Title : VLSI Implementation of High Throughput and Low Power Blowfish Crypto Algorithm

Type of Material: Thesis
Title: VLSI Implementation of High Throughput and Low Power Blowfish Crypto Algorithm
Researcher: MANOJ KUMAR, D
Guide: SUNDARARAJAN, M
Department: Department of Electronics and Communication Engineering
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2019
Language: English
Subject: Engineering
Engineering and Technology
Engineering Electrical and Electronic
Electrical Engineering
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2019
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454866
003IN-AhILN
0052024-09-19 14:49:08
008__240919t2019||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454866
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aMANOJ KUMAR, D|eResearcher
110__|aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aVLSI Implementation of High Throughput and Low Power Blowfish Crypto Algorithm
260__|aChennai|bBharath University, Chennai|c2019
300__|dDVD
502__|bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2019
520__|aInformation security is an imperative issue in the present PC systems. Cryptography has various applications in this day and age, the most common one being exchanging messages securely over the system. The set of rules particularly characterize the scientific advances required to change information in to a cryptographic figure and furthermore to change the figure back to the first frame. Blowfish is a similar block cipher that can be viably utilized for coding and protecting of information. It takes a variable key length from 32 to 448 bits, making it perfect for anchoring information. Blowfish was composed in 1993 by Bruce Schneider as a quick, free option in contrast to existing enciphering calculations. It is a Feistel Network, repeating a straightforward enciphering work 16 times in the network. The algorithms uniquely determine the accurate proceeding need to transverse data in to a cryptographic cryptogram and also to transverse the cryptogram back to the primary configuration. Blowfish is a symmetric
650__|aElectrical Engineering|2UGC
650__|aEngineering and Technology|2AIU
653__|aEngineering
653__|aEngineering and Technology
653__|aEngineering Electrical and Electronic
700__|aSUNDARARAJAN, M|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/a10603/321506|yShodhganga
905__|afromsg

User Feedback Comes Under This section.