Design & Implementation of Fast Modulo Multiplier Based Network Intrusion Detection System (NIDS) using HDL
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
This paper covers the implementation of the implementation of Network Intrusion Detection System (NIDS) using International Data Encryption Algorithm (IDEA). The current era has seen an explosive growth in communications. Applications like online banking, personal digital assistants, mobile communication, smartcards, etc. have emphasized the need for security in resource constrained environments. International Data Encryption Algorithm (IDEA) cryptography serves as a perfect network intrusion detection system (NIDS) tool because of its 128 bits key sizes and high security comparable to that of other algorithms. However, to match the ever increasing requirement for speed in today’s applications, hardware acceleration of the cryptographic algorithms is a necessity. This study presents an efficient hardware structure for the modulo (2n + 1) Multiplier, which is the most time and space consuming operation in IDEA. The proposed modulo multiplier saves more time, area and cost. The block size considered here is same as of traditional IDEA encryption algorithm which is of 64 bits with 16 bit sub-blocks.
Authors and Affiliations
Sachin Singh , Sunil Kumar Shah
Fruits Sorting and Grading using Fuzzy Logic
Now a days, the classification and grading is performed based on observations and through experience. The system utilizes image-processing techniques to classify and grade fruits. The developed system starts the...
LICENSE PLATE CHARACTER RECOGNITION USING BACK PROPAGATION ALGORITHM
License Plate Recognition (LPR) technology is one of the most important parts in Intelligent Transport System (ITS), including License Plate Location, Characters Segmentation and Characters Recognition. The neural networ...
Traffic Management on Road using Density Aware Routing
These Traditionally traffic safety was addressed by traffic awareness and passive safety measures like solid chassis, seat belts, air bags etc. With the recent breakthroughs in the domain of mobile ad hoc networks, th...
5G Mobile Technology
5G Technology stands for fifth Generation Mobile technology. From generation 1G to 2.5G and from 3G to 5G this world of telecommunication has seen a number of improvements along with improved performance with every...
MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED
In this paper we are doing comparison of different routing protocols in MANET and these routing protocols are AODV, DSDV, and DSR [1]. The parameters on which the comparison is to be performed are speed, no. of pac...