scispace - formally typeset
Search or ask a question
Author

Akshitha Vuppala

Bio: Akshitha Vuppala is an academic researcher from Vardhaman College of Engineering. The author has contributed to research in topics: Smart card & Key schedule. The author has an hindex of 1, co-authored 2 publications receiving 9 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: FORTIS algorithm has been proposed for generation of sub-keys and the strength of the algorithm against side-channel power attacks is investigated using ChipWhisperer®-Lite and Artix FPGA as target board.

21 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the authors proposed an optimized Partial Product Generation and Multi-Operand Addition using primitive Quantum gates to reduce the count of Ancilla and Garbage Outputs.
Abstract: Reversible Logic is an emerging field of research which finds its applications in low power computing, Nanotechnology and Quantum Computing. Reversible circuits should have one to one mapping i.e. one input can have only one output so that input vectors can be realized using output vectors. Reversible Circuits require Ancilla(constant inputs) and Garbage Outputs to retain reversibility. An efficient Reversible Circuit can be designed by optimizing their performance parameters. In this paper a \(4 \times 4\) Melior Quantum Multiplier has been proposed which consists of an optimized Partial Product Generation and Multi-Operand Addition using primitive Quantum gates to reduce the count of Ancilla and Garbage Outputs. This proposed multiplier shows an improvement of 21.73% and 18.18% reduction of Ancilla and Garbage Outputs respectively. This multiplier has been implemented in Cadence Virtuoso with average power dissipation of 106.79 nW at 45 nm technology node and used in the implementation of a Linear Phase FIR filter with an average power dissipation of 456.1 nW.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The experimental results showed that the proposed TDES method is effective in providing security and privacy to big healthcare data in the Cloud environment and showed less encryption and decryption time compared to the existing Intelligent Framework for Healthcare Data Security (IFHDS) method.
Abstract: In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of big data has become an emerging issue that restricts the organization to utilize Cloud services. The existing privacy preserving approaches showed several drawbacks such as a lack of data privacy and accurate data analysis, a lack of efficiency of performance, and completely rely on third party. In order to overcome such an issue, the Triple Data Encryption Standard (TDES) methodology is proposed to provide security for big data in the Cloud environment. The proposed TDES methodology provides a relatively simpler technique by increasing the sizes of keys in Data Encryption Standard (DES) to protect against attacks and defend the privacy of data. The experimental results showed that the proposed TDES method is effective in providing security and privacy to big healthcare data in the Cloud environment. The proposed TDES methodology showed less encryption and decryption time compared to the existing Intelligent Framework for Healthcare Data Security (IFHDS) method.

19 citations

Proceedings ArticleDOI
01 Jan 2021
TL;DR: In this paper, the security issues in the information transmission and the method of hybrid encryption algorithms that will be widely used in the future are reviewed and analyzed to showcase the reinforcement by combining algorithms.
Abstract: In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved. Generally, cryptography encryption is divided into symmetric encryption and asymmetric encryption. Although symmetric encryption has a very fast computation speed and is beneficial to encrypt a large amount of data, the security is not as high as asymmetric encryption. The same pair of keys used in symmetric algorithms leads to security threats. Thus, if the key can be protected, the security could be improved. Using an asymmetric algorithm to protect the key and encrypting the message with a symmetric algorithm would be a good choice. This paper will review security issues in the information transmission and the method of hybrid encryption algorithms that will be widely used in the future. Also, the various characteristics of algorithms in different systems and some typical cases of hybrid encryption will be reviewed and analyzed to showcase the reinforcement by combining algorithms. Hybrid encryption algorithms will improve the security of the transmission without causing more other problems. Additionally, the way how the encryption algorithms combine to strength the security will be discussed with the aid of an example.

18 citations

Journal ArticleDOI
TL;DR: A new fitness function has given and then a Genetic Algorithm-based symmetric key generation is proposed, which can provide higher randomness and very low probability to occur the weak keys so that the data security in IoT environment will be increased significantly.
Abstract: Encryption technology has a great influence on data security There are many encryptions have been proposed In general, the encryptions with higher complexity will provide higher security, but it will also consume a lot of computing resources In some cases, these high complexity method may not suitable such as Internet of Thing devices This is because Internet of Thing device has lower computing power due to the size and the limited battery Therefore, most of Internet of Thing (IoT) devices are used symmetric encryption as the main method However, this kind of symmetric encryption algorithms are easy to occur weak keys such as data encryption algorithm (DES) This will expose IoT devices to high risk environments In this study, a new fitness function has given and then a Genetic Algorithm-based symmetric key generation is proposed As the simulation results, our proposed method can provide higher randomness and very low probability to occur the weak keys so that the data security in IoT environment will be increased significantly

4 citations