SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 526
Design and implementation of 256-bit symmetric key cryptography
algorithm used in the data security written in VHDL
Anwesha Das1,Paresh Kumar Pasayat2
1PG student, Dept. of ETC Engineering, IGIT, Odisha, India
2Assistant Professor, Dept. of ETC Engineering, IGIT, Odisha, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – The proposed paper aims to provide the software
implementation of a cryptography algorithm which is based
on the modified version of the Data Encryption Standard
(DES) algorithm. The original version of DES operates on 64-
bit data with 56-bit cipher key to produce 64-bit encrypted
data. Whereas the proposed work deals with the encryptionof
256-bit original data using 224-bit cipher key to produce256-
bit cipher key. As the key length is 224-bit and the time
required for the encryption is in the range of nanosecond (ns),
the data security algorithm is resistant towards the brute-
force attack and the timing attack respectively. The proposed
work can be implemented in the banking sector,
telecommunication sector and military sector etc.
Key Words: DES, Cipher Key, Brute-force, Timing attack.
1. INTRODUCTION
Cryptography is the process of concealing the content of the
message by the process of encryption. In this technique, the
original message is converted into a message of unreadable
format so that the attacker cannot access the original
message. In the proposed work,theoriginal messageistaken
as 256-bits binary data and the encryption algorithm is
applied on this data using 224-bits cipher key to produce a
binary data having 256-bits. The algorithm is based on the
modified version of the Data EncryptionStandardalgorithm.
The proposed algorithm is different from the existing DES
algorithm in terms of no. of input bits, output bits and the
cipher key bits in addition to the logic of each blocks used to
design the model for the additionof robustness andnewness
to the algorithm.
1.1 Project Model
The project describes the flow chartfortheproposedproject
work. Each number in the model signifies the no. of bit in
the input and output of each unit. The diagrammatic
representation of the proposed work is given as follows:
Fig 1: Project Model
2. LOGIC USED IN THE PROPOSED DESIGN
The logic used in the proposed design has been described in
different steps as follow:
2.1 ENCIPHERMENT ALGORITHM:
Step 1: First, 256-bits Original data also known as plaintext
is fed to the input of the initial permutation unit which
transposes the data randomly to generate 256-bit output.
Step 2: The outputs of initial permutation unit is given tothe
first rounds which produces 256-bit output using a 192-bit
round key generated from a round key generator with 224-
bit cipher key as input.
Step 3: The outputs of first rounds is again given to the
second round which produces 256-bits output using a 192-
bit round key generated from a round key generator with
224-bit cipher key as input.
Step 4: Similarly, step 3 is repeated till the completion of 16-
nos. of round.
Step 5: The output of round-16 is given to the final
permutation which doesthe randomtranspositionofthe bits
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 527
to produce 256-bits output and this output is the desired
256-bits encrypted data.
2.2 ROUND KEY GENERATION ALGORITHM:
The sixteen nos. of 192-bits round keys aregeneratedfroma
single 224-bits cipher key by performing the transposition
and append operations on the cipher key.
2.3 DECIPHERMENT ALGORITHM:
The algorithm for the decryption process can be written in
the reverse order of the encryption algorithm.
3. SIMULATION RESULT AND DISCUSSION
The VHDL code of the proposed work has been simulated
using Xilinx ISE 9.2i software and the desired results have
been obtained.
The simulation result of the encryption process is given as
follows:
Fig 2: Simulation result of the encryption process
The simulation result of the decryption process is given as
follows:
Fig 3: Simulation result of the decryption process
4. CONCLUSION
After doing the proposed work, it is concluded that the work
is best suited in the field of data security to provide
protection to the 256-bits original data from unauthorized
access by the attackers available in the network. It is
resistant to the brute-force attack, timing attack which
makes the algorithm more robust. The combinational path
delay required to convert 256-bits plaintext into 256-bits
ciphertext is 10.763ns which obtained from the Xilinx
software.
REFERENCES
[1] Dr. Sandeep Tayal, Dr. Nipin Gupta, Dr. Pankaj Gupta,
Deepak Goyal, Monika Goyal, “A Review paper on Network
Security and Cryptography”, Advances in Computational
Sciences and Technology, Volume 10, Number 5,pp. 763-
770,2017.
[2] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar,
“An efficient VLSI architecture for data encryption standard
and its FPGA implementation”,VLSISATA,IEEEInternational
Conference,pp.1-5,2016.
[3] W.Stallings,“Cryptography and Network Security”, 2nd
Edition, Prentice Hall.
[4] Douglas L. Perry. “VHDL Programming by Examples”,
TMH.
[5] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData
Encryption Standard using time variable permutations”,
International Conference on Microelectronics
(ICM),IEEE,pp.126-129,2015.
[6] Ramadhan J. Mstafa; Khaled M. Elleithy, “A highly secure
video steganography using Hamming code (7, 4)”, Systems,
Applications and Technology Conference (LISAT), IEEE
Conference,pp.1-6,2014.
[7] Ravikumar M.Raypure, Prof. Vinay Keswani,
“Implementation For Data Hiding Using Visual
Cryptography”, IRJET, Volume: 04, Issue: 07, 2017.
.

More Related Content

PDF
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
PDF
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
PDF
IRJET- Data Encryption and Decryption using RF Module
PDF
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
PDF
Industrial Data Acquisition, Management and Controlling using IoT
PPTX
ZigBee Based Wireless Sensor Network
PPTX
Python urllib
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Data Encryption and Decryption using RF Module
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
Industrial Data Acquisition, Management and Controlling using IoT
ZigBee Based Wireless Sensor Network
Python urllib
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography

What's hot (9)

PPTX
DIY IoT: Raspberry PI 2 + Windows 10 for IoT devices + Microsoft Azure
PDF
Industrial Hazard Monitoring using IOT
PPTX
Wireless network security
PDF
IOT Based Data Monitoring System
PDF
Chapter 1 pdf
PPTX
Big Brother: Kubernetes Edition
PPTX
Usefull code metrics
PPTX
Azure iot
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
DIY IoT: Raspberry PI 2 + Windows 10 for IoT devices + Microsoft Azure
Industrial Hazard Monitoring using IOT
Wireless network security
IOT Based Data Monitoring System
Chapter 1 pdf
Big Brother: Kubernetes Edition
Usefull code metrics
Azure iot
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
Ad

Similar to IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algorithm used in the Data Security Written In VHDL (20)

PDF
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
PDF
Simulation based design and analysis of combined effect of various data secur...
PDF
IRJET- Simulation based design and analysis of combined effect of various ...
PDF
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
PDF
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
PDF
Fpga based encryption design using vhdl
PDF
secure Audio Data Transfer Over Internet Using Steganography
PDF
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
PDF
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
PDF
G05124550
PDF
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
PDF
Design of A New Lightweight Encryption for Embedded Security
PDF
Analysis of symmetric key cryptographic algorithms
PDF
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...
PDF
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
PDF
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
PDF
Emerging Trends In Cryptography And Digital Forensics
PDF
MATLAB Implementation of 128-key length SAFER+ Cipher System
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PDF
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
Simulation based design and analysis of combined effect of various data secur...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
Fpga based encryption design using vhdl
secure Audio Data Transfer Over Internet Using Steganography
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
G05124550
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
Design of A New Lightweight Encryption for Embedded Security
Analysis of symmetric key cryptographic algorithms
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Emerging Trends In Cryptography And Digital Forensics
MATLAB Implementation of 128-key length SAFER+ Cipher System
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
PPTX
Road Safety tips for School Kids by a k maurya.pptx
PPT
Project quality management in manufacturing
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
web development for engineering and engineering
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Internship_Presentation_Final engineering.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
“Next-Gen AI: Trends Reshaping Our World”
PPT
Drone Technology Electronics components_1
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
Road Safety tips for School Kids by a k maurya.pptx
Project quality management in manufacturing
OOP with Java - Java Introduction (Basics)
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
bas. eng. economics group 4 presentation 1.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Lecture Notes Electrical Wiring System Components
web development for engineering and engineering
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Model Code of Practice - Construction Work - 21102022 .pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Internship_Presentation_Final engineering.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
“Next-Gen AI: Trends Reshaping Our World”
Drone Technology Electronics components_1
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)

IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algorithm used in the Data Security Written In VHDL

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 526 Design and implementation of 256-bit symmetric key cryptography algorithm used in the data security written in VHDL Anwesha Das1,Paresh Kumar Pasayat2 1PG student, Dept. of ETC Engineering, IGIT, Odisha, India 2Assistant Professor, Dept. of ETC Engineering, IGIT, Odisha, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – The proposed paper aims to provide the software implementation of a cryptography algorithm which is based on the modified version of the Data Encryption Standard (DES) algorithm. The original version of DES operates on 64- bit data with 56-bit cipher key to produce 64-bit encrypted data. Whereas the proposed work deals with the encryptionof 256-bit original data using 224-bit cipher key to produce256- bit cipher key. As the key length is 224-bit and the time required for the encryption is in the range of nanosecond (ns), the data security algorithm is resistant towards the brute- force attack and the timing attack respectively. The proposed work can be implemented in the banking sector, telecommunication sector and military sector etc. Key Words: DES, Cipher Key, Brute-force, Timing attack. 1. INTRODUCTION Cryptography is the process of concealing the content of the message by the process of encryption. In this technique, the original message is converted into a message of unreadable format so that the attacker cannot access the original message. In the proposed work,theoriginal messageistaken as 256-bits binary data and the encryption algorithm is applied on this data using 224-bits cipher key to produce a binary data having 256-bits. The algorithm is based on the modified version of the Data EncryptionStandardalgorithm. The proposed algorithm is different from the existing DES algorithm in terms of no. of input bits, output bits and the cipher key bits in addition to the logic of each blocks used to design the model for the additionof robustness andnewness to the algorithm. 1.1 Project Model The project describes the flow chartfortheproposedproject work. Each number in the model signifies the no. of bit in the input and output of each unit. The diagrammatic representation of the proposed work is given as follows: Fig 1: Project Model 2. LOGIC USED IN THE PROPOSED DESIGN The logic used in the proposed design has been described in different steps as follow: 2.1 ENCIPHERMENT ALGORITHM: Step 1: First, 256-bits Original data also known as plaintext is fed to the input of the initial permutation unit which transposes the data randomly to generate 256-bit output. Step 2: The outputs of initial permutation unit is given tothe first rounds which produces 256-bit output using a 192-bit round key generated from a round key generator with 224- bit cipher key as input. Step 3: The outputs of first rounds is again given to the second round which produces 256-bits output using a 192- bit round key generated from a round key generator with 224-bit cipher key as input. Step 4: Similarly, step 3 is repeated till the completion of 16- nos. of round. Step 5: The output of round-16 is given to the final permutation which doesthe randomtranspositionofthe bits
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 527 to produce 256-bits output and this output is the desired 256-bits encrypted data. 2.2 ROUND KEY GENERATION ALGORITHM: The sixteen nos. of 192-bits round keys aregeneratedfroma single 224-bits cipher key by performing the transposition and append operations on the cipher key. 2.3 DECIPHERMENT ALGORITHM: The algorithm for the decryption process can be written in the reverse order of the encryption algorithm. 3. SIMULATION RESULT AND DISCUSSION The VHDL code of the proposed work has been simulated using Xilinx ISE 9.2i software and the desired results have been obtained. The simulation result of the encryption process is given as follows: Fig 2: Simulation result of the encryption process The simulation result of the decryption process is given as follows: Fig 3: Simulation result of the decryption process 4. CONCLUSION After doing the proposed work, it is concluded that the work is best suited in the field of data security to provide protection to the 256-bits original data from unauthorized access by the attackers available in the network. It is resistant to the brute-force attack, timing attack which makes the algorithm more robust. The combinational path delay required to convert 256-bits plaintext into 256-bits ciphertext is 10.763ns which obtained from the Xilinx software. REFERENCES [1] Dr. Sandeep Tayal, Dr. Nipin Gupta, Dr. Pankaj Gupta, Deepak Goyal, Monika Goyal, “A Review paper on Network Security and Cryptography”, Advances in Computational Sciences and Technology, Volume 10, Number 5,pp. 763- 770,2017. [2] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar, “An efficient VLSI architecture for data encryption standard and its FPGA implementation”,VLSISATA,IEEEInternational Conference,pp.1-5,2016. [3] W.Stallings,“Cryptography and Network Security”, 2nd Edition, Prentice Hall. [4] Douglas L. Perry. “VHDL Programming by Examples”, TMH. [5] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData Encryption Standard using time variable permutations”, International Conference on Microelectronics (ICM),IEEE,pp.126-129,2015. [6] Ramadhan J. Mstafa; Khaled M. Elleithy, “A highly secure video steganography using Hamming code (7, 4)”, Systems, Applications and Technology Conference (LISAT), IEEE Conference,pp.1-6,2014. [7] Ravikumar M.Raypure, Prof. Vinay Keswani, “Implementation For Data Hiding Using Visual Cryptography”, IRJET, Volume: 04, Issue: 07, 2017. .