International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj [7] | Rohit Pawar | Aman Jain


Abstract: Providing security by software encryption has many vulnerabilities. Hence, hardware cryptography is becoming more prominent. Hence, we propose a novel approach in lightweight hardware cryptography which provides higher throughput, faster execution, lower memory consumption and reliable security. We are using the hybrid encryption system which is a combination of PRESENT, HUMMING-BIRD, TWOFISH algorithm and GRP. In this paper we enhanced the existing cryptosystem with variable length key size and also keep the sender and receiver unaware of the generated key used for encryption, hence providing maximum security.


Keywords: Lightweight Cryptography, Block- cipher, Encryption, PRESENT, HUMMINGBIRD, TWOFISH


Edition: Volume 4 Issue 11, November 2015,


Pages: 1200 - 1203


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Deeksha Bhardwaj, Rohit Pawar, Aman Jain, "Efficient Hardware Encryption Using Lightweight Process", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1200-1203, https://www.ijsr.net/get_abstract.php?paper_id=NOV151369

Similar Articles with Keyword 'Block cipher'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha [4] | K. Mahesh [9]

Share this Article

Downloads: 111

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3182 - 3187

Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation

Punam Hiwase | Sapna Khapre [4]

Share this Article
Top