Academic Journals Database
Disseminating quality controlled scientific knowledge

Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions

Author(s): Deepthi Barbara Nickolas#1, Mr. A. Sivasankar

Journal: International Journal of Engineering Trends and Technology
ISSN 2231-5381

Volume: 4;
Issue: 6;
Start page: 2438;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Hashing | SHA-3 Algorithm | Sponge function | Encryption | Permutation

Security makes the people to stay in the sense of vital modern technological improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the level of hardware which decides the cost in trade basis. The work in this paper concentrates on KECCAK SHA-3 algorithm and the sponge construction encryption process with iterative permutation. Thus it leads to reduced amount of encryption time and more importantly provides the ultimate security level among the previous techniques followed so far. The algorithm uses the hashing function which is used for secured message authentication of data, digital signatures and password protection. The main advantage of this algorithm is it exhibits high level of parallelism. The hardware implementation process on FPGA is very fast and effective

Tango Jona
Tangokurs Rapperswil-Jona

     Save time & money - Smart Internet Solutions