SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 148 
FPGA BASED ENCRYPTION DESIGN USING VHDL Kumar Anubhav Tiwari1, Kasturi Chakrabarty2, B. Ram3, Ajay Kumar Trivedi4 1Ambalika Institute of Management & Technology, Lucknow 2University of Westminster, London 3Sir Chhotu Ram Institute of Engineering & Technology 4Ambalika Institute of Management & Technology, Lucknow Abstract The job of cryptographers is quite crucial as they are responsible to keep privacy of personal information and indirectly the protection of national security. The efficient encryption method ensures the information security. Here VHDL (Very high speed integrated circuits Hardware Description Language) and FPGA (Field Programmable Gate Arrays technology) are used for highly efficient encryption design to secure the information over open network transmission. The proposed work is a composite encryption technique comprised of transposition and substitution to generate complex encipherment. The design is implemented and tested in Xilinx ISE.9.2. A final result signifies the efficiency and reliability for FPGA (SPARTAN-3) device. Keywords: VHDL, FPGA, Encryption, Xilinx ISE.9.2 
--------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Encryption is used to transform information into an incomprehensible form. The input to the plaintext (or cleartext) and the output from it is called ciphertext (or cryptogram). The reverse process of transforming ciphertext into plaintext is called decryption (or decipherment). Notice that plaintext and ciphertext are a pair of respective notions: the former refers to messages input to, and the latter, output from, an encryption algorithm. Plaintext needn't be in a comprehensible form; for example, in the case of double encryption, a ciphertext can be in the position of a plaintext for re-encryption. Usually, cleartext means messages in a small subset of all possible messages which have certain recognizable distributions. In general ciphers can be distinguished into two types classical or modern according to the type of input data [7]. It should be useful to point out that the two basic working principles of the classical ciphers: substitution and transposition are still the most important kernel techniques in the construction of modern symmetric encryption algorithms. A combinations of substitution and transposition ciphers founded in two important modern symmetric encryption algorithms: Data Encryption Standard (DES) and Advance Encryption Standard, AES, [1]. A transposition cipher (also called permutation cipher) transforms a message by rearranging the positions of the elements of the message without changing the identities of the elements. Transposition ciphers are an important family of classical ciphers, in additional substitution ciphers, which are widely used in the constructions of modern block ciphers Modern encryption methods can be divided according to two criteria [7]: the type of key used, and the type of input data. By type of key used ciphers are divided into: 
1. Symmetric key algorithms (Private-key cryptography), where the same key is used for encryption and decryption. 
2. Asymmetric key algorithms (Public-key cryptography), where two different keys are used for encryption and decryption. 
The objectives of this work was to develop a modern technique using a combination of transposition and substitution techniques in order to present an efficient encryption design that help to produce secure cipher and can be more reliable . The paper also aimed to demonstrate how FPGAs can address the need for faster recovery. This encryption algorithm targeted for small embedded applications. It was initially designed for software implementations in controllers, smart cards or processors. 2. MATERIALS AND METHODS 2.1 Materials The model design synthesizing and implementing ( i.e Translate Map & Place and Route) VHDL code with FPGA device are completely done on Xilinx –project navigator ,ISE 9.2i . 2.2 Methods In a substitution cipher, the encryption algorithm єk(m) is a substitution function which replaces each mєM (input data) with a corresponding cєC (cipher) The substitution function is parameterized by a secret key k. The decryption algorithm Dk(c) is merely the reverse substitution. In general, the substitution can be given by a mapping [1]:
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 149 
And the reverse substitution is just the corresponding 
inverse mapping 
The previous substitution function mapping explains the 
essence of this work. The base of encryption is to use 
unpredictable methods. 
2.3 Algorithm 
The described design algorithm illustrated in Fig (1) 
accepts 128 bit input data that is divided into 16( 8-bit) 
sub-blocks. Two stages of encryption were required to 
process the accepted data. The design used different 
procedure for each one. The uses of double encryption 
stage makes it complex, this provides more authentication 
on the output cipher. The sequence events of algorithm are 
applied to each input byte. 
Fig 1: Algorithm Steps 
Transposition stage used to improve the design reliability. 
The used transposition‟s mechanism is described in fig (2). 
Each byte changes position following the illustrated path in 
the chart. 
Fig 2: Transposition chart 
Fig 3: RTL design blocks 
In general description the input block is responsible of 
dividing data into bytes also it performs the transpositions 
operation, and then data pass through two encryption blocks 
which consist of a logic combination ,each encryption block 
has its own key . Finally the output block, this is used to 
form the output cipher stream. 
3. RESULTS 
The simulation process applied using ISE VHDL simulator 
in order to ensure that the design is well performed. The test 
bench process results presented in fig (4) show the inputs 
and outputs parameters, the simulation used an FPGA 
device of Spartan3 type. The results accuracy approved the 
ability of using this design. 
Device Family: Spatran3 
Tools used: 
o Xilinx ISE 9.2i 
o ISE VHDL simulator. 
o Device: xc3s1000-5fg675 
3.1 Design Overview 
The synthesis process used to transform the VHDL code 
into model design [4] illustrated in fig (3). It divided into 
blocks each one used to perform a specific function 
according to their internal logic composition. The design 
used the resources of the FPGA device. The complete 
design required about 128 of the 4 input LUTs in addition to 
273 IOBs of the available device resources. However the top
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 150 
model design view consists of four inputs and a cipher 
output. A clock unit links all blocks and used to control the 
inputoutput process. 
Fig 4: Behavioral simulation 
By checking the results obtained from fig(4) it was clear 
obviously that the design works correctly similar to the 
previous algorithm illustrated in fig(1) . The test 
accomplished successfully without errors. 
3.2 Device Performance 
The following discussion focuses on the performance of 
various FPGA devices. Synthesis is carried out using 
different family‟s types of Vertex and Spartan devices. 
Tables (1.upto 6) show the execution results of each device. 
The evaluating gives the opportunity to recognize the 
available resources of each device. It determines utilization 
ratio and time summary for each one. It is acknowledged 
that synthesis results are with some (approx.8) warnings 
which are allowable [6]. 
Spartan Devices Performance: 
Timing Summary: 
Minimum period: 4.855ns (Maximum Frequency: 
205.977MHz) 
Minimum input arrival time before clock: 1.572ns 
Maximum output required time after clock: 6.141ns 
Total delay of the output data path : 6.141ns (5.460ns logic, 
0.681ns route). 
The number of signals not completely routed for this design 
is: 0 
The average connection delay for this design is: 1.078 
The maximum PIN delay is: 3.584 
The average connection delay on the 10 worst nets is: 3.239 
4. DISCUSSIONS 
To be more reasonable in our evaluating it should be known 
that other factors such as power consumption and device 
cost should be account in particular when the evaluating 
expands to cover other known designs that work in the same 
field [2]. The implementation results lead to observe that in 
terms of area requirements It was no doubt that this design 
generally exhibits the smallest hardware consumption than 
the implementing design in [5] .Also it should be noted that 
the implementing design is almost faster and has less delay 
time compared to [5]. Finally it was known according to [3] 
that Spartans devices have low cost than Virtex 
5. CONCLUSIONS &RECOMMENDATIONS 
Today‟s connected society requires secure data encryption 
devices to preserve data privacy and authentication in 
critical application, this helps for developing more 
researches works to improve the ordinary using of 
encryption techniques . This work develops a secure 
encryption system that used FPGA technology in order to 
provide fast recovery .The paper studied most of the known 
encryption methods. The design performance was examined 
to different families of FPGA devices. Future work can be 
performed to allow more complexity by using additional 
techniques such as using one of the keys as a public key and 
the other can be used as private key. Also expanding keys 
will be useful. 
REFERENCES 
[1]. Douglas. S, „Cryptography: Theory and Practice‟, CRC 
Press LLC,(1995). 
[2]. Dimitrios. M and Ioannis. P, Power consumption 
estimations vs measurements for FPGA-based security 
cores.In: proceeding of International Conference on 
Reconfigurable Computing and FPGAs, Chania, Greece, 
(2008). 
[3]. Deming.C, Jason.C, and Peichan. P, “ FPGA Design 
Automation: A Survey”, now Publishers In, (2006). 
[4]. PONG P. C, „RTL HARDWARE DESIGN USING 
VHDL Coding for Efficiency, Portability, and Scalability‟ , 
Cleveland State University, A John Wiley & Sons, INC , 
(2006 ). 
[5]. Rabie . A.M , Magdi . S, “ Hardware Implementation of 
the Stone Matamorphic cipher “ , International Journal of 
Computer Science & Network Security vol 10 (8):54-60, 
(2010).
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 151 
[6]. Sounak Samanta B.E, „FPGA Implementation of AES Encryption and Decryption,Electronics & Communication Engg, ,Sardar Vallabhbhai National Institute of Technology,surat,( 2002). [7]. Wenbo. M.H, „Modern Cryptography Theory and Practice‟, Packard Company, Prentice Hall PTR ,( 2003).
Ad

Recommended

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
G05124550
G05124550
IOSR-JEN
 
M04302093096
M04302093096
ijceronline
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
40520130101005
40520130101005
IAEME Publication
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
Final report
Final report
Jagbir Kalirai
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
G05215356
G05215356
IOSR-JEN
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
 
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
ijcseit
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based services
eSAT Journals
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
IJECEIAES
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
Ijcnc050208
Ijcnc050208
IJCNCJournal
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
IJECEIAES
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
acijjournal
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
Lightweight cryptography
Lightweight cryptography
Shivam Singh
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloud
eSAT Publishing House
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
eSAT Publishing House
 
Experimental investigation of stepped aerofoil using propeller test rig
Experimental investigation of stepped aerofoil using propeller test rig
eSAT Publishing House
 
Effect of pouring temperature and stirring speed on
Effect of pouring temperature and stirring speed on
eSAT Publishing House
 

More Related Content

What's hot (18)

hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
G05215356
G05215356
IOSR-JEN
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
 
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
ijcseit
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based services
eSAT Journals
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
IJECEIAES
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
Ijcnc050208
Ijcnc050208
IJCNCJournal
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
IJECEIAES
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
acijjournal
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
Lightweight cryptography
Lightweight cryptography
Shivam Singh
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
 
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
ijcseit
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based services
eSAT Journals
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
IJECEIAES
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
IJECEIAES
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
acijjournal
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
Lightweight cryptography
Lightweight cryptography
Shivam Singh
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 

Viewers also liked (20)

Web application based file transfer in customized cloud
Web application based file transfer in customized cloud
eSAT Publishing House
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
eSAT Publishing House
 
Experimental investigation of stepped aerofoil using propeller test rig
Experimental investigation of stepped aerofoil using propeller test rig
eSAT Publishing House
 
Effect of pouring temperature and stirring speed on
Effect of pouring temperature and stirring speed on
eSAT Publishing House
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision based
eSAT Publishing House
 
Secured key exchange by information reconciliation
Secured key exchange by information reconciliation
eSAT Publishing House
 
A fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for an
eSAT Publishing House
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switches
eSAT Publishing House
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
eSAT Publishing House
 
Design of file system architecture with cluster
Design of file system architecture with cluster
eSAT Publishing House
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control and
eSAT Publishing House
 
Static stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindle
eSAT Publishing House
 
Simulation of solar intensity in performance of flat
Simulation of solar intensity in performance of flat
eSAT Publishing House
 
Implementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast system
eSAT Publishing House
 
Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &
eSAT Publishing House
 
Design and verification of pipelined parallel architecture implementation in ...
Design and verification of pipelined parallel architecture implementation in ...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Wavelet based denoisiong of acoustic signal
Wavelet based denoisiong of acoustic signal
eSAT Publishing House
 
Reuse of inorganic sludge as a coagulant on colloidal suspension removal in r...
Reuse of inorganic sludge as a coagulant on colloidal suspension removal in r...
eSAT Publishing House
 
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
eSAT Publishing House
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloud
eSAT Publishing House
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
eSAT Publishing House
 
Experimental investigation of stepped aerofoil using propeller test rig
Experimental investigation of stepped aerofoil using propeller test rig
eSAT Publishing House
 
Effect of pouring temperature and stirring speed on
Effect of pouring temperature and stirring speed on
eSAT Publishing House
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision based
eSAT Publishing House
 
Secured key exchange by information reconciliation
Secured key exchange by information reconciliation
eSAT Publishing House
 
A fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for an
eSAT Publishing House
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switches
eSAT Publishing House
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
eSAT Publishing House
 
Design of file system architecture with cluster
Design of file system architecture with cluster
eSAT Publishing House
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control and
eSAT Publishing House
 
Static stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindle
eSAT Publishing House
 
Simulation of solar intensity in performance of flat
Simulation of solar intensity in performance of flat
eSAT Publishing House
 
Implementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast system
eSAT Publishing House
 
Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &
eSAT Publishing House
 
Design and verification of pipelined parallel architecture implementation in ...
Design and verification of pipelined parallel architecture implementation in ...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Wavelet based denoisiong of acoustic signal
Wavelet based denoisiong of acoustic signal
eSAT Publishing House
 
Reuse of inorganic sludge as a coagulant on colloidal suspension removal in r...
Reuse of inorganic sludge as a coagulant on colloidal suspension removal in r...
eSAT Publishing House
 
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
eSAT Publishing House
 
Ad

Similar to Fpga based encryption design using vhdl (20)

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
ijcseit
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interface
eSAT Publishing House
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
IJERA Editor
 
Parc4 i parallel implementation of
Parc4 i parallel implementation of
caijjournal
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
AM Publications
 
H04425053
H04425053
IOSR-JEN
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
IJERA Editor
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
IJERA Editor
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
eSAT Journals
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
eSAT Publishing House
 
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
ijcseit
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interface
eSAT Publishing House
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
IJERA Editor
 
Parc4 i parallel implementation of
Parc4 i parallel implementation of
caijjournal
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
AM Publications
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
IJERA Editor
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
IJERA Editor
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
eSAT Journals
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
eSAT Publishing House
 
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
Ad

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housing
eSAT Publishing House
 
Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housing
eSAT Publishing House
 

Recently uploaded (20)

Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Machine Learning - Classification Algorithms
Machine Learning - Classification Algorithms
resming1
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Mechanical Vibration_MIC 202_iit roorkee.pdf
Mechanical Vibration_MIC 202_iit roorkee.pdf
isahiliitr
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Machine Learning - Classification Algorithms
Machine Learning - Classification Algorithms
resming1
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Mechanical Vibration_MIC 202_iit roorkee.pdf
Mechanical Vibration_MIC 202_iit roorkee.pdf
isahiliitr
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 

Fpga based encryption design using vhdl

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 148 FPGA BASED ENCRYPTION DESIGN USING VHDL Kumar Anubhav Tiwari1, Kasturi Chakrabarty2, B. Ram3, Ajay Kumar Trivedi4 1Ambalika Institute of Management & Technology, Lucknow 2University of Westminster, London 3Sir Chhotu Ram Institute of Engineering & Technology 4Ambalika Institute of Management & Technology, Lucknow Abstract The job of cryptographers is quite crucial as they are responsible to keep privacy of personal information and indirectly the protection of national security. The efficient encryption method ensures the information security. Here VHDL (Very high speed integrated circuits Hardware Description Language) and FPGA (Field Programmable Gate Arrays technology) are used for highly efficient encryption design to secure the information over open network transmission. The proposed work is a composite encryption technique comprised of transposition and substitution to generate complex encipherment. The design is implemented and tested in Xilinx ISE.9.2. A final result signifies the efficiency and reliability for FPGA (SPARTAN-3) device. Keywords: VHDL, FPGA, Encryption, Xilinx ISE.9.2 --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Encryption is used to transform information into an incomprehensible form. The input to the plaintext (or cleartext) and the output from it is called ciphertext (or cryptogram). The reverse process of transforming ciphertext into plaintext is called decryption (or decipherment). Notice that plaintext and ciphertext are a pair of respective notions: the former refers to messages input to, and the latter, output from, an encryption algorithm. Plaintext needn't be in a comprehensible form; for example, in the case of double encryption, a ciphertext can be in the position of a plaintext for re-encryption. Usually, cleartext means messages in a small subset of all possible messages which have certain recognizable distributions. In general ciphers can be distinguished into two types classical or modern according to the type of input data [7]. It should be useful to point out that the two basic working principles of the classical ciphers: substitution and transposition are still the most important kernel techniques in the construction of modern symmetric encryption algorithms. A combinations of substitution and transposition ciphers founded in two important modern symmetric encryption algorithms: Data Encryption Standard (DES) and Advance Encryption Standard, AES, [1]. A transposition cipher (also called permutation cipher) transforms a message by rearranging the positions of the elements of the message without changing the identities of the elements. Transposition ciphers are an important family of classical ciphers, in additional substitution ciphers, which are widely used in the constructions of modern block ciphers Modern encryption methods can be divided according to two criteria [7]: the type of key used, and the type of input data. By type of key used ciphers are divided into: 1. Symmetric key algorithms (Private-key cryptography), where the same key is used for encryption and decryption. 2. Asymmetric key algorithms (Public-key cryptography), where two different keys are used for encryption and decryption. The objectives of this work was to develop a modern technique using a combination of transposition and substitution techniques in order to present an efficient encryption design that help to produce secure cipher and can be more reliable . The paper also aimed to demonstrate how FPGAs can address the need for faster recovery. This encryption algorithm targeted for small embedded applications. It was initially designed for software implementations in controllers, smart cards or processors. 2. MATERIALS AND METHODS 2.1 Materials The model design synthesizing and implementing ( i.e Translate Map & Place and Route) VHDL code with FPGA device are completely done on Xilinx –project navigator ,ISE 9.2i . 2.2 Methods In a substitution cipher, the encryption algorithm єk(m) is a substitution function which replaces each mєM (input data) with a corresponding cєC (cipher) The substitution function is parameterized by a secret key k. The decryption algorithm Dk(c) is merely the reverse substitution. In general, the substitution can be given by a mapping [1]:
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 149 And the reverse substitution is just the corresponding inverse mapping The previous substitution function mapping explains the essence of this work. The base of encryption is to use unpredictable methods. 2.3 Algorithm The described design algorithm illustrated in Fig (1) accepts 128 bit input data that is divided into 16( 8-bit) sub-blocks. Two stages of encryption were required to process the accepted data. The design used different procedure for each one. The uses of double encryption stage makes it complex, this provides more authentication on the output cipher. The sequence events of algorithm are applied to each input byte. Fig 1: Algorithm Steps Transposition stage used to improve the design reliability. The used transposition‟s mechanism is described in fig (2). Each byte changes position following the illustrated path in the chart. Fig 2: Transposition chart Fig 3: RTL design blocks In general description the input block is responsible of dividing data into bytes also it performs the transpositions operation, and then data pass through two encryption blocks which consist of a logic combination ,each encryption block has its own key . Finally the output block, this is used to form the output cipher stream. 3. RESULTS The simulation process applied using ISE VHDL simulator in order to ensure that the design is well performed. The test bench process results presented in fig (4) show the inputs and outputs parameters, the simulation used an FPGA device of Spartan3 type. The results accuracy approved the ability of using this design. Device Family: Spatran3 Tools used: o Xilinx ISE 9.2i o ISE VHDL simulator. o Device: xc3s1000-5fg675 3.1 Design Overview The synthesis process used to transform the VHDL code into model design [4] illustrated in fig (3). It divided into blocks each one used to perform a specific function according to their internal logic composition. The design used the resources of the FPGA device. The complete design required about 128 of the 4 input LUTs in addition to 273 IOBs of the available device resources. However the top
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 150 model design view consists of four inputs and a cipher output. A clock unit links all blocks and used to control the inputoutput process. Fig 4: Behavioral simulation By checking the results obtained from fig(4) it was clear obviously that the design works correctly similar to the previous algorithm illustrated in fig(1) . The test accomplished successfully without errors. 3.2 Device Performance The following discussion focuses on the performance of various FPGA devices. Synthesis is carried out using different family‟s types of Vertex and Spartan devices. Tables (1.upto 6) show the execution results of each device. The evaluating gives the opportunity to recognize the available resources of each device. It determines utilization ratio and time summary for each one. It is acknowledged that synthesis results are with some (approx.8) warnings which are allowable [6]. Spartan Devices Performance: Timing Summary: Minimum period: 4.855ns (Maximum Frequency: 205.977MHz) Minimum input arrival time before clock: 1.572ns Maximum output required time after clock: 6.141ns Total delay of the output data path : 6.141ns (5.460ns logic, 0.681ns route). The number of signals not completely routed for this design is: 0 The average connection delay for this design is: 1.078 The maximum PIN delay is: 3.584 The average connection delay on the 10 worst nets is: 3.239 4. DISCUSSIONS To be more reasonable in our evaluating it should be known that other factors such as power consumption and device cost should be account in particular when the evaluating expands to cover other known designs that work in the same field [2]. The implementation results lead to observe that in terms of area requirements It was no doubt that this design generally exhibits the smallest hardware consumption than the implementing design in [5] .Also it should be noted that the implementing design is almost faster and has less delay time compared to [5]. Finally it was known according to [3] that Spartans devices have low cost than Virtex 5. CONCLUSIONS &RECOMMENDATIONS Today‟s connected society requires secure data encryption devices to preserve data privacy and authentication in critical application, this helps for developing more researches works to improve the ordinary using of encryption techniques . This work develops a secure encryption system that used FPGA technology in order to provide fast recovery .The paper studied most of the known encryption methods. The design performance was examined to different families of FPGA devices. Future work can be performed to allow more complexity by using additional techniques such as using one of the keys as a public key and the other can be used as private key. Also expanding keys will be useful. REFERENCES [1]. Douglas. S, „Cryptography: Theory and Practice‟, CRC Press LLC,(1995). [2]. Dimitrios. M and Ioannis. P, Power consumption estimations vs measurements for FPGA-based security cores.In: proceeding of International Conference on Reconfigurable Computing and FPGAs, Chania, Greece, (2008). [3]. Deming.C, Jason.C, and Peichan. P, “ FPGA Design Automation: A Survey”, now Publishers In, (2006). [4]. PONG P. C, „RTL HARDWARE DESIGN USING VHDL Coding for Efficiency, Portability, and Scalability‟ , Cleveland State University, A John Wiley & Sons, INC , (2006 ). [5]. Rabie . A.M , Magdi . S, “ Hardware Implementation of the Stone Matamorphic cipher “ , International Journal of Computer Science & Network Security vol 10 (8):54-60, (2010).
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 151 [6]. Sounak Samanta B.E, „FPGA Implementation of AES Encryption and Decryption,Electronics & Communication Engg, ,Sardar Vallabhbhai National Institute of Technology,surat,( 2002). [7]. Wenbo. M.H, „Modern Cryptography Theory and Practice‟, Packard Company, Prentice Hall PTR ,( 2003).