ProgramsView all programs
From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Conference Paper
Publisher : 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT),
Source : 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), IEEE, Chennai, India (2016)
Keywords : Algorithm design and analysis, cryptographic algorithm, cryptographic application, Decryption, Encryption, field programmable gate array, Field programmable gate arrays, FPGA, FPGAs, Hardware, image, Image processing, MATLAB, private key, private key cryptography, private key encryption, Receivers, reprogrammable device, Text, text-to-image encryption algorithm, VLSI implementation, Xilinx SPARTEN 3E FPGA
Campus : Amritapuri
School : School of Engineering
Department : Electronics and Communication
Year : 2016
Abstract : In cryptographic applications, the data sent to a remote host are encrypted at the source machine using an encryption key and then the encrypted data are sent to the destination machine, where it is decrypted to get the original data. Thus the attacker will not have the encryption key which is required to get the original data and so a hacker can do nothing with any cryptographic system. Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs) are used for hardware implementations of cryptographic algorithms. As FPGA devices progressed both in terms of resources and performance, the latest FPGAs provide solutions that are easily customizable for system connectivity, DSP, and data processing applications. In this paper, implementation of an efficient cryptographic algorithm is done in Xilinx SPARTEN 3E FPGA. Also the algorithm is analyzed by calculating the number of all possible key permutations.
Cite this Research Publication : A. Suresh and Remya Ajai A. S., “VLSI implementation of text to image encryption algorithm based on private key encryption”, in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 2016.