Blowfish cryptography implementation by using Microcontroller

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller

The software implementation of cryptographic schemes for wireless sensor networks poses a challenge due to the limited capabilites of the platform. Nevertheless, its feasibility has been shown in recent papers. In this work we describe a software implementation of pairingbased cryptography and elliptic curve cryptography for the MSP430 microcontroller, which is used in some wireless sensors inc...

متن کامل

Microcontroller Application in Cryptography Techniques

The main task of paper studied new ciphering and deciphering techniques reported previously. Computer programs are designed in C language to perform theses algorithms and to assess their performance. Out of these algorithms, it is found that the BLOWFISH is the more sophisticated one. Therefore, a development for this algorithm is introduced to enhance its operation. This has been carried out b...

متن کامل

Implementation of dual axis solar tracker model by using microcontroller

As we are in increasing demand of power these days, power sector has been playing a vital role in our day today life. Heading towards the damp increasing power, solar energy comes to the picture or in our mind why because it is one of the most important renewable energy sources on the earth which must be collected and should be utilized to its maximum efficiency. Considering the utilization of ...

متن کامل

Cryptography in Ultra-Low Power Microcontroller MSP430

This article describes an implementation for the method from Texas Instruments for a random number generator in the ultra-low power microcontroller MSP430x5xx Families and the analysis of this generator in the concrete microcontroller MSP430f5438A. The generator may be used to generate numbers for cryptography security methods (for example in the cryptosystem Diffie-Hellman). A short theoretica...

متن کامل

Comparision and Implementation of Cryptography Algorithm By Using VHDL

This paper presents the comparison and optimization of Galois field algorithm and IDEA(International data encrypted algorithm) using VHDL(xc2v40-6cs144)with the help of Xilinx-Ise (9.2) .In terms of security IDEA algorithm is very much superior where as in terms of timings Galois field is much better and is already patented of Ascom. These are cryptographic algorithm used for security purpose. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 2010

ISSN: 2636-4441

DOI: 10.21608/iceeng.2010.33260