronous VLSI implementation of the International Data encryptionalgorithm (IDEA) is presented in this paper. In order to evaluate the asynchronous design a synchronous version of the algorithm was also design...
详细信息
An asynchronous VLSI implementation of the International Data encryptionalgorithm (IDEA) is presented in this paper. In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm. By using Synopsys commercial available tools the VHDL code was synthesized. After placing and routing both designs were fabricated with 0.6 mum CMOS technology. With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm. This new approach proves efficiently the lowest power consumption of the asynchronous implementation compared to the existing synchronous. Therefore, the asynchronous chip performs efficiently in Wireless encryption Protocols and high speed networks.
High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication networ...
详细信息
High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication network. Since the size of IoV communication is rapidly growing, it is now an essential part of our regular routines. Due to its dynamic nature and massive size, it is essential to avoid any miss-communication and protect the data privacy of each *** to link remotely to each other and to various platforms and groups that may be using the same com-munications system. This quality link between vehicles and the need for information exchanges among vehicles introduces vulnerability and threats that can be exploited by cybercriminals. This research emphasizes on enhancing data security in real-time IoV communication. It presents a trust-driven privacy method using encryption and steganography for IoV. This method uses an Efficient algorithm for Secure Transmission (EAST) that integrates encryption and steganography algorithms. The proposed EAST is then compared to the various current state of arts, i.e., AES (Advanced encryption Standard), DES (Data encryption Standard), G-DES (Generalized DES), and Standard LSB on the basis of various performance measuring parameters, i.e., encryption and decryption time, efficiency, avalanche effect, PSNR, and file cover size. Experimental results are promising for the proposed EAST method, which reported a better time efficiency of 0.86 ms, avalanche effect of 58.81%, and PSNR of 78.58%, compared to the current state arts.
The purpose of this study encryption method will apply on all parts image by the Karhunen-Loeve Transform (KLT). It will be discussed time complexity and storage complexity in method (database consists of 40 images). ...
详细信息
The purpose of this study encryption method will apply on all parts image by the Karhunen-Loeve Transform (KLT). It will be discussed time complexity and storage complexity in method (database consists of 40 images). The Karhunen-Loeve Transform (KLT) is always used in image processing and it has a wide application area. It was called "the best transform" because the decorrelation, energy concentration and Mean Square Error (MSE) is very small. The first step is found The Characteristics of the (KLT) by convert image matrix to elements vector, the second step found the covariance matrix, then compute its Great ability of decorrelation. Finally, we will reconstruct the de-nosing matrix to the Image by KLT. The experimental results and security analysis confirm the effectiveness of the indicates the robustness and advantages of the algorithm.
暂无评论