Efficient Hardware Encryption Using Lightweight Process
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Providing security by software encryption has many vulnerabilities. Hence, hardware cryptography is becoming more prominent. Hence, we propose a novel approach in lightweight hardware cryptography which provides higher throughput, faster execution, lower memory consumption and reliable security. We are using the hybrid encryption system which is a combination of PRESENT, HUMMING-BIRD, TWOFISH algorithm and GRP. In this paper we enhanced the existing cryptosystem with variable length key size and also keep the sender and receiver unaware of the generated key used for encryption, hence providing maximum security.

Keywords: Lightweight Cryptography, Block- cipher, Encryption, PRESENT, HUMMINGBIRD, TWOFISH

Edition: Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Share this Article

How to Cite this Article?

Deeksha Bhardwaj, Rohit Pawar, Aman Jain, "Efficient Hardware Encryption Using Lightweight Process", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151369, Volume 4 Issue 11, November 2015, 1200 - 1203

112 PDF Views | 84 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'PRESENT'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Similar Articles with Keyword 'TWOFISH'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 733 - 736

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

Vina M. Lomte, Archana D. Shinde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1324 - 1327

Enhancing Organization Security using Attribute-Based Encryption for Data Sharing

Priya D. Tangde, A. S. Chhajed

Share this Article
Top