Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design

The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Microprocessors and microsystems 2019-11, Vol.71, p.102876, Article 102876
Hauptverfasser: Sai, R. Vijay, Upadhyay, Har Narayan, Prabhu, M., Saravanan, S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 102876
container_title Microprocessors and microsystems
container_volume 71
creator Sai, R. Vijay
Upadhyay, Har Narayan
Prabhu, M.
Saravanan, S.
description The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s.
doi_str_mv 10.1016/j.micpro.2019.102876
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2325743946</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0141933119302911</els_id><sourcerecordid>2325743946</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</originalsourceid><addsrcrecordid>eNp9kMlOwzAQhnMAibK8AQdLXOCQ4iVLfUGqIjapEofSs-XYk8RREwc7bZW3x1U4c5nRzPyzfVF0T_CSYJI9t8vOqMHZJcWEhxRd5dlFtMAkITFnjFxF1963GOMUZ3QRdbtew9HI0fQ1Wms5jOYIaNvAfgQHGhVuGkZbOzk0E3rcrbfFE-pgbKxGpfRBsLcnNNgTOCR7jRpTN8iDOjhASqoGgrizbkIavKn72-iyknsPd3_-Jtq9vX4XH_Hm6_2zWG9ixVgyxrKUjHPCFM3TVTBlGe7NgFMIgaI8kVWaYF4qSkOJ84RVFFKtiSZVmmeE3UQP89wA4ucAfhStPbg-rBSU0TRPGE-yoEpmlXLWeweVGJzppJsEweIMU7RihinOMMUMM7S9zG0QPjgacMIrA70CbRyoUWhr_h_wC5AbgY0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2325743946</pqid></control><display><type>article</type><title>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Sai, R. Vijay ; Upadhyay, Har Narayan ; Prabhu, M. ; Saravanan, S.</creator><creatorcontrib>Sai, R. Vijay ; Upadhyay, Har Narayan ; Prabhu, M. ; Saravanan, S.</creatorcontrib><description>The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s.</description><identifier>ISSN: 0141-9331</identifier><identifier>DOI: 10.1016/j.micpro.2019.102876</identifier><language>eng</language><publisher>Kidlington: Elsevier B.V</publisher><subject>Adaptive algorithms ; Cache memory ; Configurations ; Cryptography ; Decryption ; Encryption ; Field Programmable Gate Array ; Field programmable gate arrays ; Power consumption ; Supervisors ; Undeviating Adaptive Sheltered Cryptography</subject><ispartof>Microprocessors and microsystems, 2019-11, Vol.71, p.102876, Article 102876</ispartof><rights>2019 Elsevier B.V.</rights><rights>Copyright Elsevier BV Nov 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</citedby><cites>FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0141933119302911$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids></links><search><creatorcontrib>Sai, R. Vijay</creatorcontrib><creatorcontrib>Upadhyay, Har Narayan</creatorcontrib><creatorcontrib>Prabhu, M.</creatorcontrib><creatorcontrib>Saravanan, S.</creatorcontrib><title>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</title><title>Microprocessors and microsystems</title><description>The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s.</description><subject>Adaptive algorithms</subject><subject>Cache memory</subject><subject>Configurations</subject><subject>Cryptography</subject><subject>Decryption</subject><subject>Encryption</subject><subject>Field Programmable Gate Array</subject><subject>Field programmable gate arrays</subject><subject>Power consumption</subject><subject>Supervisors</subject><subject>Undeviating Adaptive Sheltered Cryptography</subject><issn>0141-9331</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp9kMlOwzAQhnMAibK8AQdLXOCQ4iVLfUGqIjapEofSs-XYk8RREwc7bZW3x1U4c5nRzPyzfVF0T_CSYJI9t8vOqMHZJcWEhxRd5dlFtMAkITFnjFxF1963GOMUZ3QRdbtew9HI0fQ1Wms5jOYIaNvAfgQHGhVuGkZbOzk0E3rcrbfFE-pgbKxGpfRBsLcnNNgTOCR7jRpTN8iDOjhASqoGgrizbkIavKn72-iyknsPd3_-Jtq9vX4XH_Hm6_2zWG9ixVgyxrKUjHPCFM3TVTBlGe7NgFMIgaI8kVWaYF4qSkOJ84RVFFKtiSZVmmeE3UQP89wA4ucAfhStPbg-rBSU0TRPGE-yoEpmlXLWeweVGJzppJsEweIMU7RihinOMMUMM7S9zG0QPjgacMIrA70CbRyoUWhr_h_wC5AbgY0</recordid><startdate>201911</startdate><enddate>201911</enddate><creator>Sai, R. Vijay</creator><creator>Upadhyay, Har Narayan</creator><creator>Prabhu, M.</creator><creator>Saravanan, S.</creator><general>Elsevier B.V</general><general>Elsevier BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201911</creationdate><title>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</title><author>Sai, R. Vijay ; Upadhyay, Har Narayan ; Prabhu, M. ; Saravanan, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-aba39913c2758c27bb0006e92ec27c294af5409bc22bb09943f2e5dd1d1f57613</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Adaptive algorithms</topic><topic>Cache memory</topic><topic>Configurations</topic><topic>Cryptography</topic><topic>Decryption</topic><topic>Encryption</topic><topic>Field Programmable Gate Array</topic><topic>Field programmable gate arrays</topic><topic>Power consumption</topic><topic>Supervisors</topic><topic>Undeviating Adaptive Sheltered Cryptography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sai, R. Vijay</creatorcontrib><creatorcontrib>Upadhyay, Har Narayan</creatorcontrib><creatorcontrib>Prabhu, M.</creatorcontrib><creatorcontrib>Saravanan, S.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Microprocessors and microsystems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sai, R. Vijay</au><au>Upadhyay, Har Narayan</au><au>Prabhu, M.</au><au>Saravanan, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design</atitle><jtitle>Microprocessors and microsystems</jtitle><date>2019-11</date><risdate>2019</risdate><volume>71</volume><spage>102876</spage><pages>102876-</pages><artnum>102876</artnum><issn>0141-9331</issn><abstract>The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. Therefore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s.</abstract><cop>Kidlington</cop><pub>Elsevier B.V</pub><doi>10.1016/j.micpro.2019.102876</doi></addata></record>
fulltext fulltext
identifier ISSN: 0141-9331
ispartof Microprocessors and microsystems, 2019-11, Vol.71, p.102876, Article 102876
issn 0141-9331
language eng
recordid cdi_proquest_journals_2325743946
source Elsevier ScienceDirect Journals Complete
subjects Adaptive algorithms
Cache memory
Configurations
Cryptography
Decryption
Encryption
Field Programmable Gate Array
Field programmable gate arrays
Power consumption
Supervisors
Undeviating Adaptive Sheltered Cryptography
title Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T21%3A10%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Undeviating%20Adaptive%20Sheltered%20Cryptography%20(UASC)%20method%20based%20low%20power%20and%20high%20secure%20cache%20memory%20design&rft.jtitle=Microprocessors%20and%20microsystems&rft.au=Sai,%20R.%20Vijay&rft.date=2019-11&rft.volume=71&rft.spage=102876&rft.pages=102876-&rft.artnum=102876&rft.issn=0141-9331&rft_id=info:doi/10.1016/j.micpro.2019.102876&rft_dat=%3Cproquest_cross%3E2325743946%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2325743946&rft_id=info:pmid/&rft_els_id=S0141933119302911&rfr_iscdi=true