vioft2nntf2t|tblJournal|Abstract_paper|0xf4fffc542c000000f5ca0c0001000300 The key problem that the world is most concerned about is security. Data security is the process of preventing unauthorized access to sensitive data. It includes all of the cybersecurity measures you take to keep your data safe from unauthorized access, such as encryption and access restrictions (both physical and digital). Data security has always been of the utmost importance. We utilize cryptographic methods to improve the services of data security. The application of cryptographic algorithms achieves data encryption. Therefore, we developed two versions of ECC algorithms on FPGA for improved hardware security in this study. The FPGA device employed here is Kintex-7, and there are two types of ECC: standard ECC and Vedic multiplier-based ECC. Vedic multiplier-based ECC has discovered that it consumes less space than standard ECC. Not only does Vedic multiplier-based ECC save space, but it also saves electricity. As a result, it is determined that for improved hardware security with ECC enabled, Vedic Multiplier-based ECC should be used over standard ECC.
Saurabh Singh, Sunita Soni Bhilai Institute of Technology, India
ECC, Vedic Multiplier based ECC, Area, Power, and FPGA
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Microelectronics ( Volume: 8 , Issue: 1 , Pages: 1283-1287 )
Date of Publication :
April 2022
Page Views :
692
Full Text Views :
6
|