Efficient Hardware Encryption Using Lightweight Process
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 102 | Weekly Hits: ⮙4 | Monthly Hits: ⮙17

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Providing security by software encryption has many vulnerabilities. Hence, hardware cryptography is becoming more prominent. Hence, we propose a novel approach in lightweight hardware cryptography which provides higher throughput, faster execution, lower memory consumption and reliable security. We are using the hybrid encryption system which is a combination of PRESENT, HUMMING-BIRD, TWOFISH algorithm and GRP. In this paper we enhanced the existing cryptosystem with variable length key size and also keep the sender and receiver unaware of the generated key used for encryption, hence providing maximum security.

Keywords: Lightweight Cryptography, Block- cipher, Encryption, PRESENT, HUMMINGBIRD, TWOFISH

Edition: Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Share this Article

How to Cite this Article?

Deeksha Bhardwaj, Rohit Pawar, Aman Jain, "Efficient Hardware Encryption Using Lightweight Process", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151369, Volume 4 Issue 11, November 2015, 1200 - 1203

Enter Your Registered Email Address





Similar Articles with Keyword 'Encryption'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'PRESENT'

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 152 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1213 - 1218

Sentiment Analysis of Twitter Data to Analyze the Acceptance of Aadhaar

Aarushi Thakral, Vasantha W. B.

Share this Article

Downloads: 9 | Weekly Hits: ⮙8 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1169 - 1173

Implementation of Long Range Wireless IoT Device for Agriculture Using Multi-Hop Topology Design

Anchla Rajput, Anshul Sarawagi

Share this Article

Similar Articles with Keyword 'TWOFISH'

Downloads: 102 | Weekly Hits: ⮙4 | Monthly Hits: ⮙17

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1324 - 1327

Enhancing Organization Security using Attribute-Based Encryption for Data Sharing

Priya D. Tangde, A. S. Chhajed

Share this Article

Downloads: 111 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 733 - 736

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

Vina M. Lomte, Archana D. Shinde

Share this Article



Top