Paper Title:
Implementation of DES Encryption Algorithm Based on FPGA and Performance Analysis
  Abstract

This paper introduced the principle of DES encryption algorithm, designed and realized the DES encryption algorithm with verilog hardware description language, realized module simulation with Quartus II. Two comprehensive considerations from the resources and performance, one pipeline stage control is set in round function to improve the processing speed, Synchronous pipeline architecture of data XOR key round function and Key transformation function is realized on hardware to reducing logic complexity of the adjacent pipeline, round function multiplexing is realized by setting the round counter and controlling the data selector.

  Info
Periodical
Edited by
Han Zhao
Pages
2953-2956
DOI
10.4028/www.scientific.net/AMM.130-134.2953
Citation
J. H. Lian, K. Chen, "Implementation of DES Encryption Algorithm Based on FPGA and Performance Analysis", Applied Mechanics and Materials, Vols. 130-134, pp. 2953-2956, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Rui Ping Chen, Zhong Xun Wang, Xin Qiao Yu
Abstract:Decoding algorithms with strong practical value not only have good decoding performance, but also have the computation complexity as low as...
458
Authors: Jia Liu, Yu Li Shen
Chapter 6: Communication and Network
Abstract:In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency...
1113
Authors: Hai Yan Wang
Chapter 6: Production Management
Abstract:This paper presents a hybrid algorithm to address the flexible job-shop scheduling problem (FJSP). Based on Differential Evolution (DE), a...
502
Authors: Arum Sulgi Cho, Xiao Wei Li, Sung Jin Cho, Seok Tae Kim
Chapter 5: Advanced Development for Information Technologies and Engineering, Networks and Software Applications, Data Acquisition and Processing, Intelligent Systems
Abstract:In this paper, we propose a video image encryption approach by using maximum length cellular automata (MLCA) methods. First, the plane images...
992
Authors: Hong Liang Li, Li Fu Li, Yu Wang
Chapter 6: Computer Science, Networks, Communication, Software, Information Security and Technologies
Abstract:PoC is an instant communication service based on cellular network, which can transmit information of voice by VoIP. In order to increase the...
935