Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/450193
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-01-19T12:48:21Z-
dc.date.available2023-01-19T12:48:21Z-
dc.identifier.urihttp://hdl.handle.net/10603/450193-
dc.description.abstractnewlineIn this new era of digital pedagogy, everything is being newlinecommunicated on time through the internet or other communication newlinemedia. A few trends in digital pedagogy are smart phones, block chain, newlineautomation devices, eBay, face recognition systems, health monitoring newlinedevices, etc. These applications are more reliant on data transmission, newlinemedia, protocols and, more importantly security. In some cases, security newlinechallenges are raised to the next level such as data theft, public and newlineprivate key hacking, bit-stream hacking, authentication and newlineconfidentiality, etc. To meet all these challenges, researchers have newlinedeveloped efficient cryptographic algorithms for secured data newlineencryption and decryption process. Developing a secured environment newlinefor these applications has been a hot topic in recent research. Several newlinereal-time problems, such as massive power consumption and significant newlinecomputing complexity, arise when designing such safe systems. Unique newlinecypher transformation technique with minimal complexity is needed in newlineparticular for small energy and resource restricted wireless sensor newlinenetwork applications. To overcome all these challenges, an intellectual newlinecryptosystem is proposed with hierarchical hardware pipelined newlinestructures. An additional goal of the proposed framework is to enhance newlinethe area efficiency, throughput and optimize the hardware structures. newlineIn this work, two different cryptosystems are introduced in newlineterms of hybrid methods and novel architecture. Initially, block cipher is newlinecombined with stream cipher as encryption systems. Advanced newlinevi newlineEncryption Standards (AES) and Rivest Cipher 4(RC4) are considered newlineblock and stream ciphers. This hybrid technique improved the area, newlinethroughput and power consumption. Finally parallel sub pipelined newlinetechniques and on-the-fly encryption algorithms are combined newlineconcurrently. The proposed algorithms are experimentally tested in the newlineField Programmable Gate Array (FPGA) platform and the performance newlinein terms of area efficiency, throughput and power traces is evaluated
dc.format.extentA5, VII, 154
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleImplementation of Modified hybrid model encryption algorithm Using vlsi
dc.title.alternative
dc.creator.researcherSenthil Murugan M
dc.subject.keywordEngineering
dc.subject.keywordEngineering and Technology
dc.subject.keywordEngineering Electrical and Electronic
dc.description.note
dc.contributor.guideSasilatha T
dc.publisher.placeChennai
dc.publisher.universitySathyabama Institute of Science and Technology
dc.publisher.institutionELECTRONICS DEPARTMENT
dc.date.registered2012
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensionsA5
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:ELECTRONICS DEPARTMENT

Files in This Item:
File Description SizeFormat 
10.annextures.pdfAttached File9.61 MBAdobe PDFView/Open
1.title.pdf125.14 kBAdobe PDFView/Open
2.certficate.pdf1.59 MBAdobe PDFView/Open
3.abstract.pdf11.41 kBAdobe PDFView/Open
4.contents.pdf169.34 kBAdobe PDFView/Open
5.chapter 1.pdf197.6 kBAdobe PDFView/Open
6.chapter 2.pdf363.89 kBAdobe PDFView/Open
7.chapter 3.pdf849.37 kBAdobe PDFView/Open
80_recommendation.pdf125.14 kBAdobe PDFView/Open
8.chapter 4.pdf486.12 kBAdobe PDFView/Open
9.chapter 5.pdf607.87 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: