Abstract
eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 143 Abstract Small embedded devices (including smart cards, RFID, sensor nodes) are now deployed in many applications. They are usually characterized by strong cost constraints. Yet, as they may manipulate sensitive data, they also require cryptographic protection .As a result, many algorithms have been proposed in order to allow strong security at lower cost than standard solution and lack of comparative studies prevent a good understanding for these cryptographic algorithms. Thus in this thesis we study the cryptographic algorithms like AES and Blowfish and compare different parameters and then do further implementation as the implementation of encryption/decryption algorithm is the most essential part of the secure communication. The algorithms are further considered for VLSI implementation. The evaluation is performed in terms of encryption speed, the CPU utilization with time and the battery power consumption. The experimental results specify the efficiency of the algorithms.
Cite
CITATION STYLE
. C. H. (2014). IMPLEMENTATION OF AES AND BLOWFISH ALGORITHM. International Journal of Research in Engineering and Technology, 03(15), 143–146. https://doi.org/10.15623/ijret.2014.0315026
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.