SlideShare a Scribd company logo
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013



              HARDWARE IMPLEMENTATION OF
              ALGORITHM FOR CRYPTANALYSIS
                     Harshali Zodpe1 , Prakash Wani2 , Rakesh Mehta3
 1
     Department of Electronics and Telecommunication Engineering, Maharashtra Institute
                                 of Technology, Pune, India
                                      harshaliz1982@gmail.com
 2
     Department of Electronics and Telecommunication Engineering, College of Engineer-
                                      ing, Pune, India
                                            pwwani@gmail.com
                     3
                         Mechatronics Test Equipments (I) Pvt. Ltd., Pune, India
                                      rakesh.mehta57@gmail.com

ABSTRACT

Cryptanalysis of block ciphers involves massive computations which are independent of each other and can
be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low
cost Field Programmable Gate Arrays (FPGA’s), building special purpose hardware for computationally
intensive applications has now become possible. For this the Data Encryption Standard (DES) is used as a
proof of concept. This paper presents the design for Hardware implementation of DES cryptanalysis on
FPGA using exhaustive key search. Two architectures viz. Rolled and Unrolled DES architecture are com-
pared and based on experimental result the Rolled architecture is implemented on FPGA. The aim of this
work is to make cryptanalysis faster and better.

KEYWORDS
Cryptanalysis, FPGA’s, DES, Rolled and Unrolled DES architectures

1. INTRODUCTION

The extensive use of computers and electronic data storage and transmission with the exponential
growth of internet has generated strong demand for a robust security mechanism, and they in turn
depend critically on cryptographic protection. The computer power is also increasing fast with the
change in technology and it is important to assess the strength of deployed cryptographic algo-
rithm.

Cryptanalysis is the science of revealing the hidden data of a cryptographic algorithm or system,
either to get at the data for the own sake or to test the strength of the cryptographic algorithm be-
ing used. Cryptanalysis of ciphers (encrypted information) usually involves massive and parallel
computations. The security parameter (in particular the key length) of almost all practical crypto
algorithms is chosen such that attacks with conventional computers are computationally infeasi-
ble. Such parallel functionality can be realized by special purpose hardware blocks that can be
operated simultaneously, improving the time complexity of the overall computations. But the
high non-recurring engineering cost for Application Specific Integrated Circuits (ASIC’s) had put
most projects for building special purpose hardware for cryptanalysis out of the reach for com-
mercial or research institutions.


DOI:10.5121/ijcis.2013.3102                                                                                 7
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

However, Reconfigurable Computing offers advantages over traditional software and hardware
implementations of computationally intensive algorithms. Reconfigurable computing is based on
using low cost FPGA’s which can be configured after fabrication to take advantage of a hardware
design but still maintain the flexibility of software. Thus Cryptanalytic hardware has now become
a possibility outside government agencies.

Depending on what information the adversary can obtain the different attack scenarios can be
distinguished as Ciphertext-Only attack, Known-Plaintext attack, Chosen-Plaintext attack, Cho-
sen-ciphertext attack, Adaptive Chosen-Plaintext/Ciphertext attack as published in [1].

This paper presents a FPGA based hardware design for cryptanalysis of DES based on known-
plaintext attack using brute force technique. The DES algorithm is chosen for implementation as
it is basic cryptographic algorithm and is used by academicians as a test unit for experimentation.
The idea is to create multiple instances of the key search engine in an FPGA chip to make the
cryptanalysis process faster and provide a better cost performance ratio.

2. HISTORICAL BACKGROUND
Cryptanalysis has a historical background. Cryptanalysis is practiced by a broad range of organi-
zations to test the strength of the cryptosystem being used. The first exhaustive DES key search
machine estimation was proposed by Diffie and Hellman in 1977 [2]. It contained 106 chips, with
an estimated cost of US$ 20 million and a 12 hour expected search time. After few years, a first
detailed hardware design description for a brute force attack was presented by Michael Wiener at
CRYPTO’93 [3]. It was estimated that the machine could be built for less than a million US dol-
lars. The proposed machine consisted of        57, 000 DES chips that could recover a key every
three and half hours. In 1997, a detailed cost estimate for three different approaches for DES key
search, distributed computing, FPGAs and custom ASIC designs, was presented by M. Blaze [4].
In 1998, the Electronic Frontier Foundation (EFF) finally built a DES hardware cracker called
Deep Crack which could perform an exhaustive key search within 56 hours [5]. Their DES crack-
er consisted of 1, 536 custom designed ASIC chips at the material cost of around US$ 250,000
and could search 88 billion keys per second. In 2006, the Cost Optimal Parallel Code Breaker
(COPACOBANA) for DES brute-force attack was built for less than US$ 10,000 [6].
COPACOBANA hosts 120 low-cost FPGAs and is the latest developed cryptanalysis hardware
capable of breaking DES in less than one week on average. With the emergence of newer and
powerful devices, continuous efforts are being made to make cryptanalysis faster and better.

3. DESCRIPTION OF DES ALGORITHM
The Data Encryption Standard (DES) is one of the first commercially developed ciphers. DES
was published as a U.S. Federal Information Processing Standard, FIPS-46 [7]. DES is a block
cipher operating on 64-bit data blocks. The encryption transformation depends on a 56-bit secret
key and consists of sixteen rounds surrounded by two permutation layers. The decryption process
is the same as encryption, except the order of the round keys is reversed as compared to the en-
cryption process as shown in Figure 1.

As seen in Figure1, the first block is initial permutation. It changes the order of the input bits ac-
cording to a fixed permutation. The result is then divided into two equal halves of 32-bit each i.e.
Li and Ri where ‘i’ denotes the round number. In each round, the previous word Ri is fed to a
round function ‘f’ and the result is then XORed to the previous word Li. Both the words are then
swapped and the algorithm proceeds to the next iteration. The round function ‘f’ is key dependent
and involves the following steps. The first step is expansion. Here the 32-bit input word is ex-
panded to 48-bits by duplicating and reordering the right half of the bits. This input is then
                                                                                                      8
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

XORed with the required key depending on the round number in the second step. In the third step,
the 48-bits output from previous step is split into eight 6-bits words which are substituted in eight
parallel 6x4 bit S-boxes. This substitution increases the strength of the cryptosystem. The last step
is permutation. In this step the 32-bit output from previous step is reordered according to a fixed
permutation.




                                    Figure 1- DES Decryption Process

The subkeys (keys generated from the given input key) required for the 16-rounds are calculated
by the key schedule algorithm. Figure 2 shows the key schedule algorithm. The block PC1 of the
key schedule algorithm discards the 8 parity bits from the input 64-bit key and divides the resul-
tant 56-bits into two halves of 28-bit each i.e., Ci and Di. These are cyclically rotated over one
position to the left after rounds 1, 2, 9, 16 and over two positions after all other rounds. The round
keys are then constructed by repeatedly extracting 48-bits from Ci and Di at 48 fixed positions
determined by block PC2. Thus the keys generated are Key1 to Key16 for the 16-rounds. For
decryption process the subkeys have to be applied in reverse order. Hence SRL16 block is used to
reverse the order of subkeys. The SRL16 is an alternative mode for the look-up tables where they
are used as 16-bit shift registers. These shift registers enable delay or latency compensation.




                                                                                                      9
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013




                                    Figure 2 – Key Schedule Algorithm

4. ARCHITECTURAL CONSIDERATIONS FOR HARDWARE
   IMPLEMENTATION

The design is implemented considering architecture options for speed area optimization. For cryp-
tanalysis the ciphertext is deciphered under each key and the result is compared with the known
plaintext. If they are equal, then it is possible that the key tried is the correct key. Thus for crypta-
nalysis first decryption has to be performed with each key. The decryption takes 16-rounds to
decipher the ciphertext. DES algorithm contains an iterative structure. Data is passed through the
same set of steps called ‘round’ 16 times, each time with a different sub-key from the key trans-
formation. The first architecture is implemented using Rolled technique where only one round is
design and using a multiplexer, the same round is used 16 times with different sub-key for each
round as shown in Figure 3. This architecture is area efficient but with lesser throughput.

As seen from Figure 3, the incoming data is passed through the initial permutation. The output
from IP block is then passed 16-times through the round along with the 16 sub-keys generated by
the ‘subkey gen’ block. In order to loop the output back to the input multiplexer is used. The mul-
tiplexer switches the input’s of the data from the previous round and the new input data. The sec-
ond architecture that is implemented is the Unrolled architecture as shown in Figure 4. Unrolling
an iterative loop increases throughput. Here 16 instances are created for 16-rounds. In this design
better throughput can be achieved at the cost of increased area utilization. The throughput can be
further improved by using pipelining.



                                                                                                      10
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013




                           Figure 3 - DES Decryption using Rolled architecture

For pipelining registers are inserted between each step. In a pipelined design the new data can
begin processing before the prior data has finished processing. However, there exists a degree of
pipelining that maximizes the throughput per unit area.




                  Figure 4 - DES Decryption using Unrolled architecture with pipelining



                                                                                                      11
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

5. Cryptanalysis of DES




                           Figure 5 – Block Diagram for Cryptanalysis of DES

This paper presents a FPGA based hardware design for cryptanalysis of DES based on known-
plaintext attack using brute force technique. A known-plaintext attack requires the adversary to
have access to (part of) the plaintext corresponding to the captured ciphertext blocks. In the pro-
posed design using brute force technique, the captured ciphertext block is decrypted with all poss-
ible keys and the resultant plaintext is compared with the know-plaintext. As shown in Figure 5,
the DES Decryption block decrypts the ciphertext and the resultant plaintext is compared with the
known-plaintext. The key for which the resultant plaintext matches with the known plaintext is
considered to be the correct key.

Each DES Decryption block decrypts the ciphertext with different key. Thus with ‘n’ nos. of DES
Decryption blocks ‘n’ different keys can be searched in one clock cycle thereby reducing the time
required for key search by a factor of ‘n’. The no. of DES Decryption blocks ‘n’ depends on the
available logic resources in an FPGA and the logic utilization of one DES Decryption block.

6. IMPLEMENTATION OF DES CRYPTANALYSIS
The aim of the hardware is the probable key search to be accomplished by partitioning the solu-
tion space on the FPGA chip and instantiating multiple instances of the design in parallel. As the
solution space is independent and inter-process communication is hardly required, the key search
time can be reduced by ‘n’ fold for ‘n’ instances of the design in single a FPGA chip.

We have implemented the design in Virtex-4 FPGA chip (xc4vlx100-12ff1148) using Xilinx 13.1
development platform. The design is implemented using both Rolled and Unrolled architecture.
After synthesis of the design incorporating key search engines in a single FPGA along with the
additional logic required for finding the correct key, the device utilization and throughput for both
the architectures are as shown below.




                                                                                                      12
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

6.1. Using Rolled Architecture

The usage of 1,662 slices, 892 slice flip-flops (FF) and 3,187 Look up Tables (LUTs) is reported
by the tool. (3% slices, 0% slice FF and 3% LUT utilization of the xc4vlx100-12ff1148 device
respectively). The throughput achieved for the design is 0.817GBPS with maximum frequency of
230.063MHz.

6.2. Using Unrolled Architecture

The usage of 9,019 slices, 7,614 slice flip-flops and 16,954 LUTs is reported by the tool. (18%
slices, 7% slice FF and 17% LUT utilization of the xc4vlx100-12ff1148 device respectively). The
throughput achieved for the design is 0.874GBPS with maximum frequency of 245.874MHz.

From the above experimental results, the device utilization for design using Rolled architecture is
considerably less as compared to design using Unrolled architecture. Hence the Rolled architec-
ture was selected for implementation. 256 key search instances for the Rolled architecture could
be fit in a single FPGA with a clock frequency of 323.515MHz. With the clock frequency
achieved, the entire key space can be searched in approximately 5 days. A comparative summary
is shown in Table 1 with the results obtained in [6].

                                                            Ours                                [6]
  No. of FPGA’s                          01                                               120
  No. of instances per FPGA              256                                              04
  Device utilization per FPGA            25% Slice registers and 96% Slice LUT’s          ---
  Operating     Frequency        per     323.515MHz                                       100MHz
FPGA
  Time for Exhaustive Key                Approximately 5 days                             Approx.
search                                                                                 8.7 days

                                       Table 1. Implementation Results

7. RESULTS

7.1. Using Rolled Architecture

I/P- plaintext<=x"12cf4d587bf4eb08";
I/P- ciphertext<=x"b6060c26730925bc";
O/P- Key<= x"00000000000001";




                        Figure 6. Simulation result for key= x"00000000000001"
                                                                                                      13
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

  I/P- plaintext<=x"12cf4d587bf4eb08";
  I/P- ciphertext<=x" 91dbf8a0e3f63324";
  O/P- Key<= x"f0000000000011";




                           Figure 7 - Simulation result for key= x"f0000000000011"

Referring to Figures 6-7, using the Rolled architecture with the given plaintext-cipher text pair,
the correct key x"00000000000001" and x"f0000000000011" is obtained at 7,300 ns and 58,500
ns respectively. Using single instance of the key search engine would take months to search the
correct key x"f0000000000011". By running four instances in parallel the search time has consi-
derably reduced.

8. CONCLUSION
This work presents the design for cryptanalysis of DES algorithm based on Rolled architecture
using FPGA. Based on the experimental results it is found that the Rolled architecture requires
less area and can search the entire solution space in less time as compared to the Unrolled archi-
tecture. In this work we could fit 256 instances of key search in a single FPGA, such that the ex-
haustive key search on DES Algorithm can be done in approximately 5 days. Expanding the con-
cept for AES Algorithm to fit maximum instances of the key search engine in a single FPGA and
implementing the design in FPGA is the future work of this paper.

ACKNOWLEDGEMENTS
We would like to thank the entire team from Mechatronics Test Equipments (I) Pvt Ltd, Pune for their val-
uable guidance and support.

9. REFERENCES

[1]   Christophe De Canniere, Alex Biryukov and Bart Preneel, “An introduction to block cipher cryp-
      tanalysis,” Proceedings of The IEEE, Vol. 94, No. 2, pp. 346-356,February 2006.
[2]   W. Diffe and M. Hellman, “Exhaustive cryptanalysis of the NBS Data Encryption Standard,”
      COMPUTER, Vol. 10, No. 6, pp.74-84, June 1977.
[3]   M. J. Wiener, “Efficient DES Key Search,” Crypto ’93, Santa Barbara, California, USA, August
      1993. Reprinted in Practical Cryptography for Data Internetworks, W. Stallings editor, IEEE Com-
      puter Society Press, 1996, pp. 31-79.
[4]   M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener, “Mi-
      nimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,” Tech-nical
      report, Security Protocols Workshop, Cambridge, UK, January 1996. Available at
      http://www.counterpane.com/keylength.html.
[5]   Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics &
      Chip Design. O’Reilly & Associates Inc., July 1998.

                                                                                                        14
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

[6]   S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, and M. Schimmler, “Breaking Ciphers with COPACOBANA
      - A Cost-Optimized Parallel Code Breaker”. In L. Goubin and M. Matsui, editors, Proceedings of the
      Workshop on Cryptograpic Hardware and Embedded Systems (CHES 2006), volume 4249 of LNCS,
      pages             101–118.                 Springer-Verlag,2006.           Available            at
      http://www.copacobana.org/paper/copacobana_CHES2006.pdf
[7]   National Bureau of Standards, FIPS PUB 46, The Data Encryption Standard, Federal Information
      Processing Standard, NIST, U.S. Dept. of Commerce, Jan. 1977.
[8]   B.Schneier, Applied Cryptography, second ed. John Wiley and Sons, 1996.

Authors
Ms.Harshali Zodpe completed her B.E. in Electronics and Communication Engineering from
Visvesvaraya National Institute of Technology, Nagpur, M.E in VLSI Design from Ramdeo-
baba Kamla Nehru College of Engineering, Nagpur University, Nagpur. Her areas of inter-
ests are VLSI, cryptography & Embedded Systems. Currently she is pursuing her Ph.D from
College of Engineering, Pune.

Dr. P.W.Wani has received his M.E. and Ph.D in Electroncis and Telecommunication
from College of Engineering, Pune. His areas of interest are VLSI, Microelectronics and
parallel Processing. He was the dean academics of Pune University. Currently he is
working as a professor in the department of Electroncis and Telecommunication from
College of Engineering, Pune.

Mr. Rakesh Mehta received his B.E from College of Engineering Pune and M.Tech from
IIT, Madras. He has been an entrepreneur for the past 25 years and his areas of expertise
are Digital Design and FPGA based High Speed designs. Currently he is the Director,
Mechatronics Test Equipment and Bitmapper Integration Technologies, Pune.




                                                                                                        15
Ad

Recommended

Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
40520130101005
40520130101005
IAEME Publication
 
G04701051058
G04701051058
ijceronline
 
B03302007012
B03302007012
theijes
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Seddiq Q. Abd Al-Rahman
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Lightweight cryptography
Lightweight cryptography
Shivam Singh
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
ijsrd.com
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
Shilpa ppt
Shilpa ppt
shilpa kanhurkar
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
Hybrid AES DES
Hybrid AES DES
Hardik Manocha
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
IJECEIAES
 
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
IJMER
 
A performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
Formal Verification of Functional Code
Formal Verification of Functional Code
Martin Děcký
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
IJNSA Journal
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
ijcisjournal
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
ijcisjournal
 

More Related Content

What's hot (20)

Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Seddiq Q. Abd Al-Rahman
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Lightweight cryptography
Lightweight cryptography
Shivam Singh
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
ijsrd.com
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
Shilpa ppt
Shilpa ppt
shilpa kanhurkar
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
Hybrid AES DES
Hybrid AES DES
Hardik Manocha
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
IJECEIAES
 
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
IJMER
 
A performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
Formal Verification of Functional Code
Formal Verification of Functional Code
Martin Děcký
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
IJNSA Journal
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Seddiq Q. Abd Al-Rahman
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Lightweight cryptography
Lightweight cryptography
Shivam Singh
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
ijsrd.com
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
IJECEIAES
 
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
IJMER
 
A performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
Formal Verification of Functional Code
Formal Verification of Functional Code
Martin Děcký
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
IJNSA Journal
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 

Viewers also liked (19)

A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
ijcisjournal
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
ijcisjournal
 
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
ijcisjournal
 
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
ijcisjournal
 
Blind Image Quality Assessment with Local Contrast Features
Blind Image Quality Assessment with Local Contrast Features
ijcisjournal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
ijcisjournal
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
ijcisjournal
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
ijcisjournal
 
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
ijcisjournal
 
General Kalman Filter & Speech Enhancement for Speaker Identification
General Kalman Filter & Speech Enhancement for Speaker Identification
ijcisjournal
 
5215ijcis01
5215ijcis01
ijcisjournal
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
ijcisjournal
 
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
ijcisjournal
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
ijcisjournal
 
Penetration testing in agile software
Penetration testing in agile software
ijcisjournal
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
ijcisjournal
 
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
ijcisjournal
 
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
ijcisjournal
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
ijcisjournal
 
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
ijcisjournal
 
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
ijcisjournal
 
Blind Image Quality Assessment with Local Contrast Features
Blind Image Quality Assessment with Local Contrast Features
ijcisjournal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
ijcisjournal
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
ijcisjournal
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
ijcisjournal
 
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
ijcisjournal
 
General Kalman Filter & Speech Enhancement for Speaker Identification
General Kalman Filter & Speech Enhancement for Speaker Identification
ijcisjournal
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
ijcisjournal
 
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
ijcisjournal
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
ijcisjournal
 
Penetration testing in agile software
Penetration testing in agile software
ijcisjournal
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
ijcisjournal
 
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
ijcisjournal
 
Ad

Similar to Hardware Implementation of Algorithm for Cryptanalysis (20)

HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
ijcisjournal
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
cryptography and network security chap 3
cryptography and network security chap 3
Debanjan Bhattacharya
 
Fpga implementation of encryption and decryption algorithm based on aes
Fpga implementation of encryption and decryption algorithm based on aes
eSAT Publishing House
 
Module 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptx
SridharCS7
 
ch03 network security in computer sys.ppt
ch03 network security in computer sys.ppt
ubaidullah75790
 
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee
zmulani8
 
Ch03
Ch03
ssusere796b3
 
Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
International Journal of Science and Research (IJSR)
 
Lecture 05 - 04 Nov 21.pptx
Lecture 05 - 04 Nov 21.pptx
HammadAsghar26
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
section-8.ppt
section-8.ppt
DeepakPrajapati868260
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
Ch03
Ch03
Joe Christensen
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
Symmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
Vaibhav Khanna
 
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Associate Professor in VSB Coimbatore
 
icwet1097
icwet1097
Sapna Agarwal
 
DES.ppt
DES.ppt
RizwanBasha12
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
ijcisjournal
 
cryptography and network security chap 3
cryptography and network security chap 3
Debanjan Bhattacharya
 
Fpga implementation of encryption and decryption algorithm based on aes
Fpga implementation of encryption and decryption algorithm based on aes
eSAT Publishing House
 
Module 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptx
SridharCS7
 
ch03 network security in computer sys.ppt
ch03 network security in computer sys.ppt
ubaidullah75790
 
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee
zmulani8
 
Lecture 05 - 04 Nov 21.pptx
Lecture 05 - 04 Nov 21.pptx
HammadAsghar26
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
Vaibhav Khanna
 
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Associate Professor in VSB Coimbatore
 
Ad

Recently uploaded (20)

GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 

Hardware Implementation of Algorithm for Cryptanalysis

  • 1. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS Harshali Zodpe1 , Prakash Wani2 , Rakesh Mehta3 1 Department of Electronics and Telecommunication Engineering, Maharashtra Institute of Technology, Pune, India [email protected] 2 Department of Electronics and Telecommunication Engineering, College of Engineer- ing, Pune, India [email protected] 3 Mechatronics Test Equipments (I) Pvt. Ltd., Pune, India [email protected] ABSTRACT Cryptanalysis of block ciphers involves massive computations which are independent of each other and can be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low cost Field Programmable Gate Arrays (FPGA’s), building special purpose hardware for computationally intensive applications has now become possible. For this the Data Encryption Standard (DES) is used as a proof of concept. This paper presents the design for Hardware implementation of DES cryptanalysis on FPGA using exhaustive key search. Two architectures viz. Rolled and Unrolled DES architecture are com- pared and based on experimental result the Rolled architecture is implemented on FPGA. The aim of this work is to make cryptanalysis faster and better. KEYWORDS Cryptanalysis, FPGA’s, DES, Rolled and Unrolled DES architectures 1. INTRODUCTION The extensive use of computers and electronic data storage and transmission with the exponential growth of internet has generated strong demand for a robust security mechanism, and they in turn depend critically on cryptographic protection. The computer power is also increasing fast with the change in technology and it is important to assess the strength of deployed cryptographic algo- rithm. Cryptanalysis is the science of revealing the hidden data of a cryptographic algorithm or system, either to get at the data for the own sake or to test the strength of the cryptographic algorithm be- ing used. Cryptanalysis of ciphers (encrypted information) usually involves massive and parallel computations. The security parameter (in particular the key length) of almost all practical crypto algorithms is chosen such that attacks with conventional computers are computationally infeasi- ble. Such parallel functionality can be realized by special purpose hardware blocks that can be operated simultaneously, improving the time complexity of the overall computations. But the high non-recurring engineering cost for Application Specific Integrated Circuits (ASIC’s) had put most projects for building special purpose hardware for cryptanalysis out of the reach for com- mercial or research institutions. DOI:10.5121/ijcis.2013.3102 7
  • 2. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 However, Reconfigurable Computing offers advantages over traditional software and hardware implementations of computationally intensive algorithms. Reconfigurable computing is based on using low cost FPGA’s which can be configured after fabrication to take advantage of a hardware design but still maintain the flexibility of software. Thus Cryptanalytic hardware has now become a possibility outside government agencies. Depending on what information the adversary can obtain the different attack scenarios can be distinguished as Ciphertext-Only attack, Known-Plaintext attack, Chosen-Plaintext attack, Cho- sen-ciphertext attack, Adaptive Chosen-Plaintext/Ciphertext attack as published in [1]. This paper presents a FPGA based hardware design for cryptanalysis of DES based on known- plaintext attack using brute force technique. The DES algorithm is chosen for implementation as it is basic cryptographic algorithm and is used by academicians as a test unit for experimentation. The idea is to create multiple instances of the key search engine in an FPGA chip to make the cryptanalysis process faster and provide a better cost performance ratio. 2. HISTORICAL BACKGROUND Cryptanalysis has a historical background. Cryptanalysis is practiced by a broad range of organi- zations to test the strength of the cryptosystem being used. The first exhaustive DES key search machine estimation was proposed by Diffie and Hellman in 1977 [2]. It contained 106 chips, with an estimated cost of US$ 20 million and a 12 hour expected search time. After few years, a first detailed hardware design description for a brute force attack was presented by Michael Wiener at CRYPTO’93 [3]. It was estimated that the machine could be built for less than a million US dol- lars. The proposed machine consisted of 57, 000 DES chips that could recover a key every three and half hours. In 1997, a detailed cost estimate for three different approaches for DES key search, distributed computing, FPGAs and custom ASIC designs, was presented by M. Blaze [4]. In 1998, the Electronic Frontier Foundation (EFF) finally built a DES hardware cracker called Deep Crack which could perform an exhaustive key search within 56 hours [5]. Their DES crack- er consisted of 1, 536 custom designed ASIC chips at the material cost of around US$ 250,000 and could search 88 billion keys per second. In 2006, the Cost Optimal Parallel Code Breaker (COPACOBANA) for DES brute-force attack was built for less than US$ 10,000 [6]. COPACOBANA hosts 120 low-cost FPGAs and is the latest developed cryptanalysis hardware capable of breaking DES in less than one week on average. With the emergence of newer and powerful devices, continuous efforts are being made to make cryptanalysis faster and better. 3. DESCRIPTION OF DES ALGORITHM The Data Encryption Standard (DES) is one of the first commercially developed ciphers. DES was published as a U.S. Federal Information Processing Standard, FIPS-46 [7]. DES is a block cipher operating on 64-bit data blocks. The encryption transformation depends on a 56-bit secret key and consists of sixteen rounds surrounded by two permutation layers. The decryption process is the same as encryption, except the order of the round keys is reversed as compared to the en- cryption process as shown in Figure 1. As seen in Figure1, the first block is initial permutation. It changes the order of the input bits ac- cording to a fixed permutation. The result is then divided into two equal halves of 32-bit each i.e. Li and Ri where ‘i’ denotes the round number. In each round, the previous word Ri is fed to a round function ‘f’ and the result is then XORed to the previous word Li. Both the words are then swapped and the algorithm proceeds to the next iteration. The round function ‘f’ is key dependent and involves the following steps. The first step is expansion. Here the 32-bit input word is ex- panded to 48-bits by duplicating and reordering the right half of the bits. This input is then 8
  • 3. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 XORed with the required key depending on the round number in the second step. In the third step, the 48-bits output from previous step is split into eight 6-bits words which are substituted in eight parallel 6x4 bit S-boxes. This substitution increases the strength of the cryptosystem. The last step is permutation. In this step the 32-bit output from previous step is reordered according to a fixed permutation. Figure 1- DES Decryption Process The subkeys (keys generated from the given input key) required for the 16-rounds are calculated by the key schedule algorithm. Figure 2 shows the key schedule algorithm. The block PC1 of the key schedule algorithm discards the 8 parity bits from the input 64-bit key and divides the resul- tant 56-bits into two halves of 28-bit each i.e., Ci and Di. These are cyclically rotated over one position to the left after rounds 1, 2, 9, 16 and over two positions after all other rounds. The round keys are then constructed by repeatedly extracting 48-bits from Ci and Di at 48 fixed positions determined by block PC2. Thus the keys generated are Key1 to Key16 for the 16-rounds. For decryption process the subkeys have to be applied in reverse order. Hence SRL16 block is used to reverse the order of subkeys. The SRL16 is an alternative mode for the look-up tables where they are used as 16-bit shift registers. These shift registers enable delay or latency compensation. 9
  • 4. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 Figure 2 – Key Schedule Algorithm 4. ARCHITECTURAL CONSIDERATIONS FOR HARDWARE IMPLEMENTATION The design is implemented considering architecture options for speed area optimization. For cryp- tanalysis the ciphertext is deciphered under each key and the result is compared with the known plaintext. If they are equal, then it is possible that the key tried is the correct key. Thus for crypta- nalysis first decryption has to be performed with each key. The decryption takes 16-rounds to decipher the ciphertext. DES algorithm contains an iterative structure. Data is passed through the same set of steps called ‘round’ 16 times, each time with a different sub-key from the key trans- formation. The first architecture is implemented using Rolled technique where only one round is design and using a multiplexer, the same round is used 16 times with different sub-key for each round as shown in Figure 3. This architecture is area efficient but with lesser throughput. As seen from Figure 3, the incoming data is passed through the initial permutation. The output from IP block is then passed 16-times through the round along with the 16 sub-keys generated by the ‘subkey gen’ block. In order to loop the output back to the input multiplexer is used. The mul- tiplexer switches the input’s of the data from the previous round and the new input data. The sec- ond architecture that is implemented is the Unrolled architecture as shown in Figure 4. Unrolling an iterative loop increases throughput. Here 16 instances are created for 16-rounds. In this design better throughput can be achieved at the cost of increased area utilization. The throughput can be further improved by using pipelining. 10
  • 5. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 Figure 3 - DES Decryption using Rolled architecture For pipelining registers are inserted between each step. In a pipelined design the new data can begin processing before the prior data has finished processing. However, there exists a degree of pipelining that maximizes the throughput per unit area. Figure 4 - DES Decryption using Unrolled architecture with pipelining 11
  • 6. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 5. Cryptanalysis of DES Figure 5 – Block Diagram for Cryptanalysis of DES This paper presents a FPGA based hardware design for cryptanalysis of DES based on known- plaintext attack using brute force technique. A known-plaintext attack requires the adversary to have access to (part of) the plaintext corresponding to the captured ciphertext blocks. In the pro- posed design using brute force technique, the captured ciphertext block is decrypted with all poss- ible keys and the resultant plaintext is compared with the know-plaintext. As shown in Figure 5, the DES Decryption block decrypts the ciphertext and the resultant plaintext is compared with the known-plaintext. The key for which the resultant plaintext matches with the known plaintext is considered to be the correct key. Each DES Decryption block decrypts the ciphertext with different key. Thus with ‘n’ nos. of DES Decryption blocks ‘n’ different keys can be searched in one clock cycle thereby reducing the time required for key search by a factor of ‘n’. The no. of DES Decryption blocks ‘n’ depends on the available logic resources in an FPGA and the logic utilization of one DES Decryption block. 6. IMPLEMENTATION OF DES CRYPTANALYSIS The aim of the hardware is the probable key search to be accomplished by partitioning the solu- tion space on the FPGA chip and instantiating multiple instances of the design in parallel. As the solution space is independent and inter-process communication is hardly required, the key search time can be reduced by ‘n’ fold for ‘n’ instances of the design in single a FPGA chip. We have implemented the design in Virtex-4 FPGA chip (xc4vlx100-12ff1148) using Xilinx 13.1 development platform. The design is implemented using both Rolled and Unrolled architecture. After synthesis of the design incorporating key search engines in a single FPGA along with the additional logic required for finding the correct key, the device utilization and throughput for both the architectures are as shown below. 12
  • 7. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 6.1. Using Rolled Architecture The usage of 1,662 slices, 892 slice flip-flops (FF) and 3,187 Look up Tables (LUTs) is reported by the tool. (3% slices, 0% slice FF and 3% LUT utilization of the xc4vlx100-12ff1148 device respectively). The throughput achieved for the design is 0.817GBPS with maximum frequency of 230.063MHz. 6.2. Using Unrolled Architecture The usage of 9,019 slices, 7,614 slice flip-flops and 16,954 LUTs is reported by the tool. (18% slices, 7% slice FF and 17% LUT utilization of the xc4vlx100-12ff1148 device respectively). The throughput achieved for the design is 0.874GBPS with maximum frequency of 245.874MHz. From the above experimental results, the device utilization for design using Rolled architecture is considerably less as compared to design using Unrolled architecture. Hence the Rolled architec- ture was selected for implementation. 256 key search instances for the Rolled architecture could be fit in a single FPGA with a clock frequency of 323.515MHz. With the clock frequency achieved, the entire key space can be searched in approximately 5 days. A comparative summary is shown in Table 1 with the results obtained in [6]. Ours [6] No. of FPGA’s 01 120 No. of instances per FPGA 256 04 Device utilization per FPGA 25% Slice registers and 96% Slice LUT’s --- Operating Frequency per 323.515MHz 100MHz FPGA Time for Exhaustive Key Approximately 5 days Approx. search 8.7 days Table 1. Implementation Results 7. RESULTS 7.1. Using Rolled Architecture I/P- plaintext<=x"12cf4d587bf4eb08"; I/P- ciphertext<=x"b6060c26730925bc"; O/P- Key<= x"00000000000001"; Figure 6. Simulation result for key= x"00000000000001" 13
  • 8. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 I/P- plaintext<=x"12cf4d587bf4eb08"; I/P- ciphertext<=x" 91dbf8a0e3f63324"; O/P- Key<= x"f0000000000011"; Figure 7 - Simulation result for key= x"f0000000000011" Referring to Figures 6-7, using the Rolled architecture with the given plaintext-cipher text pair, the correct key x"00000000000001" and x"f0000000000011" is obtained at 7,300 ns and 58,500 ns respectively. Using single instance of the key search engine would take months to search the correct key x"f0000000000011". By running four instances in parallel the search time has consi- derably reduced. 8. CONCLUSION This work presents the design for cryptanalysis of DES algorithm based on Rolled architecture using FPGA. Based on the experimental results it is found that the Rolled architecture requires less area and can search the entire solution space in less time as compared to the Unrolled archi- tecture. In this work we could fit 256 instances of key search in a single FPGA, such that the ex- haustive key search on DES Algorithm can be done in approximately 5 days. Expanding the con- cept for AES Algorithm to fit maximum instances of the key search engine in a single FPGA and implementing the design in FPGA is the future work of this paper. ACKNOWLEDGEMENTS We would like to thank the entire team from Mechatronics Test Equipments (I) Pvt Ltd, Pune for their val- uable guidance and support. 9. REFERENCES [1] Christophe De Canniere, Alex Biryukov and Bart Preneel, “An introduction to block cipher cryp- tanalysis,” Proceedings of The IEEE, Vol. 94, No. 2, pp. 346-356,February 2006. [2] W. Diffe and M. Hellman, “Exhaustive cryptanalysis of the NBS Data Encryption Standard,” COMPUTER, Vol. 10, No. 6, pp.74-84, June 1977. [3] M. J. Wiener, “Efficient DES Key Search,” Crypto ’93, Santa Barbara, California, USA, August 1993. Reprinted in Practical Cryptography for Data Internetworks, W. Stallings editor, IEEE Com- puter Society Press, 1996, pp. 31-79. [4] M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener, “Mi- nimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,” Tech-nical report, Security Protocols Workshop, Cambridge, UK, January 1996. Available at http://www.counterpane.com/keylength.html. [5] Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. O’Reilly & Associates Inc., July 1998. 14
  • 9. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 [6] S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, and M. Schimmler, “Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker”. In L. Goubin and M. Matsui, editors, Proceedings of the Workshop on Cryptograpic Hardware and Embedded Systems (CHES 2006), volume 4249 of LNCS, pages 101–118. Springer-Verlag,2006. Available at http://www.copacobana.org/paper/copacobana_CHES2006.pdf [7] National Bureau of Standards, FIPS PUB 46, The Data Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, Jan. 1977. [8] B.Schneier, Applied Cryptography, second ed. John Wiley and Sons, 1996. Authors Ms.Harshali Zodpe completed her B.E. in Electronics and Communication Engineering from Visvesvaraya National Institute of Technology, Nagpur, M.E in VLSI Design from Ramdeo- baba Kamla Nehru College of Engineering, Nagpur University, Nagpur. Her areas of inter- ests are VLSI, cryptography & Embedded Systems. Currently she is pursuing her Ph.D from College of Engineering, Pune. Dr. P.W.Wani has received his M.E. and Ph.D in Electroncis and Telecommunication from College of Engineering, Pune. His areas of interest are VLSI, Microelectronics and parallel Processing. He was the dean academics of Pune University. Currently he is working as a professor in the department of Electroncis and Telecommunication from College of Engineering, Pune. Mr. Rakesh Mehta received his B.E from College of Engineering Pune and M.Tech from IIT, Madras. He has been an entrepreneur for the past 25 years and his areas of expertise are Digital Design and FPGA based High Speed designs. Currently he is the Director, Mechatronics Test Equipment and Bitmapper Integration Technologies, Pune. 15