SlideShare a Scribd company logo
4
Most read
7
Most read
8
Most read
 Internal Guide
Kavyashree Madam
 Project Institution
RV-VLSI
 The Group
 Anand P. T (1yd06ec002)
 Chethan A. S
(1yd10ec033)
 Gireesh K. G
(1yd10ec021)
 Today’s Importance of secure communication systems.
 Requirement of efficient cryptographic algorithm.
 Numerous cryptographic algorithm
 RC6 algorithm -> strong for immunities towards hacking.
 Wide use of RC6, necessity of high performance design.
 Concentration on less delay and logic blocks.
 Primitives roles of the algorithm -> Multipliers & shifters.
 Hence implementation of effective multipliers & shifters.
 Studies suggest a desire on Vedic multiplier & barrel shifter.
 FPGAs with highly attractive hardware options.
 RC6 is a symmetric key block cipher derived from RC5.
 Block size of 128 bits.
 Flexibility of key size.
 No key separation.
 Operators involved are simple in function favourably.
 High speed with minimal code memory.
 provides a solid well tuned margin for security against well known
differential & linear attacks.
 Max potential for parallelism when multiple streams are
processed.
RC6 ENCRYPTION
Plain
Text
Round
keys
Start_E
Reset
Clock
Memory
Vedic
Multiplier
Plain
Text
Ready
Barrel
Shifter
Arithmetic
& Logical
Operators
RC6 DECRYPTION
Memory
Vedic
Multiplier
Barrel
Shifter
Arithmetic
& Logical
Operators
RC6
CRYPTOGRAPHY
64 bit plain text.
Key length is16 bit.
QUESTA SIM for simulation and ALTERA Quartus II for
synthesis.
Hardware implementation on Altera DE2-115 board.
RC6 algorithm basic operations.
1. a + b :integer addition modulo 2w
2. a - b :integer subtraction modulo 2w
3. a ^ b :bitwise exclusive-or of w-bit words
4. a x b :integer multiplication modulo 2w
5. a <<< b :rotate the w-bit word a to the left by the amount
given by the least significant lgw bits of b
6. a >>> b :rotate the w-bit word a to the right by the amount
given by the least significant lgw bits of b
Rc6 algorithm
Rc6 algorithm
Rc6 algorithm
START
Is RESET=1?
Transfer data for Encryption
Is complete byte
transferred=1?
B = B + S [0], D = D + S [1]
for i = 1 to r do
{
t = (B _ (2B + 1)) <<< log w
u = (D _ (2D + 1)) <<<log w
A = ((A _ t) <<<u) + S [2i]
C = ((C _ u) <<<t) + S [2i+ 1]
(A; B; C; D) = (B; C; D; A)
}
A = A + S [2r + 2], C = C + S [2r + 3]
NO
YES
YES
YES
STOP
START
Is Ready_e=1?
Transfer data for Decryption
Is complete byte
transferred=1?
C = C - S [2r + 3], A = A - S [2r + 2]
for i = r downto 1 do
{
(A; B; C; D) = (D; A; B; C)
u = (D * (2D + 1)) <<<log w
t = (B *(2B + 1)) <<<log w
C = ((C – S [2i + 1])>>>t) _ u
A = ((A – S [2i])>>>u) _ t
}
D = D – S [1], B = B – S [0]
NO
NO
YES
YES
YES
STOP
Rc6 algorithm
Rc6 algorithm
 It is clear that by application of Vedic method reduces
power consumption by using less number of logic elements.
 Hence layout area is reduced and high speed of
computation is achieved.
Conventional
method
Vedic method
Total thermal
power dissipation
70.01mv 67.00mv
Core static
thermal power
dissipation
51.77mv 51.77mv
I/O thermal power
dissipation
18.23mv 15.23mv
Advantages
1) Fast and flexible
2) Secure
3) Support 32/64 bit processor
Disadvantages
1) Inter multiplications on rotations.
2) Not universally practical.
 Internet E-Commerce.
 Mobile telephone networks.
 Bank automated teller machines.
 Digital rights managements to restrict the use of copyrights
material.
 Military applications.
 Secured audio & videos transmission with high security.
Among various available popular cryptographic algorithms, it is
seen that RC6 provides batter security & high performance.
RC6 is a compact and simple block cipher.
Our studies reveal that multiplication and shifters are the major
bottlenecks as far as speed of the RC6 cipher is concerned.
Nevertheless, up to a great extent this high performance was
tackled using Vedic multiplier & barrel shifter in our design.
Consequently, the highest Speed/Area ratio can be achieved in
the same.
 It can be worked with higher number of plain text bits & key
for real time operations.
 In this project encryption/decryption cannot start until key
schedule algorithm is completely executed & all sub keys are
generated.
 In algorithm it is seen that keys are needed faster than they are
generated.
 So with extension to this thesis try to start process with key
already generated and parallel generate rest of keys.
THANK YOU
Rc6 algorithm
Rc6 algorithm
Rc6 algorithm
Rc6 algorithm
Rc6 algorithm

More Related Content

PPT
DES (Data Encryption Standard) pressentation
PDF
Elliptic curve cryptography
PPTX
Greedy algorithms
PPTX
Elliptic Curve Cryptography
PDF
Lecture Note-1: Algorithm and Its Properties
PPT
Floyd Warshall Algorithm
PPTX
Topic1 substitution transposition-techniques
DES (Data Encryption Standard) pressentation
Elliptic curve cryptography
Greedy algorithms
Elliptic Curve Cryptography
Lecture Note-1: Algorithm and Its Properties
Floyd Warshall Algorithm
Topic1 substitution transposition-techniques

What's hot (20)

PPT
Elliptical curve cryptography
PPTX
Lecture optimal binary search tree
PPTX
Hash Function
PPT
Real-Time Operating Systems
PPTX
Church Turing Thesis
PPT
block ciphers
PPTX
Segmentation in operating systems
PPT
Peterson Critical Section Problem Solution
PPTX
Cryptographic algorithms
PPT
Monoalphabetic Substitution Cipher
PPTX
Register allocation and assignment
PPT
Parallel processing
PPTX
Fractional Knapsack Problem
PPTX
Diffie Hellman.pptx
PPTX
Finite automata-for-lexical-analysis
PPT
Bellman Ford's Algorithm
PDF
Algorithms Lecture 1: Introduction to Algorithms
PPTX
daa-unit-3-greedy method
PPTX
Stressen's matrix multiplication
Elliptical curve cryptography
Lecture optimal binary search tree
Hash Function
Real-Time Operating Systems
Church Turing Thesis
block ciphers
Segmentation in operating systems
Peterson Critical Section Problem Solution
Cryptographic algorithms
Monoalphabetic Substitution Cipher
Register allocation and assignment
Parallel processing
Fractional Knapsack Problem
Diffie Hellman.pptx
Finite automata-for-lexical-analysis
Bellman Ford's Algorithm
Algorithms Lecture 1: Introduction to Algorithms
daa-unit-3-greedy method
Stressen's matrix multiplication
Ad

Similar to Rc6 algorithm (20)

PDF
Analysis of symmetric key cryptographic algorithms
PDF
Watermarking of JPEG2000 Compressed Images with Improved Encryption
PDF
G04701051058
PDF
International Journal of Computer Science, Engineering and Applications (IJCSEA)
PDF
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
PDF
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
PDF
Js2517181724
PDF
Js2517181724
PDF
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
PDF
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
PPTX
Error control coding techniques
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
PPTX
Remote authentication via biometrics1
PDF
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
PDF
Latency Performance of Encoding with Random Linear Network Coding
PDF
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
PPT
Twofish-Encryption-Algorithm-by-Horatiu-Paul-Stancu (1).ppt
PDF
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
Analysis of symmetric key cryptographic algorithms
Watermarking of JPEG2000 Compressed Images with Improved Encryption
G04701051058
International Journal of Computer Science, Engineering and Applications (IJCSEA)
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
Js2517181724
Js2517181724
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Error control coding techniques
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
Remote authentication via biometrics1
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
Latency Performance of Encoding with Random Linear Network Coding
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
Twofish-Encryption-Algorithm-by-Horatiu-Paul-Stancu (1).ppt
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
Ad

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Sensors and Actuators in IoT Systems using pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Rc6 algorithm

  • 1.  Internal Guide Kavyashree Madam  Project Institution RV-VLSI  The Group  Anand P. T (1yd06ec002)  Chethan A. S (1yd10ec033)  Gireesh K. G (1yd10ec021)
  • 2.  Today’s Importance of secure communication systems.  Requirement of efficient cryptographic algorithm.  Numerous cryptographic algorithm  RC6 algorithm -> strong for immunities towards hacking.  Wide use of RC6, necessity of high performance design.  Concentration on less delay and logic blocks.  Primitives roles of the algorithm -> Multipliers & shifters.  Hence implementation of effective multipliers & shifters.  Studies suggest a desire on Vedic multiplier & barrel shifter.  FPGAs with highly attractive hardware options.
  • 3.  RC6 is a symmetric key block cipher derived from RC5.  Block size of 128 bits.  Flexibility of key size.  No key separation.  Operators involved are simple in function favourably.  High speed with minimal code memory.  provides a solid well tuned margin for security against well known differential & linear attacks.  Max potential for parallelism when multiple streams are processed.
  • 4. RC6 ENCRYPTION Plain Text Round keys Start_E Reset Clock Memory Vedic Multiplier Plain Text Ready Barrel Shifter Arithmetic & Logical Operators RC6 DECRYPTION Memory Vedic Multiplier Barrel Shifter Arithmetic & Logical Operators RC6 CRYPTOGRAPHY
  • 5. 64 bit plain text. Key length is16 bit. QUESTA SIM for simulation and ALTERA Quartus II for synthesis. Hardware implementation on Altera DE2-115 board.
  • 6. RC6 algorithm basic operations. 1. a + b :integer addition modulo 2w 2. a - b :integer subtraction modulo 2w 3. a ^ b :bitwise exclusive-or of w-bit words 4. a x b :integer multiplication modulo 2w 5. a <<< b :rotate the w-bit word a to the left by the amount given by the least significant lgw bits of b 6. a >>> b :rotate the w-bit word a to the right by the amount given by the least significant lgw bits of b
  • 10. START Is RESET=1? Transfer data for Encryption Is complete byte transferred=1? B = B + S [0], D = D + S [1] for i = 1 to r do { t = (B _ (2B + 1)) <<< log w u = (D _ (2D + 1)) <<<log w A = ((A _ t) <<<u) + S [2i] C = ((C _ u) <<<t) + S [2i+ 1] (A; B; C; D) = (B; C; D; A) } A = A + S [2r + 2], C = C + S [2r + 3] NO YES YES YES STOP
  • 11. START Is Ready_e=1? Transfer data for Decryption Is complete byte transferred=1? C = C - S [2r + 3], A = A - S [2r + 2] for i = r downto 1 do { (A; B; C; D) = (D; A; B; C) u = (D * (2D + 1)) <<<log w t = (B *(2B + 1)) <<<log w C = ((C – S [2i + 1])>>>t) _ u A = ((A – S [2i])>>>u) _ t } D = D – S [1], B = B – S [0] NO NO YES YES YES STOP
  • 14.  It is clear that by application of Vedic method reduces power consumption by using less number of logic elements.  Hence layout area is reduced and high speed of computation is achieved. Conventional method Vedic method Total thermal power dissipation 70.01mv 67.00mv Core static thermal power dissipation 51.77mv 51.77mv I/O thermal power dissipation 18.23mv 15.23mv
  • 15. Advantages 1) Fast and flexible 2) Secure 3) Support 32/64 bit processor Disadvantages 1) Inter multiplications on rotations. 2) Not universally practical.
  • 16.  Internet E-Commerce.  Mobile telephone networks.  Bank automated teller machines.  Digital rights managements to restrict the use of copyrights material.  Military applications.  Secured audio & videos transmission with high security.
  • 17. Among various available popular cryptographic algorithms, it is seen that RC6 provides batter security & high performance. RC6 is a compact and simple block cipher. Our studies reveal that multiplication and shifters are the major bottlenecks as far as speed of the RC6 cipher is concerned. Nevertheless, up to a great extent this high performance was tackled using Vedic multiplier & barrel shifter in our design. Consequently, the highest Speed/Area ratio can be achieved in the same.
  • 18.  It can be worked with higher number of plain text bits & key for real time operations.  In this project encryption/decryption cannot start until key schedule algorithm is completely executed & all sub keys are generated.  In algorithm it is seen that keys are needed faster than they are generated.  So with extension to this thesis try to start process with key already generated and parallel generate rest of keys.