Research Journal of Information Technology1815-74322151-7959Science International10.3923/rjit.2013.242.248BegumM. Baritha VenkataramaniY. 2201352Secure, complex and high speed cryptosystem is essential for transmission of
information. Attackers can be avoided in application specific hardware. In this
study, security is enhanced by Pell equation and chaotic key based algorithm.
Chaotic key based algorithm has been widely used for encryption now days. The
proposed algorithm is for encryption and decryption of text. VLSI architecture
of cryptosystem is proposed for hardware implementation to increase the speed
of computation and complexity. Separate hardware increases security and consumes
less power.]]>Kanso, A. and N. Smaoui,2009Alvarez, G., F. Montoya, M. Romera and G. Pastor,2004Alvarez, G., L.H. Encinas and J.M. Masque,2008Rao, K.D., K.P. Kumar and P.V.M. Krishna,2011Rao, K.D. and C. Gangadhar,2011Ismail, I.A., M. Amin and H. Diab,2010Yen, J.C. and J.I. Guo,2000Singh, K. and K. Kaur,2011Masuda, N. and K. Aihara,2002Mishra, M. and V.H. Mankar,2011Mitter, R. and M.S.S. Priya,2012Hamri, M., J. Mikram and F. Zinoun,2011Murthy, N.R. and M.N.S. Swamy,2006Sarma, K.V.S.S.R.S.S. and P.S. Avadhani,2011Zheng, J., J. Li, M. J. Lee and M. Anshel,2006