Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design
The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and i...
Gespeichert in:
Veröffentlicht in: | Microprocessors and microsystems 2019-11, Vol.71, p.102876, Article 102876 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 102876 |
container_title | Microprocessors and microsystems |
container_volume | 71 |
creator | Sai, R. Vijay Upadhyay, Har Narayan Prabhu, M. Saravanan, S. |
description | The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s. |
doi_str_mv | 10.1016/j.micpro.2019.102876 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2325743946</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0141933119302911</els_id><sourcerecordid>2325743946</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</originalsourceid><addsrcrecordid>eNp9kMlOwzAQhnMAibK8AQdLXOCQ4iVLfUGqIjapEofSs-XYk8RREwc7bZW3x1U4c5nRzPyzfVF0T_CSYJI9t8vOqMHZJcWEhxRd5dlFtMAkITFnjFxF1963GOMUZ3QRdbtew9HI0fQ1Wms5jOYIaNvAfgQHGhVuGkZbOzk0E3rcrbfFE-pgbKxGpfRBsLcnNNgTOCR7jRpTN8iDOjhASqoGgrizbkIavKn72-iyknsPd3_-Jtq9vX4XH_Hm6_2zWG9ixVgyxrKUjHPCFM3TVTBlGe7NgFMIgaI8kVWaYF4qSkOJ84RVFFKtiSZVmmeE3UQP89wA4ucAfhStPbg-rBSU0TRPGE-yoEpmlXLWeweVGJzppJsEweIMU7RihinOMMUMM7S9zG0QPjgacMIrA70CbRyoUWhr_h_wC5AbgY0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2325743946</pqid></control><display><type>article</type><title>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Sai, R. Vijay ; Upadhyay, Har Narayan ; Prabhu, M. ; Saravanan, S.</creator><creatorcontrib>Sai, R. Vijay ; Upadhyay, Har Narayan ; Prabhu, M. ; Saravanan, S.</creatorcontrib><description>The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s.</description><identifier>ISSN: 0141-9331</identifier><identifier>DOI: 10.1016/j.micpro.2019.102876</identifier><language>eng</language><publisher>Kidlington: Elsevier B.V</publisher><subject>Adaptive algorithms ; Cache memory ; Configurations ; Cryptography ; Decryption ; Encryption ; Field Programmable Gate Array ; Field programmable gate arrays ; Power consumption ; Supervisors ; Undeviating Adaptive Sheltered Cryptography</subject><ispartof>Microprocessors and microsystems, 2019-11, Vol.71, p.102876, Article 102876</ispartof><rights>2019 Elsevier B.V.</rights><rights>Copyright Elsevier BV Nov 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</citedby><cites>FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0141933119302911$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids></links><search><creatorcontrib>Sai, R. Vijay</creatorcontrib><creatorcontrib>Upadhyay, Har Narayan</creatorcontrib><creatorcontrib>Prabhu, M.</creatorcontrib><creatorcontrib>Saravanan, S.</creatorcontrib><title>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</title><title>Microprocessors and microsystems</title><description>The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s.</description><subject>Adaptive algorithms</subject><subject>Cache memory</subject><subject>Configurations</subject><subject>Cryptography</subject><subject>Decryption</subject><subject>Encryption</subject><subject>Field Programmable Gate Array</subject><subject>Field programmable gate arrays</subject><subject>Power consumption</subject><subject>Supervisors</subject><subject>Undeviating Adaptive Sheltered Cryptography</subject><issn>0141-9331</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp9kMlOwzAQhnMAibK8AQdLXOCQ4iVLfUGqIjapEofSs-XYk8RREwc7bZW3x1U4c5nRzPyzfVF0T_CSYJI9t8vOqMHZJcWEhxRd5dlFtMAkITFnjFxF1963GOMUZ3QRdbtew9HI0fQ1Wms5jOYIaNvAfgQHGhVuGkZbOzk0E3rcrbfFE-pgbKxGpfRBsLcnNNgTOCR7jRpTN8iDOjhASqoGgrizbkIavKn72-iyknsPd3_-Jtq9vX4XH_Hm6_2zWG9ixVgyxrKUjHPCFM3TVTBlGe7NgFMIgaI8kVWaYF4qSkOJ84RVFFKtiSZVmmeE3UQP89wA4ucAfhStPbg-rBSU0TRPGE-yoEpmlXLWeweVGJzppJsEweIMU7RihinOMMUMM7S9zG0QPjgacMIrA70CbRyoUWhr_h_wC5AbgY0</recordid><startdate>201911</startdate><enddate>201911</enddate><creator>Sai, R. Vijay</creator><creator>Upadhyay, Har Narayan</creator><creator>Prabhu, M.</creator><creator>Saravanan, S.</creator><general>Elsevier B.V</general><general>Elsevier BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201911</creationdate><title>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</title><author>Sai, R. Vijay ; Upadhyay, Har Narayan ; Prabhu, M. ; Saravanan, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Adaptive algorithms</topic><topic>Cache memory</topic><topic>Configurations</topic><topic>Cryptography</topic><topic>Decryption</topic><topic>Encryption</topic><topic>Field Programmable Gate Array</topic><topic>Field programmable gate arrays</topic><topic>Power consumption</topic><topic>Supervisors</topic><topic>Undeviating Adaptive Sheltered Cryptography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sai, R. Vijay</creatorcontrib><creatorcontrib>Upadhyay, Har Narayan</creatorcontrib><creatorcontrib>Prabhu, M.</creatorcontrib><creatorcontrib>Saravanan, S.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Microprocessors and microsystems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sai, R. Vijay</au><au>Upadhyay, Har Narayan</au><au>Prabhu, M.</au><au>Saravanan, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</atitle><jtitle>Microprocessors and microsystems</jtitle><date>2019-11</date><risdate>2019</risdate><volume>71</volume><spage>102876</spage><pages>102876-</pages><artnum>102876</artnum><issn>0141-9331</issn><abstract>The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s.</abstract><cop>Kidlington</cop><pub>Elsevier B.V</pub><doi>10.1016/j.micpro.2019.102876</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0141-9331 |
ispartof | Microprocessors and microsystems, 2019-11, Vol.71, p.102876, Article 102876 |
issn | 0141-9331 |
language | eng |
recordid | cdi_proquest_journals_2325743946 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Adaptive algorithms Cache memory Configurations Cryptography Decryption Encryption Field Programmable Gate Array Field programmable gate arrays Power consumption Supervisors Undeviating Adaptive Sheltered Cryptography |
title | Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T21%3A10%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Undeviating%20Adaptive%20Sheltered%20Cryptography%20(UASC)%20method%20based%20low%20power%20and%20high%20secure%20cache%20memory%20design&rft.jtitle=Microprocessors%20and%20microsystems&rft.au=Sai,%20R.%20Vijay&rft.date=2019-11&rft.volume=71&rft.spage=102876&rft.pages=102876-&rft.artnum=102876&rft.issn=0141-9331&rft_id=info:doi/10.1016/j.micpro.2019.102876&rft_dat=%3Cproquest_cross%3E2325743946%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2325743946&rft_id=info:pmid/&rft_els_id=S0141933119302911&rfr_iscdi=true |