Type of Material: | Thesis |
Title: | VLSI Implementation of High Throughput and Low Power Blowfish Crypto Algorithm |
Researcher: | MANOJ KUMAR, D |
Guide: | SUNDARARAJAN, M |
Department: | Department of Electronics and Communication Engineering |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2019 |
Language: | English |
Subject: | Engineering | Engineering and Technology | Engineering Electrical and Electronic | Electrical Engineering | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2019 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454866 | |
003 | IN-AhILN | |
005 | 2024-09-19 14:49:08 | |
008 | __ | 240919t2019||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454866 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aMANOJ KUMAR, D|eResearcher |
110 | __ | |aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446 |
245 | __ | |aVLSI Implementation of High Throughput and Low Power Blowfish Crypto Algorithm |
260 | __ | |aChennai|bBharath University, Chennai|c2019 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2019 |
520 | __ | |aInformation security is an imperative issue in the present PC systems. Cryptography has various applications in this day and age, the most common one being exchanging messages securely over the system. The set of rules particularly characterize the scientific advances required to change information in to a cryptographic figure and furthermore to change the figure back to the first frame. Blowfish is a similar block cipher that can be viably utilized for coding and protecting of information. It takes a variable key length from 32 to 448 bits, making it perfect for anchoring information. Blowfish was composed in 1993 by Bruce Schneider as a quick, free option in contrast to existing enciphering calculations. It is a Feistel Network, repeating a straightforward enciphering work 16 times in the network. The algorithms uniquely determine the accurate proceeding need to transverse data in to a cryptographic cryptogram and also to transverse the cryptogram back to the primary configuration. Blowfish is a symmetric |
650 | __ | |aElectrical Engineering|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aEngineering |
653 | __ | |aEngineering and Technology |
653 | __ | |aEngineering Electrical and Electronic |
700 | __ | |aSUNDARARAJAN, M|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/a10603/321506|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.