scispace - formally typeset
Proceedings ArticleDOI

Design and implementation of real time secured RS232 link for multiple FPGA communication

Reads0
Chats0
TLDR
The design and implementation of a 32-bit RSA algorithms is demonstrated by developing suitable Hardware and Software design on Xilinx Spartan- 3E (XC3S500E-FG320) device and the implementation has been tested successfully for real time serial data communication between multiple FPGA devices using the RS232 serial interface.
Citations
More filters
Journal Article

High Secured AES Encryption and Decryption Algorithm using Xilinx

TL;DR: This project uses Xilinx ISE 14.7i that is associate microcircuit development platform supported the Xilxin ISE 13.3i tool and tends to customize the planning of AES formula to implement merely onXilinx software package to facilitate the developers to change and use the software package simply with none issues throughout installation of style.
Proceedings ArticleDOI

Design and implementation of interfacing two FPGAs

TL;DR: A dice game is proposed as an application to show how two FPGAs can send and receive data to each other in full duplex direction and whoever gets the larger number wins the game.
Book ChapterDOI

Hybrid Cryptosystem’s Design with AES and SHA-1 Algorithms

Kevin Bell
TL;DR: In this article , the security is given to the information by executing both AES and SHA calculations using Verilog and the plan of AES calculation is tweaked to execute just on Xilinx programming.
Journal Article

Implementation of High Speed Secure Communication Between Multiple FPGA Systems Using RTOS

TL;DR: This project is going to implement cryptographic algorithm utilizing threads run by an RTOS on FPGA systems, and the major issue is that two threads running separately on each board can communicate with each other via RS232 communication link.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book ChapterDOI

A Scalable Architecture for Montgomery Multiplication

TL;DR: The general view of the new architecture is described, hardware organization for its parallel computation is analyzed, and design tradeoffs which are useful to identify the best hardware configuration are discussed.
Book ChapterDOI

High-Radix Design of a Scalable Modular Multiplier

TL;DR: This paper describes an algorithm and architecture based on an extension of a scalable radix-2 architecture proposed in a previous work that is proven to be correct and the hardware design is discussed in detail.
Related Papers (5)