Performance Evaluation of Light Weight Cryptographic CLEFIA Algorithm

نویسندگان

چکیده

We have become more cognizant of communication since the 19th century. However, we known how important is for daily life last three or four decades. It merely a method transmitting data from one end to other. A transmitter and receiver are two ends. Both these components must be present succeed. As application this process continues grow, new techniques tactics been developed. The human being then learned that crucial, but so keeping safe. Claimed trustworthy cipher CLEFIA. CLEFIA specs algorithm design can assessed performance security by cryptographers general public. For ISO/IEC lightweight cryptography, popular choice. generalised Feistel network with nodes. This architecture requires little room, both physically virtually. Diffusion Switching Mechanism in shields system serious assaults. Additionally, primary scheduling processing perform comparable tasks, which decreases gate size. In study, execution times Low Weight Cryptographic old modified algorithms discussed. calls using product Texas Instruments (TI), MSP-EXP430FR5994 LaunchPad Development Kit MSP430 family. supports 128- bit blocks offers 192-bit 256-bit key sizes.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Light Weight Cryptographic Hash Algorithm for Wireless Sensor Network

Authentication of a message is a great research challenge in today’s advanced wire and wireless communication. Cryptographic hash functions are used to protect the authenticity of information. Some of the most popular and commonly used cryptographic hash algorithms are MD5 and SHA1. These hash algorithms are used in a wide variety of security applications e.g. securing node/message in tradition...

متن کامل

Performance Evaluation of the Present Cryptographic Algorithm over FPGA

Modern cryptography seeks to guarantee the information confidentiality and prevent unauthorized people from having access to it. These principles may be applied in portable devices that require the protection of the information that has been stored and processed. These types of applications require certain design commitments that are achieved using high-performance hardware and the implementati...

متن کامل

LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network

Cryptographic hash functions are used to protect the authenticity of information. Some of the most popular and commonly used cryptographic hash algorithms are MD5, SHA1, RIPEMD. These hash algorithms are used in a wide variety of security applications e.g. securing node/message in traditional networks. However, the commonly used hash algorithms require huge computational overhead which is not a...

متن کامل

Improving the Performance of the IDEA Cryptographic Algorithm Using FPGAs

Nowadays, the cryptography field is on the increase in the telecommunications world, because of this there is a constant need of more secure and efficient cryptographic algorithms. Thus, a lot of research is being done in order to try to improve the current algorithm performance. At present, one of the alternatives under research is the implementation of these algorithms in FPGAs (Field-Program...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRG international journal of electronics and communication engineering

سال: 2023

ISSN: ['2349-9184', '2348-8549']

DOI: https://doi.org/10.14445/23488549/ijece-v10i8p105