Authors :
Reena Kulkarni; Dr. Keerti Kulkarni
Volume/Issue :
Volume 10 - 2025, Issue 2 - February
Google Scholar :
https://tinyurl.com/97kz6u2s
Scribd :
https://tinyurl.com/msfwrdhy
DOI :
https://doi.org/10.5281/zenodo.14910222
Abstract :
Cryptography is an important process of modern secure communication, and as the need for faster and more
efficient encryption methods grows, hardware-based solutions have become significant. Field-Programmable Gate Arrays
(FPGAs) offer flexible and efficient platform for implementing cryptographic systems and hence a promising solution for
securing modern digital communications like, in Internet of Things and embedded system applications. This paper
discusses the different cryptographic algorithms and how FPGAs are advantageous over other hardware-based security
implementations.
Keywords :
Symmetric Key, Asymmetric Key, FPGAs, ASIC, Hardware Based Security.
References :
- Tushar, Aniket Sharma, Ankit Mishra, “Cryptographic Algorithm For Enhancing Data Security: A Theoretical Approach”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181 IJERTV10IS030158, Vol. 10 Issue 03, March-2021
- Abdalbasit Mohammed, Nurhayat Varol, “A Review Paper on Cryptography”, 7th International Symposium on Digital Forensics and Security (ISDFS), DOI:10.1109/ISDFS.2019.8757514, IEEE, 2019
- Ridwan B. Marqas, Saman M. Almufti, Rasheed Rebar Ihsan, “Comparing Symmetric and Asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms”, Journal of Xi'an University of Architecture & Technology, Issn No: 1006-7930 Page No: 3110, Volume XII, Issue III, 2020
- Priasnyomo Prima Santoso, Elkin Rilvani, Ahmad Budi Trisnawan, Krisna Adiyarta, Darmawan Napitupulu, Tata Sutabri, Robbi Rahim, “Systematic literature review: comparison study of symmetric key and asymmetric key algorithm”, 2nd Nommensen International Conference on Technology and Engineering, IOP Conf. Series: Materials Science and Engineering 420 (2018) 012111 doi:10.1088/1757-899X/420/1/012111
- Gerard Murphy, Aidan Keeshan, Rachit Agarwal, Emanuel Popovici, “Hardware – Software Implementation of Public-Key Cryptography for Wireless Sensor Networks”, IEE Irish Signals and Systems Conference, Dublin, June 28-30, 2006
- Hong-Jin Ryu, Samuel Sangkon Lee, “Design and Implementation of a Document Encryption Convergence Program Selecting Encryption Methods, and Integrating the Program into the Existing Office System”, DOI: 10.5220/0012124000003541, Proceedings of the 12th International Conference on Data Science, Technology and Applications (DATA 2023), pages 452-459, ISBN: 978-989-758-664-4; ISSN: 2184-285X
- Karim Shahbazi, Mohammad Eshghi, Reza Faghih Mirzaee, “Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5, Engineering Science and Technology, an International Journal 20 (2017) 1308–1317, https://doi.org/10.1016/j.jestch.2017.07.002
- Prof. S. Venkateswarlu, Deepa G.M, G. Sriteja, “Implementation of Cryptographic Algorithm on FPGA”, ISSN 2320–088X, IJCSMC, Vol. 2, Issue. 4, April 2013, pg.604 – 609
Cryptography is an important process of modern secure communication, and as the need for faster and more
efficient encryption methods grows, hardware-based solutions have become significant. Field-Programmable Gate Arrays
(FPGAs) offer flexible and efficient platform for implementing cryptographic systems and hence a promising solution for
securing modern digital communications like, in Internet of Things and embedded system applications. This paper
discusses the different cryptographic algorithms and how FPGAs are advantageous over other hardware-based security
implementations.
Keywords :
Symmetric Key, Asymmetric Key, FPGAs, ASIC, Hardware Based Security.