International Journal of Computer Science and Mobile Computing (IJCSMC)
Recently, the number of electronic devices handling confidential information has increased. In these devices, encryption is applied to protect the confidential information. Therefore, technologies to incorporate cryptographic circuits into these cards have become important. In this paper, the authors wish to design the highly securable processor with less power consumption. Cryptographic transformations of AES, 3DES, RC5 are analyzed based on the factors like, power consumption, memory usage, speed, number of input/outputs, memory usage. As a result, the algorithm with less power consumption and memory is implemented for designing low power, highly securable crypto processor.