Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2014 | Volume: 13 | Issue: 12 | Page No.: 2022-2026
DOI: 10.3923/itj.2014.2022.2026
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Humming Bird with Coloured Wings: A Feedback Security Approach

Siva Janakiraman, K.V.Sai Krishna Kumar, R.Rohit Kumar Reddy, A. Srinivasulu, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan

Abstract:
The day to day amplification on technology and the demand on shrinking the device sizes reflect in the diminution on memory sizes and constraints on device outlay. In the present times of mass communication with the swift escalating technology, there is a dire necessity for security on the information traversing between authorized individuals. All these factors invite the property of light weightiness and the focused security algorithms such as Hummingbird for devices with humiliated resources. This study present an efficient software implementation of modified Humming Bird algorithm on an 8-bit microcontroller with randomization on sub-key selection based on LFSR. We also do comparative analysis on performance in terms of memory foot print and execution time between our modified one and the original algorithm implementations. The obtained results make it evident that the proposed method raises the complexity significantly without hike in resource consumption and makes it more suitable to provide security in extremely constrained devices.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Light Weight Steganography on RISC Platform-Implementation and Analysis
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Image Encryption: An Information Security Perceptive
  •    Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
  •    Firmware for Data Security: A Review
  •    Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm
  •    Key Transformation Approach for Rijndael Security
How to cite this article:

Siva Janakiraman, K.V.Sai Krishna Kumar, R.Rohit Kumar Reddy, A. Srinivasulu, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan, 2014. Humming Bird with Coloured Wings: A Feedback Security Approach. Information Technology Journal, 13: 2022-2026.

DOI: 10.3923/itj.2014.2022.2026

URL: https://scialert.net/abstract/?doi=itj.2014.2022.2026

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom