SlideShare a Scribd company logo
1 of 24
 Internal Guide
Kavyashree Madam
 Project Institution
RV-VLSI
 The Group
 Anand P. T (1yd06ec002)
 Chethan A. S
(1yd10ec033)
 Gireesh K. G
(1yd10ec021)
 Today’s Importance of secure communication systems.
 Requirement of efficient cryptographic algorithm.
 Numerous cryptographic algorithm
 RC6 algorithm -> strong for immunities towards hacking.
 Wide use of RC6, necessity of high performance design.
 Concentration on less delay and logic blocks.
 Primitives roles of the algorithm -> Multipliers & shifters.
 Hence implementation of effective multipliers & shifters.
 Studies suggest a desire on Vedic multiplier & barrel shifter.
 FPGAs with highly attractive hardware options.
 RC6 is a symmetric key block cipher derived from RC5.
 Block size of 128 bits.
 Flexibility of key size.
 No key separation.
 Operators involved are simple in function favourably.
 High speed with minimal code memory.
 provides a solid well tuned margin for security against well known
differential & linear attacks.
 Max potential for parallelism when multiple streams are
processed.
RC6 ENCRYPTION
Plain
Text
Round
keys
Start_E
Reset
Clock
Memory
Vedic
Multiplier
Plain
Text
Ready
Barrel
Shifter
Arithmetic
& Logical
Operators
RC6 DECRYPTION
Memory
Vedic
Multiplier
Barrel
Shifter
Arithmetic
& Logical
Operators
RC6
CRYPTOGRAPHY
64 bit plain text.
Key length is16 bit.
QUESTA SIM for simulation and ALTERA Quartus II for
synthesis.
Hardware implementation on Altera DE2-115 board.
RC6 algorithm basic operations.
1. a + b :integer addition modulo 2w
2. a - b :integer subtraction modulo 2w
3. a ^ b :bitwise exclusive-or of w-bit words
4. a x b :integer multiplication modulo 2w
5. a <<< b :rotate the w-bit word a to the left by the amount
given by the least significant lgw bits of b
6. a >>> b :rotate the w-bit word a to the right by the amount
given by the least significant lgw bits of b
START
Is RESET=1?
Transfer data for Encryption
Is complete byte
transferred=1?
B = B + S [0], D = D + S [1]
for i = 1 to r do
{
t = (B _ (2B + 1)) <<< log w
u = (D _ (2D + 1)) <<<log w
A = ((A _ t) <<<u) + S [2i]
C = ((C _ u) <<<t) + S [2i+ 1]
(A; B; C; D) = (B; C; D; A)
}
A = A + S [2r + 2], C = C + S [2r + 3]
NO
YES
YES
YES
STOP
START
Is Ready_e=1?
Transfer data for Decryption
Is complete byte
transferred=1?
C = C - S [2r + 3], A = A - S [2r + 2]
for i = r downto 1 do
{
(A; B; C; D) = (D; A; B; C)
u = (D * (2D + 1)) <<<log w
t = (B *(2B + 1)) <<<log w
C = ((C – S [2i + 1])>>>t) _ u
A = ((A – S [2i])>>>u) _ t
}
D = D – S [1], B = B – S [0]
NO
NO
YES
YES
YES
STOP
 It is clear that by application of Vedic method reduces
power consumption by using less number of logic elements.
 Hence layout area is reduced and high speed of
computation is achieved.
Conventional
method
Vedic method
Total thermal
power dissipation
70.01mv 67.00mv
Core static
thermal power
dissipation
51.77mv 51.77mv
I/O thermal power
dissipation
18.23mv 15.23mv
Advantages
1) Fast and flexible
2) Secure
3) Support 32/64 bit processor
Disadvantages
1) Inter multiplications on rotations.
2) Not universally practical.
 Internet E-Commerce.
 Mobile telephone networks.
 Bank automated teller machines.
 Digital rights managements to restrict the use of copyrights
material.
 Military applications.
 Secured audio & videos transmission with high security.
Among various available popular cryptographic algorithms, it is
seen that RC6 provides batter security & high performance.
RC6 is a compact and simple block cipher.
Our studies reveal that multiplication and shifters are the major
bottlenecks as far as speed of the RC6 cipher is concerned.
Nevertheless, up to a great extent this high performance was
tackled using Vedic multiplier & barrel shifter in our design.
Consequently, the highest Speed/Area ratio can be achieved in
the same.
 It can be worked with higher number of plain text bits & key
for real time operations.
 In this project encryption/decryption cannot start until key
schedule algorithm is completely executed & all sub keys are
generated.
 In algorithm it is seen that keys are needed faster than they are
generated.
 So with extension to this thesis try to start process with key
already generated and parallel generate rest of keys.
THANK YOU
Rc6 algorithm
Rc6 algorithm
Rc6 algorithm
Rc6 algorithm
Rc6 algorithm

More Related Content

What's hot

Soft Eng - Software Process
Soft  Eng - Software ProcessSoft  Eng - Software Process
Soft Eng - Software Process
Jomel Penalba
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
anusachu .
 

What's hot (20)

SDLC - Software Development Life Cycle
SDLC - Software Development Life CycleSDLC - Software Development Life Cycle
SDLC - Software Development Life Cycle
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Key management
Key managementKey management
Key management
 
OLTP-Bench
OLTP-BenchOLTP-Bench
OLTP-Bench
 
Multichannel User Interfaces
Multichannel User InterfacesMultichannel User Interfaces
Multichannel User Interfaces
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Hierarchical architecture
Hierarchical architectureHierarchical architecture
Hierarchical architecture
 
Soft Eng - Software Process
Soft  Eng - Software ProcessSoft  Eng - Software Process
Soft Eng - Software Process
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Introduction To Software Quality Assurance
Introduction To Software Quality AssuranceIntroduction To Software Quality Assurance
Introduction To Software Quality Assurance
 
13 software metrics
13 software metrics13 software metrics
13 software metrics
 
Managment spectrum
Managment spectrumManagment spectrum
Managment spectrum
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Security audit
Security auditSecurity audit
Security audit
 

Similar to Rc6 algorithm

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
my.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxmy.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptx
halosidiq1
 

Similar to Rc6 algorithm (20)

Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
Watermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved EncryptionWatermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved Encryption
 
G04701051058
G04701051058G04701051058
G04701051058
 
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
11
1111
11
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
Latency Performance of Encoding with Random Linear Network Coding
Latency Performance of Encoding with Random Linear Network CodingLatency Performance of Encoding with Random Linear Network Coding
Latency Performance of Encoding with Random Linear Network Coding
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
my.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxmy.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptx
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Rc6 algorithm

  • 1.  Internal Guide Kavyashree Madam  Project Institution RV-VLSI  The Group  Anand P. T (1yd06ec002)  Chethan A. S (1yd10ec033)  Gireesh K. G (1yd10ec021)
  • 2.  Today’s Importance of secure communication systems.  Requirement of efficient cryptographic algorithm.  Numerous cryptographic algorithm  RC6 algorithm -> strong for immunities towards hacking.  Wide use of RC6, necessity of high performance design.  Concentration on less delay and logic blocks.  Primitives roles of the algorithm -> Multipliers & shifters.  Hence implementation of effective multipliers & shifters.  Studies suggest a desire on Vedic multiplier & barrel shifter.  FPGAs with highly attractive hardware options.
  • 3.  RC6 is a symmetric key block cipher derived from RC5.  Block size of 128 bits.  Flexibility of key size.  No key separation.  Operators involved are simple in function favourably.  High speed with minimal code memory.  provides a solid well tuned margin for security against well known differential & linear attacks.  Max potential for parallelism when multiple streams are processed.
  • 4. RC6 ENCRYPTION Plain Text Round keys Start_E Reset Clock Memory Vedic Multiplier Plain Text Ready Barrel Shifter Arithmetic & Logical Operators RC6 DECRYPTION Memory Vedic Multiplier Barrel Shifter Arithmetic & Logical Operators RC6 CRYPTOGRAPHY
  • 5. 64 bit plain text. Key length is16 bit. QUESTA SIM for simulation and ALTERA Quartus II for synthesis. Hardware implementation on Altera DE2-115 board.
  • 6. RC6 algorithm basic operations. 1. a + b :integer addition modulo 2w 2. a - b :integer subtraction modulo 2w 3. a ^ b :bitwise exclusive-or of w-bit words 4. a x b :integer multiplication modulo 2w 5. a <<< b :rotate the w-bit word a to the left by the amount given by the least significant lgw bits of b 6. a >>> b :rotate the w-bit word a to the right by the amount given by the least significant lgw bits of b
  • 7.
  • 8.
  • 9.
  • 10. START Is RESET=1? Transfer data for Encryption Is complete byte transferred=1? B = B + S [0], D = D + S [1] for i = 1 to r do { t = (B _ (2B + 1)) <<< log w u = (D _ (2D + 1)) <<<log w A = ((A _ t) <<<u) + S [2i] C = ((C _ u) <<<t) + S [2i+ 1] (A; B; C; D) = (B; C; D; A) } A = A + S [2r + 2], C = C + S [2r + 3] NO YES YES YES STOP
  • 11. START Is Ready_e=1? Transfer data for Decryption Is complete byte transferred=1? C = C - S [2r + 3], A = A - S [2r + 2] for i = r downto 1 do { (A; B; C; D) = (D; A; B; C) u = (D * (2D + 1)) <<<log w t = (B *(2B + 1)) <<<log w C = ((C – S [2i + 1])>>>t) _ u A = ((A – S [2i])>>>u) _ t } D = D – S [1], B = B – S [0] NO NO YES YES YES STOP
  • 12.
  • 13.
  • 14.  It is clear that by application of Vedic method reduces power consumption by using less number of logic elements.  Hence layout area is reduced and high speed of computation is achieved. Conventional method Vedic method Total thermal power dissipation 70.01mv 67.00mv Core static thermal power dissipation 51.77mv 51.77mv I/O thermal power dissipation 18.23mv 15.23mv
  • 15. Advantages 1) Fast and flexible 2) Secure 3) Support 32/64 bit processor Disadvantages 1) Inter multiplications on rotations. 2) Not universally practical.
  • 16.  Internet E-Commerce.  Mobile telephone networks.  Bank automated teller machines.  Digital rights managements to restrict the use of copyrights material.  Military applications.  Secured audio & videos transmission with high security.
  • 17. Among various available popular cryptographic algorithms, it is seen that RC6 provides batter security & high performance. RC6 is a compact and simple block cipher. Our studies reveal that multiplication and shifters are the major bottlenecks as far as speed of the RC6 cipher is concerned. Nevertheless, up to a great extent this high performance was tackled using Vedic multiplier & barrel shifter in our design. Consequently, the highest Speed/Area ratio can be achieved in the same.
  • 18.  It can be worked with higher number of plain text bits & key for real time operations.  In this project encryption/decryption cannot start until key schedule algorithm is completely executed & all sub keys are generated.  In algorithm it is seen that keys are needed faster than they are generated.  So with extension to this thesis try to start process with key already generated and parallel generate rest of keys.