Comparing VHDL based hardware implementation of blowfish and twofish algorithms for designing secured embedded system

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Embedded Systems are becoming integral part of our day to day life. These systems are more common in several automation applications, healthcare, utility systems and personal gadgets. In this age of wireless communication, embedded devices are used with wireless-networking technology for sharing and saving information. The information is exchanged globally and locally. Sensitive information should be secured before exchanging over internet or other networks. Cryptography is effective means for securing information by encryption on sender side and retrieving it by decryption on receiver end. Block ciphers are considered more secure and can be used in the design of secured embedded systems. These systems are highly constraint for area, memory, performance and hardware. Smaller size, low cost sub-systems are required for handling security in embedded applications. Blowfish and Twofish are block ciphers which are developed during NIST Advanced Encryption Standard competition. This paper compares two proven secured block ciphers focused on hardware implementation using VHDL. Hardware design blocks are modeled using hardware description language (VHDL) to meet required constraints of embedded systems design. Time required for encryption- decryption and throughput of the two algorithms are compared.

Author supplied keywords

Cite

CITATION STYLE

APA

Landge, I. A., & Mishra, B. K. (2017). Comparing VHDL based hardware implementation of blowfish and twofish algorithms for designing secured embedded system. In Communications in Computer and Information Science (Vol. 775, pp. 567–581). Springer Verlag. https://doi.org/10.1007/978-981-10-6427-2_45

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free