The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: This paper presents the implementation of cryptography algorithm with adders and subtractor. Security of data has become most challenging aspects in the network applications, internet and data communication systems. Cryptography gives the better solution as it provides authentication, integrity protection and privacy by converting the plain text into the cipher form using different encryption and decryption techniques. Methods/Statistical Analysis: For the purpose of secured communication, certain cryptographic techniques and error detection correction techniques are used. The encryption and decryption as well as error detection and correction part is done by hamming code algorithm. For high security and circuit optimization purpose, we have introduced different adder and subtractor circuits in the hamming code cryptography process. Findings: According to our simulation results, our new method can work quite well. We achieved low-power and less delay process because of adder’s structure modifications. Applications/Improvements: This proposed method is useful in any data communication systems and also in military applications.

Keywords

Adder, Cryptography, Decryption, Encryption, Hamming Code, Subtractor
User