An implementation of the Data Encryption Standard (DES) algorithm is described. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The proposed pipeline method is for improving the speed of execution when compare with the non-pipeline method.
SANTHAMMA, P.; RAGHAVAIAH, B.; and BABU, N. SURESH
"IMPLEMENTATION OF PIPELINED DES USING VERILOG,"
International Journal of Computer and Communication Technology: Vol. 6
, Article 9.
Available at: https://www.interscience.in/ijcct/vol6/iss2/9