Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2230
Title: FPGA implementation of RC-4T and WPA
Authors: Kodali, Ravi
Gundbathula, Satya
Boppana, Lakshmi
Keywords: Stream cipher,
Hash function
Issue Date: 2014
Publisher: 2014 IEEE National Conference on Communication, Signal Processing and Networking, NCCSN 2014
Citation: 10.1109/NCCSN.2014.7001163
Abstract: Security is an important feature to be included in the field of wireless communications, where the transmission and reception need to be unassailable. Every wireless device needs to adopt a security model which may be complex or simple to make the communication impregnable. The algorithm to be chosen for the final implementation depends on the characteristics of the device. Applications requiring higher security should employ devices having computational capabilities and good amount of hardware and those applications that do not need to have tight security can compromise with the hardware resources and the ability of the micro-controller/microprocessor. In this work two security models namely, the RC-4 with the Toeplitz hash algorithm (RC-4T) and the Wi-Fi protected Access (WPA) have been compared in terms of hardware complexity and combinational delay. Both of these algorithms have been implemented using the XilinxVirtex-6q FPGA device for the comparison based on resource utilization and delays. Toeplitz hash function has been used along with RC-4 algorithm for the generation of the key stream thus making the security model more robust as compared to the traditional WEP.
Description: NITW
URI: http://localhost:8080/xmlui/handle/123456789/2230
Appears in Collections:Electronics and Communication Engineering

Files in This Item:
File Description SizeFormat 
FPGA implementation of RC-4T and WPA.pdf165.57 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.