Abstract

The growth of computing resources and parallel computing has led to significant needs for efficient cryptosystems over the last decade. Elliptic Curve Cryptography (ECC) provides faster computation over other asymmetric cryptosystems such as RSA and greater security. For many cryptography operations, ECC can be used: hidden key exchange, message encryption, and digital signature. There is thus a trade-off between safety and efficiency with regard to speed, area and power requirements. This paper provides a good ECC approach to encryption by replacing the Vedic multiplier (16 bit) with the Wallace tree multiplier with an improved output (128 bit). The proposed design processes data recurringly with less volume, less power consumption and greater velocity, in addition to improving efficiency. Using Xilinx 2015.2 software, the entire proposed design is synthesized and simulated and implemented on the ZYNQ FPGA Board. Compared with previous implementations, a significant improvement in field efficiency, time complexity and energy demand is demonstrated by the proposed design.

Highlights

  • Data protection refers to the defense against unauthorized data access and corruption over the life cycle of the data operation

  • The simulation window is launched as shifting from implementation to the simulation on the home screen of the tool, and the simulation window confines the output in the form of wave forms output. It has the flexibility of providing the different radix number systems. In this project we used Verilog code written for 256 Message bit Encryption of Elliptic Curve Cryptography (ECC) algorithm .Simulation is done by using Xilinx ISE simulator

  • In this project Verilog code is written for Decryption of ECC algorithm .Simulation is done by using Xilinx ISE simulator

Read more

Summary

Introduction

Data protection refers to the defense against unauthorized data access and corruption over the life cycle of the data operation. ECC is the highest norm of asymmetric encryption (Elliptic Curve Cryptography). The Elliptic Curve Cryptography covers all relevant primitives of asymmetric cryptography such as digital signatures and key algorithms of agreement. Implementation of Data Security with Wallace Tree Approach Using Elliptical Curve Cryptography on FPGA

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call