SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
A VLSI IMPLEMENTATION OF A RESOURCE EFFICIENT AND
SECURE ARCHITECTURE OF A BLOCK CIPHER
Satish Shivaram1
, R.Krishna2
, Vijayaprakash3
, K.V.Prasad4
1
Student, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India.
2
Assistant Professor, Electronics and communication, Bangalore Institute of Technology, Karnataka, India.
3
Professor, Electronics and Communication, Bangalore Institute of Technology, Karnataka , India.
4
Professor and HOD, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India.
Abstract
In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography
architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few
drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above
mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this
paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data
into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput
enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design
tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area
reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector.
Keywords : Cryptography, VLSI, FPGA , Block Cipher.
---------------------------------------------------------------------
***---------------------------------------------------------------------
1. INTRODUCTION
After the computer invention the need of developing
tools to protect the information (data) stored in the
computer raised. To fulfill this requirements number of
tools designed and developed with the main goal of
protecting information present in the computer from
hackers. These facilities are generally called as computer
security. The development of communication and network
facilities make it possible to share the information between
computers and then the problem of hacking of information
arises from this the concept of network security developed.
Cryptography is a technique that makes information not
readable by unauthorized persons, by the use of encoding
method. Some of the application of cryptography includes
the security of ATM cards, use of passwords in computer
and electronic commerce. Cryptography is derived from
the Greek words ‗kryptos‘(hidden) and ‗graphos‘(written)
respectively. Cryptography involves two processes. These
are encryption and decryption. Encryption converts the
plain text to cipher text. Decryption converts cipher text to
plain text.
The main goal of cryptography is to make our information
confidential. There are various cryptographic algorithms
have been developed. The design of any cryptographic
algorithm requires the focus on three parameter: these are
―security, cost and performance‖. So depending on
particular application one can choose better algorithm
suitable for that application.
Standardized algorithms like AES, DES etc, fails to provide
security in applications such as RFID tag, sensor nodes, and
smart cards. These algorithms demands the support of more
resources, lightweight cryptography can be used as an
alternative for these application, which gives better security
compared to standardized cryptographic algorithms. This
gives motivation for the designer to move towards
lightweight cryptographic algorithms.
Hummingbird cryptography is one of the lightweight
cryptographic algorithms. Design of Hummingbird
cryptography is motivated by the enigma machine . It is
found that it uses small sized block and able to withstand
cryptographic attacks like linear and differential
cryptanalysis.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 172
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
In this paper hummingbird cryptographic algorithm is
considered and tries to modify the block cipher used to
reduce the area and enhanced performance without affecting
the security of algorithm.
In this paper block cipher is designed using throughput
enhanced and area reduced architecture. The secure key
used in this paper is 128 bit instead of 64 bit which was used
in previous work. The S-box used here makes use of the
readily available LUT which is shown in the methodology
section. Both encryption and decryption work are carried out
to show the given plain text is secured in high terms with
large number of bits. With the same key used the given plain
text can be obtained making the information more secure.
The area utilization of both throughput enhanced and area
reduced are obtained by synthesis report by using Xilinx
14.6 and are compared. Simulation results are obtained
using ModelSim 10.1 and the waveforms are observed.
The Theoretical backgrounds of cipher block and proposed
architecture will be described in the next two sections. The
simulation results and synthesis report will be discussed
before conclusion.
2. THEORETICAL BACKGROUND
In this section the basic flow chart of through put enhanced
design and area reduced design is incorporated.
In the first step the 16 bit plain text data is mixed with the
128 bit secure key which is subdivided into 8 different 16 bit
secure key. Followed by this step is substitution step where
the S-box plays an important role for both encryption and
decryption. In this paper readily available S-box LUT is
being used instead of representing Boolean expressions.
linear transformation is followed after substitution layer.
After eight times iteration the second round key with
exoring with all odd numbers of key is given to S-box and
linear transform layer. The process is repeated as shown in
fig 1.
The readily available S-box is shown below.
Table 1: S-Boxes given in Hexadecimal format
x 0 1 2 3 4 5 6 7
8 6 5 F 1 C A 9
0 7 E 1 5 B 8 2
2 E F 5 C 1 9 A
0 7 3 4 C 1 A F
x 8 9 A B C D E F
E B 2 4 7 0 D 3
3 A D 6 F C 4 9
B 4 6 8 0 7 3 D
D E 6 B 2 8 9 5
3. PROPOSED ARCHITECTURE
a. Throughput enhanced design:
In this paper, the cipher block is presented by new
expressions. The encryption and decryption block is
designed separately using 128 bit has the new proposed
design. The basic design of throughput enhanced design of
block cipher using 128 bit secure key is as shown in fig 1.
The proposed work goes well with the theoretical
background with flow chart starting with the key mixing
step with the given plain text. Followed by substitution layer
where S- box plays an important role. In this paper we are
using readily available S-box as shown in table 1.
Followed by linear transformation layer which is given by
m^m<<6^m<<10 expression for encryption. These steps are
repeated 8 times with different 16 bit secure key.
K9 is calculated with all the odd numbers of keys exoring
and leads to S-box substitution and linear transformation
and then k10 is calculated with all the even number of keys.
The final 16 bit encrypted data of the given plain text data is
obtained which is further made use in the decryption block
using the same 128 bit secure key.
Fig 1. Block diagram of proposed throughput enhanced
encryption unit
The decryption block using 128 bit secure key is as shown
in fig 2. Here the operation are carried out in a similar
manner as compared to encryption block which is the mirror
operation of it.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 173
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
The only difference is the way the S-box readings are made
which is inverse. In the next inverse linear transform the
expression is given by m^m<<6^m<<10^m<<12. All the
operations are inversed starting from key k10 to k1. The
decrypted data is same as the plain text given and the
procedure followed serves the purpose.
Fig 2. Block diagram of proposed throughput enhanced
decryption unit.
b. area reduced design:
in this paper major proposal is to get area reduction on fpga.
The area reduced design encryption is shown in fig 3.
In this design the number of components are reduced in the
first part of substitution and linear transformation unit. The
eight iterations are reduced with one unit where each key
processing output is stored in a flop and based on the key
select and data select operations are performed and the
synthesis report is been generated and compared with the
throughput enhanced version. We can see the number of 4
input LUTs used is reduced in this design.
Fig 3. Block diagram of proposed area reduced design unit.
Simulation results:
Simulation results are seen using ModelSim 10.1b
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 174
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
Fig 4. Waveform of throughput enhanced encryption using 128 bit secure key.
Fig 5. waveform of throughput enhanced decryption unit using 128 bit secure key
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 175
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
Fig 6. waveform of area reduced encryption unit using 128 bit secure key.Synthesis report :
Syntesis is done using Xilinx 14.6 version.
Table 2: Device utilization summary
Module Area in LUT
Throughput Oriented 128 252
Area oriented 128 104
Through put base paper 64 132
Area oriented 64 88
CONCLUSION
In this paper , the cipher block named throughput enhanced
and area reduced block ciphers are implemented. Both
encryption and decryption units are developed and
implemented. The round keys are generated and registered
using 128 bit secure key instead of 64 bit key used in the
previous work. The S – box implementation is done using
readily available LUTs instead of Boolean expression which
is time consuming and more number of slices for
implementation.
The simulation and synthesis reports are tabulated . as seen
from the table 2 area reduced design required lesser number
of 4 input LUT compared to throughput enhanced design.
This shows that single module chip area optimization is
observed in greater manner. This is a well balanced
architecture with high performance and low complexity.
This cipher block can also be used in wireless sensor nodes
and smart chips.
REFERENCES
[1] R. Anderson, E. Biham, and L. Knudsen, “Serpent: A
proposal for the advanced encryption standard,” in Proc. 1st
Advanced Encryption
Standard (AES) Conf., 1998.
[2] B. Singh, L. Alexander, and S. Burman, “On algebraic
relations of Serpent S-boxes”, Cryptology ePrint Archive,
Report 2009/038, 2009.
[3] M. J. O. Saarinen, “Cryptanalysis of Hummingbird-1,”
in Proc. the 18th
international conference on Fast software
encryption, Denmark, Feb.
2011.
[4] C. Patterson, “A Dynamic FPGA Implementation of the
Serpent Block Cipher,” Lecture Notes in Computer Science,
Vol. 1965, pp 141-155,
2000.
[5] X. Fan, H. Hu, G. Gong, E. Smith, and D. Engels,
“Lightweight Implementation of Hummingbird
Cryptographic Algorithm on 4-Bit
Microcontrollers,” in Proc. 4th International Conference for
Internet Technology and Secured Transactions (ICITST
2009), pp. 838-844,
Nov. 2009.
[6] X. Fan, G. Gong, K. Lauffenburger, and T. Hicks,
“FPGA Implementations of the Hummingbird
Cryptographic Algorithm,” in
Proc. The 2010 IEEE International Symposium on
Hardware-Oriented Security and Trust (HOST 2010),
pp.48-51, 2010.
[7] X. Chen, Y. Zhu, Z. Gong, and Y. Luo, “Cryptanalysis
of the Lightweight Block Cipher Hummingbird-1,” in proc.
Fourth
International Conference on Emerging Intelligent Data and
Web Technologies (EIDWT), pp. 515 - 518, 2013.
[8] I. San and N. At, “Compact Hardware Architecture for
Hummingbird Cryptographic Algorithm,” in Proc. 2011
International Conference on
Field Programmable Logic and Applications (FPL), pp.376-
381, Sept. 2011.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 176
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
[9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A.
Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe,
“PRESENT: An Ultra-
Lightweight Block Cipher”, Cryptographic Hardware and
Embedded Systems, vol. 4727,Springer Heidelber, pp. 450-
466, 2007.
[10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA
Implementation of the SMS4 Block Cipher in the Chinese
WAPI Standard,” in Proc.
International Conference on Embedded Software and
Systems Symposia, pp.104-106, July 2008.
[11] X. Fan, “Efficient Cryptographic Algorithms and
Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis,
University of Waterloo, Canada,
March 2010.
[12] P. Bora and T. Czajka,“Implementation of the Serpent
Algorithm Using Altera FPGA Devices,” Public Comments
on AES Candidate
Algorithms-Round 2, available at : http://www.nist.gov/aes/.
[13] A.J. Elbirt and C Paar, “An FPGA implementation and
performance evaluation of the Serpent block cipher,” In
Proc. ACM Eighth
International Symposium on Field Programmable Gate
Arrays (FPGA 2000), pp. 33–40, Feb 2000.
[14] X. Fan, G. Gong, and H. Hu, “Remedying the
Hummingbird Cryptographic Algorithm,” in Proc. The
2011 IEEE International
Workshop on Security and Privacy in Internet of Things
(SPIoT 2011), China, Nov. 2011.
[15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman,
Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and
implementation of block cipher in hummingbird algorithm
over FPGA", Fifth International Conference on Computing
Communications and Networking Technologies (ICCCNT),
2014.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
[9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A.
Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe,
“PRESENT: An Ultra-
Lightweight Block Cipher”, Cryptographic Hardware and
Embedded Systems, vol. 4727,Springer Heidelber, pp. 450-
466, 2007.
[10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA
Implementation of the SMS4 Block Cipher in the Chinese
WAPI Standard,” in Proc.
International Conference on Embedded Software and
Systems Symposia, pp.104-106, July 2008.
[11] X. Fan, “Efficient Cryptographic Algorithms and
Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis,
University of Waterloo, Canada,
March 2010.
[12] P. Bora and T. Czajka,“Implementation of the Serpent
Algorithm Using Altera FPGA Devices,” Public Comments
on AES Candidate
Algorithms-Round 2, available at : http://www.nist.gov/aes/.
[13] A.J. Elbirt and C Paar, “An FPGA implementation and
performance evaluation of the Serpent block cipher,” In
Proc. ACM Eighth
International Symposium on Field Programmable Gate
Arrays (FPGA 2000), pp. 33–40, Feb 2000.
[14] X. Fan, G. Gong, and H. Hu, “Remedying the
Hummingbird Cryptographic Algorithm,” in Proc. The
2011 IEEE International
Workshop on Security and Privacy in Internet of Things
(SPIoT 2011), China, Nov. 2011.
[15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman,
Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and
implementation of block cipher in hummingbird algorithm
over FPGA", Fifth International Conference on Computing
Communications and Networking Technologies (ICCCNT),
2014.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177
Ad

Recommended

New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on multi-level keys
IJECEIAES
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
eSAT Publishing House
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
eSAT Journals
 
Js2517181724
Js2517181724
IJERA Editor
 
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
IJECEIAES
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET Journal
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
cscpconf
 
G05124550
G05124550
IOSR-JEN
 
M021201092098
M021201092098
theijes
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
IJERA Editor
 
Hd3512461252
Hd3512461252
IJERA Editor
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
A new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithm
TELKOMNIKA JOURNAL
 
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
VLSICS Design
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
eSAT Publishing House
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
D010321824
D010321824
IOSR Journals
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Mahesh Shirke Resume
Mahesh Shirke Resume
Prin. L. N. Welingkar Institute of Management &amp; Reserch
 
CV_RAULT-Alexis
CV_RAULT-Alexis
Alexis RAULT
 
13Vol70No2
13Vol70No2
Muhammad Faisal
 
74th Golden Globes Awards: Nominees 2017
74th Golden Globes Awards: Nominees 2017
maditabalnco
 

More Related Content

What's hot (18)

Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
eSAT Journals
 
Js2517181724
Js2517181724
IJERA Editor
 
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
IJECEIAES
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET Journal
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
cscpconf
 
G05124550
G05124550
IOSR-JEN
 
M021201092098
M021201092098
theijes
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
IJERA Editor
 
Hd3512461252
Hd3512461252
IJERA Editor
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
A new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithm
TELKOMNIKA JOURNAL
 
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
VLSICS Design
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
eSAT Publishing House
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
D010321824
D010321824
IOSR Journals
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
eSAT Journals
 
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
IJECEIAES
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET Journal
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
cscpconf
 
M021201092098
M021201092098
theijes
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
IJERA Editor
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
A new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithm
TELKOMNIKA JOURNAL
 
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
VLSICS Design
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
eSAT Publishing House
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 

Viewers also liked (15)

Mahesh Shirke Resume
Mahesh Shirke Resume
Prin. L. N. Welingkar Institute of Management &amp; Reserch
 
CV_RAULT-Alexis
CV_RAULT-Alexis
Alexis RAULT
 
13Vol70No2
13Vol70No2
Muhammad Faisal
 
74th Golden Globes Awards: Nominees 2017
74th Golden Globes Awards: Nominees 2017
maditabalnco
 
Script working title persona non grata-2
Script working title persona non grata-2
mediastudiesf1n34rts
 
Demystifying Ethnography: Exploring Student Use of Library Spaces
Demystifying Ethnography: Exploring Student Use of Library Spaces
Amy Gratz Barker
 
Production Organisation Approval
Production Organisation Approval
Ahmet K G
 
EASA Part-66 Module03 mcq's
EASA Part-66 Module03 mcq's
Armghan Saeed
 
Gas storage industry primer-Niska
Gas storage industry primer-Niska
GE 94
 
Fighting Identity Theft: Big Data Analytics to the Rescue
Fighting Identity Theft: Big Data Analytics to the Rescue
Seshika Fernando
 
Online learning talk
Online learning talk
Emily Chin
 
GST India
GST India
Rajesh Sharma
 
EASA Part-66 Module08 mcq's
EASA Part-66 Module08 mcq's
Armghan Saeed
 
The Best Weather Photos of 2016
The Best Weather Photos of 2016
maditabalnco
 
Mobile UX for Academic Libraries
Mobile UX for Academic Libraries
Kevin Rundblad
 
74th Golden Globes Awards: Nominees 2017
74th Golden Globes Awards: Nominees 2017
maditabalnco
 
Script working title persona non grata-2
Script working title persona non grata-2
mediastudiesf1n34rts
 
Demystifying Ethnography: Exploring Student Use of Library Spaces
Demystifying Ethnography: Exploring Student Use of Library Spaces
Amy Gratz Barker
 
Production Organisation Approval
Production Organisation Approval
Ahmet K G
 
EASA Part-66 Module03 mcq's
EASA Part-66 Module03 mcq's
Armghan Saeed
 
Gas storage industry primer-Niska
Gas storage industry primer-Niska
GE 94
 
Fighting Identity Theft: Big Data Analytics to the Rescue
Fighting Identity Theft: Big Data Analytics to the Rescue
Seshika Fernando
 
Online learning talk
Online learning talk
Emily Chin
 
EASA Part-66 Module08 mcq's
EASA Part-66 Module08 mcq's
Armghan Saeed
 
The Best Weather Photos of 2016
The Best Weather Photos of 2016
maditabalnco
 
Mobile UX for Academic Libraries
Mobile UX for Academic Libraries
Kevin Rundblad
 
Ad

Similar to A vlsi implementation of a resource efficient and secure architecture of a block cipher (20)

IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
IOSRJECE
 
publication
publication
Zhenyu Xu
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
paperpublications3
 
Final report
Final report
Jagbir Kalirai
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
TELKOMNIKA JOURNAL
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
IRJET Journal
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
IOSRJECE
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
paperpublications3
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
TELKOMNIKA JOURNAL
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
IRJET Journal
 
Ad

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 
Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

Recently uploaded (20)

Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
دراسة حاله لقرية تقع في جنوب غرب السودان
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
دراسة حاله لقرية تقع في جنوب غرب السودان
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 

A vlsi implementation of a resource efficient and secure architecture of a block cipher

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 A VLSI IMPLEMENTATION OF A RESOURCE EFFICIENT AND SECURE ARCHITECTURE OF A BLOCK CIPHER Satish Shivaram1 , R.Krishna2 , Vijayaprakash3 , K.V.Prasad4 1 Student, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India. 2 Assistant Professor, Electronics and communication, Bangalore Institute of Technology, Karnataka, India. 3 Professor, Electronics and Communication, Bangalore Institute of Technology, Karnataka , India. 4 Professor and HOD, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India. Abstract In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector. Keywords : Cryptography, VLSI, FPGA , Block Cipher. --------------------------------------------------------------------- ***--------------------------------------------------------------------- 1. INTRODUCTION After the computer invention the need of developing tools to protect the information (data) stored in the computer raised. To fulfill this requirements number of tools designed and developed with the main goal of protecting information present in the computer from hackers. These facilities are generally called as computer security. The development of communication and network facilities make it possible to share the information between computers and then the problem of hacking of information arises from this the concept of network security developed. Cryptography is a technique that makes information not readable by unauthorized persons, by the use of encoding method. Some of the application of cryptography includes the security of ATM cards, use of passwords in computer and electronic commerce. Cryptography is derived from the Greek words ‗kryptos‘(hidden) and ‗graphos‘(written) respectively. Cryptography involves two processes. These are encryption and decryption. Encryption converts the plain text to cipher text. Decryption converts cipher text to plain text. The main goal of cryptography is to make our information confidential. There are various cryptographic algorithms have been developed. The design of any cryptographic algorithm requires the focus on three parameter: these are ―security, cost and performance‖. So depending on particular application one can choose better algorithm suitable for that application. Standardized algorithms like AES, DES etc, fails to provide security in applications such as RFID tag, sensor nodes, and smart cards. These algorithms demands the support of more resources, lightweight cryptography can be used as an alternative for these application, which gives better security compared to standardized cryptographic algorithms. This gives motivation for the designer to move towards lightweight cryptographic algorithms. Hummingbird cryptography is one of the lightweight cryptographic algorithms. Design of Hummingbird cryptography is motivated by the enigma machine . It is found that it uses small sized block and able to withstand cryptographic attacks like linear and differential cryptanalysis. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 172
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 In this paper hummingbird cryptographic algorithm is considered and tries to modify the block cipher used to reduce the area and enhanced performance without affecting the security of algorithm. In this paper block cipher is designed using throughput enhanced and area reduced architecture. The secure key used in this paper is 128 bit instead of 64 bit which was used in previous work. The S-box used here makes use of the readily available LUT which is shown in the methodology section. Both encryption and decryption work are carried out to show the given plain text is secured in high terms with large number of bits. With the same key used the given plain text can be obtained making the information more secure. The area utilization of both throughput enhanced and area reduced are obtained by synthesis report by using Xilinx 14.6 and are compared. Simulation results are obtained using ModelSim 10.1 and the waveforms are observed. The Theoretical backgrounds of cipher block and proposed architecture will be described in the next two sections. The simulation results and synthesis report will be discussed before conclusion. 2. THEORETICAL BACKGROUND In this section the basic flow chart of through put enhanced design and area reduced design is incorporated. In the first step the 16 bit plain text data is mixed with the 128 bit secure key which is subdivided into 8 different 16 bit secure key. Followed by this step is substitution step where the S-box plays an important role for both encryption and decryption. In this paper readily available S-box LUT is being used instead of representing Boolean expressions. linear transformation is followed after substitution layer. After eight times iteration the second round key with exoring with all odd numbers of key is given to S-box and linear transform layer. The process is repeated as shown in fig 1. The readily available S-box is shown below. Table 1: S-Boxes given in Hexadecimal format x 0 1 2 3 4 5 6 7 8 6 5 F 1 C A 9 0 7 E 1 5 B 8 2 2 E F 5 C 1 9 A 0 7 3 4 C 1 A F x 8 9 A B C D E F E B 2 4 7 0 D 3 3 A D 6 F C 4 9 B 4 6 8 0 7 3 D D E 6 B 2 8 9 5 3. PROPOSED ARCHITECTURE a. Throughput enhanced design: In this paper, the cipher block is presented by new expressions. The encryption and decryption block is designed separately using 128 bit has the new proposed design. The basic design of throughput enhanced design of block cipher using 128 bit secure key is as shown in fig 1. The proposed work goes well with the theoretical background with flow chart starting with the key mixing step with the given plain text. Followed by substitution layer where S- box plays an important role. In this paper we are using readily available S-box as shown in table 1. Followed by linear transformation layer which is given by m^m<<6^m<<10 expression for encryption. These steps are repeated 8 times with different 16 bit secure key. K9 is calculated with all the odd numbers of keys exoring and leads to S-box substitution and linear transformation and then k10 is calculated with all the even number of keys. The final 16 bit encrypted data of the given plain text data is obtained which is further made use in the decryption block using the same 128 bit secure key. Fig 1. Block diagram of proposed throughput enhanced encryption unit The decryption block using 128 bit secure key is as shown in fig 2. Here the operation are carried out in a similar manner as compared to encryption block which is the mirror operation of it. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 173
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 The only difference is the way the S-box readings are made which is inverse. In the next inverse linear transform the expression is given by m^m<<6^m<<10^m<<12. All the operations are inversed starting from key k10 to k1. The decrypted data is same as the plain text given and the procedure followed serves the purpose. Fig 2. Block diagram of proposed throughput enhanced decryption unit. b. area reduced design: in this paper major proposal is to get area reduction on fpga. The area reduced design encryption is shown in fig 3. In this design the number of components are reduced in the first part of substitution and linear transformation unit. The eight iterations are reduced with one unit where each key processing output is stored in a flop and based on the key select and data select operations are performed and the synthesis report is been generated and compared with the throughput enhanced version. We can see the number of 4 input LUTs used is reduced in this design. Fig 3. Block diagram of proposed area reduced design unit. Simulation results: Simulation results are seen using ModelSim 10.1b ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 174
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 Fig 4. Waveform of throughput enhanced encryption using 128 bit secure key. Fig 5. waveform of throughput enhanced decryption unit using 128 bit secure key ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 175
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 Fig 6. waveform of area reduced encryption unit using 128 bit secure key.Synthesis report : Syntesis is done using Xilinx 14.6 version. Table 2: Device utilization summary Module Area in LUT Throughput Oriented 128 252 Area oriented 128 104 Through put base paper 64 132 Area oriented 64 88 CONCLUSION In this paper , the cipher block named throughput enhanced and area reduced block ciphers are implemented. Both encryption and decryption units are developed and implemented. The round keys are generated and registered using 128 bit secure key instead of 64 bit key used in the previous work. The S – box implementation is done using readily available LUTs instead of Boolean expression which is time consuming and more number of slices for implementation. The simulation and synthesis reports are tabulated . as seen from the table 2 area reduced design required lesser number of 4 input LUT compared to throughput enhanced design. This shows that single module chip area optimization is observed in greater manner. This is a well balanced architecture with high performance and low complexity. This cipher block can also be used in wireless sensor nodes and smart chips. REFERENCES [1] R. Anderson, E. Biham, and L. Knudsen, “Serpent: A proposal for the advanced encryption standard,” in Proc. 1st Advanced Encryption Standard (AES) Conf., 1998. [2] B. Singh, L. Alexander, and S. Burman, “On algebraic relations of Serpent S-boxes”, Cryptology ePrint Archive, Report 2009/038, 2009. [3] M. J. O. Saarinen, “Cryptanalysis of Hummingbird-1,” in Proc. the 18th international conference on Fast software encryption, Denmark, Feb. 2011. [4] C. Patterson, “A Dynamic FPGA Implementation of the Serpent Block Cipher,” Lecture Notes in Computer Science, Vol. 1965, pp 141-155, 2000. [5] X. Fan, H. Hu, G. Gong, E. Smith, and D. Engels, “Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontrollers,” in Proc. 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009), pp. 838-844, Nov. 2009. [6] X. Fan, G. Gong, K. Lauffenburger, and T. Hicks, “FPGA Implementations of the Hummingbird Cryptographic Algorithm,” in Proc. The 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), pp.48-51, 2010. [7] X. Chen, Y. Zhu, Z. Gong, and Y. Luo, “Cryptanalysis of the Lightweight Block Cipher Hummingbird-1,” in proc. Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 515 - 518, 2013. [8] I. San and N. At, “Compact Hardware Architecture for Hummingbird Cryptographic Algorithm,” in Proc. 2011 International Conference on Field Programmable Logic and Applications (FPL), pp.376- 381, Sept. 2011. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 176
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 [9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe, “PRESENT: An Ultra- Lightweight Block Cipher”, Cryptographic Hardware and Embedded Systems, vol. 4727,Springer Heidelber, pp. 450- 466, 2007. [10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA Implementation of the SMS4 Block Cipher in the Chinese WAPI Standard,” in Proc. International Conference on Embedded Software and Systems Symposia, pp.104-106, July 2008. [11] X. Fan, “Efficient Cryptographic Algorithms and Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis, University of Waterloo, Canada, March 2010. [12] P. Bora and T. Czajka,“Implementation of the Serpent Algorithm Using Altera FPGA Devices,” Public Comments on AES Candidate Algorithms-Round 2, available at : http://www.nist.gov/aes/. [13] A.J. Elbirt and C Paar, “An FPGA implementation and performance evaluation of the Serpent block cipher,” In Proc. ACM Eighth International Symposium on Field Programmable Gate Arrays (FPGA 2000), pp. 33–40, Feb 2000. [14] X. Fan, G. Gong, and H. Hu, “Remedying the Hummingbird Cryptographic Algorithm,” in Proc. The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), China, Nov. 2011. [15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman, Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and implementation of block cipher in hummingbird algorithm over FPGA", Fifth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2014. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 [9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe, “PRESENT: An Ultra- Lightweight Block Cipher”, Cryptographic Hardware and Embedded Systems, vol. 4727,Springer Heidelber, pp. 450- 466, 2007. [10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA Implementation of the SMS4 Block Cipher in the Chinese WAPI Standard,” in Proc. International Conference on Embedded Software and Systems Symposia, pp.104-106, July 2008. [11] X. Fan, “Efficient Cryptographic Algorithms and Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis, University of Waterloo, Canada, March 2010. [12] P. Bora and T. Czajka,“Implementation of the Serpent Algorithm Using Altera FPGA Devices,” Public Comments on AES Candidate Algorithms-Round 2, available at : http://www.nist.gov/aes/. [13] A.J. Elbirt and C Paar, “An FPGA implementation and performance evaluation of the Serpent block cipher,” In Proc. ACM Eighth International Symposium on Field Programmable Gate Arrays (FPGA 2000), pp. 33–40, Feb 2000. [14] X. Fan, G. Gong, and H. Hu, “Remedying the Hummingbird Cryptographic Algorithm,” in Proc. The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), China, Nov. 2011. [15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman, Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and implementation of block cipher in hummingbird algorithm over FPGA", Fifth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2014. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177