SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 5, October 2018, pp. 3544~3549
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5.pp3544-3549  3544
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Comparison of AES and DES Algorithms Implemented on
Virtex-6 FPGA and Microblaze Soft Core Processor
G. Renuka1
, V. Usha Shree2
, P. Chandra Sekhar Reddy3
1
Department of Electronics and Communication Engineering, S R Engineering College, Warangal, Telangana, India
2
Department of Electronics and Communication Engineering, JBREC, Hyderabad, Telangana, India
3
Department of Electronics and Communication Engineering, JNTUH, Kukatpally, Hyderabad, Telangana, India
Article Info ABSTRACT
Article history:
Received Apr 21, 2018
Revised Jul 21, 2018
Accepted Jul 28, 2016
Encryption algorithms play a dominant role in preventing unauthorized
access to important data. This paper focus on the implementations of Data
Encryption Standard (DES) and Advanced Encryption Standard (AES)
algorithms on Microblaze soft core Processor and also their implementations
on XC6VLX240t FPGA using Verilog Hardware Description language. This
paper also gives a comparison of the issues related to the hardware and
software implementations of the two cryptographic algorithms.Keyword:
Advanced encryption standard
Data encryption standard
FPGA
Microblaze
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
G. Renuka,
Departement of Electronics and Communication Engineering,
S R Engineering College (Autonomous),
Warangal, Telangana, India.
Email: renuka_g@srecwarangal.ac.in
1. INTRODUCTION
Data encryption Standard (DES) [1]-[3] is adopted in 1977 by NIST (National Institute of
Standards & Technology as Federal Information Processing Standard 46 (FIPS PUB 46). DES encrypts the
data of 64 bits using 56 bit key length into 64 bit cipher text. Figure 1 shows the general description of the
DES algorithm for encryption. The encryption is carried out by first doing the initial permutation and then it
is followed by 16 rounds consisting of permutation and substitution functions. Finally the intermediate output
pass through the inverse initial permutation.
For generating the 16 48-bit keys that are used in each of the 16 rounds, the 64-bit key is used as the
input to the algorithm. It is then passed to the initial permutation (PC1). The sub key is produced by circular
left shifts and permutation function2 (PC2).The 64-bit plain text after initial permutation is divided into left
(L) and right (R) halves of 32-bit quantities. The right half is first expanded using expander and then xored
with key (Ki). It is then passed through the s-boxes and the output is then permutated and xored with the left
half to produce the right half for the next round. The left half is swapped with the right half to produce the
left half for the next round.
The decryption process uses the same encryption algorithm but the sub keys are applied in reverse
order.In July 1998 DES has been proved insecure, when Electronic frontier Foundation (EFF) has announced
that it has broken DES.The search for the more secure algorithm has given birth to a new encryption
algorithm called Advanced Encryption Standard (AES) (FIPS PUB 197) [4] developed by Dr Vincent Rijmen
and Dr. Joan Daemen .It is also called Rijndael algorithm named after its developers.
Int J Elec & Comp Eng ISSN: 2088-8708 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze … (G. Renuka)
3545
Figure 1. General structure of DES algorithm
AES uses block length of 128 bits of data and the key length be independently specified to be
128,192 and 256 bits. The algorithm consists of 10 rounds as shown in the Figure 2, for a key length of
128 bits. Unlike DES, AES does not use a feistel structure.Every round of AES comprises of 4 stages-
substitute bytes, Mix columns, shift rows and add round key, except the last round which does not contain the
mix column stage.
Figure 2. AES algorithm with key length of 128 bits
Initially the 128 bit key is xored with plain text in Add Round Key stage. The 128 bit data is
depicted as a square matrix of bytes called as state. The 16 bytes are arranged as first four bytes as the first
column, second four bytes as second column and so on. The first stage of substitute bytes uses a
16x16 matrix byte values called s-boxes. Each and every individual byte of the state is mapped into a new
byte which is obtained by the intersection of row and column elements. For decryption inverse s-box is taken
for substitute byte transformation. In the shift row transformation, the first row is of the state is unchanged
and the second row undergoes one byte circular left shift and the third row undergoes two byte circular left
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3544 – 3549
3546
shift and the fourth row undergoes a three byte circular left shifts. The decryption process uses the Inverse
shift row transformation which performs circular right shift for the respective rows.The mix column
transformation is carried out by performing matrix multiplication on the state. In the Add round key
transformation the state is xored with the expanded key.
2. OVERVIEW OF MICROBLAZE PROCESSOR
The Microblaze is a soft core processor. It is designed for Xilinx FPGAs from Xilinx [5]. It is
implemented entirely using logic fabric of Xilinx FPGAs. Microblaze is an embedded soft RISC processor
which uses 32-bit instruction word, 32-bit address and data buses, 32 registers each of width 32-bit,
Big-endian format with three or five pipeline stages. It uses two buses in Harvard Architecture, PLB
(processor Local Bus) and LMB (Local Memory Bus). It has dedicated unidirectional point-to-point data
streaming interfaces. It also supports up to 16 FSLs (Fast Simplex Links) with dedicated Cache Link ports.
Figure 3 shows the microblaze core block diagram.
Figure 3. Microblaze core block diagram
The ALU consist of hardware multipliers/DSP48, Floating Point Unit (FPU), Barrel shifter. The
FPU implements IEEE 754 single-precision, floating-point standards supporting addition, multiplication,
division, comparison and subtraction. The processor includes Instruction decoder, program counter and
Instruction cache.
3. XILINX PLATFORM STUDIO
The Xilinx Platform Studio (XPS), it is used for developing the hardware portion of the embedded
processor system. Xilinx Embedded Development Kit (EDK) [6] is associate integrated software system tool
suite.A usual embedded system [8] style project involves: hardware platform making, hardware platform
verification (simulation), software system platform construction, software system application creation, and
verification.
Xilinx Platform Studio package Development Kit (SDK) is in Association with Nursing integrated
development atmosphere, complimentary to XPS, that's used for C/C++ embedded package application
construction and verification. SDK is made on the Eclipse open source framework. Soft Development Kit
(SDK) may be a suite of tools that allows you to style a package application for elite Soft IP Cores within the
Xilinx Embedded Development Kit (EDK).The package application will be written during a "C or C++" then
the entire embedded processor system for user application are finished, else correct & download the bit file
into FPGA. Then FPGA behaves like processor implemented on it in a Xilinx Field Programmable Gate
Array (FPGA) device.
Int J Elec & Comp Eng ISSN: 2088-8708 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze … (G. Renuka)
3547
4. EXPERIMENTAL SETUP
The AES and DES algorithms are described using Verilog [7]. Synthesis and Place & Route is done
using Xilinx ISE 14.5. The device used for implementation is Xilinx Virtex-6 XC6VLX240t FPGA [8].
Table 1 summarizes the configuration of FPGA.
Table 1. Configuration of FPGA
Family Virtex-6
Device XC6VLX240T
Package FF1156
Speed grade -1
There are many soft core processors available like PowerPC [9], NIOS3 [10], LEON3 [11] and
Microblaze [12], [13]. We have chosen Xilinx Microblaze for our implementations. The designs are created
with Xilinx Platform Studio (XPS) as shown in the Figure 4.
Figure 4. System assembly view for soft core processor
The programs for AES and DES are written using C code. They are compiled in SDK (Software
Development Kit) [14]. The SDK provides a platform for applications targeted for embedded Microblaze.
5. RESULTS AND ANALYSIS
5.1. Performance of DES algorithm
The results of the DES algorithms implemented on Xilinx Microblaze are shown in Figure 5 and the
simulation results of DES are shown in Figure 6.
Figure 5. Results of DES output seen through HyperTerminal
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3544 – 3549
3548
Figure 6. Simulation of 128 bit DES encryption
5.2. Performance of AES algorithm
The results of the AES algorithms implemented on Xilinx Microblaze are shown in Figure 7 and the
Simulation results of AES are in Figure 8.
Figure 7. Results of AES output seen through HyperTerminal
Figure 8. Simulation of 128 bit AES encryption
Int J Elec & Comp Eng ISSN: 2088-8708 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze … (G. Renuka)
3549
The Table 2 summerises the implementation results of AES and DES algorithms.
Table 2. Comparision of AES and DES Algorithms
No of slices used Max. freq(MHz)
AES
algorithm
using verilog
1456 181.752
DES
algorithm
using verilog
450 264.896
AES
algorithm
using
microblaze
12,611 100.664
6. CONCLUSION
Although DES is replaced by AES, the study of DES algorithm provides us with an insight in
understanding the principles used in symmetric ciphers. A comparison of both implementations reveals that a
direct Verilog implementation gives a better speed and area option rather then implementing in the soft core
Microblaze processor. But the design effort to implement the algorithms on Microblaze is comparatively less
than the direct Verilog implementation. Therefore, a tradeoff has to be made between the design effort, area
and speed optimizations when choosing the options for various implementations.
REFERENCES
[1] “Data encryption standard (DES)”, National Bureau of Standards (U. S.), Federal Information Processing Standards
Publication 46, National Technical Information Service,Springfield, VA, Apr. 1977.
[2] W. Stallings, “Cryptography and Network Security: Principles and Practice”, 4th ed, Prentice-Hall, 2006
[3] Baker, W, “Introduction to the Analysis of the Data Encryption Standard (DES) Laguna Hills”, CA: Aegean Park
Presss, 1991.
[4] Daemen, J and Rijmen, V, A Specification for The AES Algorithm.NIST (National Institute of Standardsand
Technology)http://csrc.nist.gov/archive/aes/rijndael/wsdindex.html, 2010.
[5] www.xilinx.com/
[6] Xilinx: Getting Started with the Virtex-6 FPGA ML605 Embedded KitUG730 (v1.1) June 14, 2010
[7] Samir Palnitkar, “Verilog HDL, A Guide to Digital Design and Synthesis”, Prentice Hall, 2003
[8] Xilinx: Embedded System Tools Reference Guide UG111 September 16, 2009
[9] Xilinx: ML605 Hardware User Guide UG534 (v1.8) October 2, 2012
[10] “IBM PowerPC Quick Reference Guide”, IBM Corp. 2005.
[11] “NIOS 3.0 CPU Data Sheet”, Altera Corporation, 2004 http:Hwww.altera.com/literature/ds/ds_nios_cpu.pdf
[12] Oukili, Soufiane, and Seddik Bri, “High throughput FPGA Implementation of Data Encryption Standard with time
variable sub-keys”, International Journal of Electrical and Computer Engineering, vol. 6, no. 1, p. 298, 2016.
[13] Espalmado, J. M. and Arboleda, E., “DARE Algorithm: A New Security Protocol by Integration of different
Cryptographic Techniques”, International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 2,
pp. 1032-1041, 2017.
[14] Mone, Shubhada Parashar, and Sunita S. Dhotre, “Enforcing multi-user security policies in cloud
computing”, International Journal of Electrical and Computer Engineering, vol. 3, no. 4, p. 504, 2013.

More Related Content

What's hot

Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Techglyphs
 
11 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa1411 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa14John Todora
 
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNAN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNEEIJ journal
 
Address translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhuteAddress translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhuteAniket Bhute
 
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...Journal For Research
 
Data Manipulation and Math Instruction on RSLogix 500
Data Manipulation and Math Instruction on RSLogix 500Data Manipulation and Math Instruction on RSLogix 500
Data Manipulation and Math Instruction on RSLogix 500Lino Hugun Saputra
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersIOSR Journals
 
03 shift registers_and_more_data_manipulation_sp15
03 shift registers_and_more_data_manipulation_sp1503 shift registers_and_more_data_manipulation_sp15
03 shift registers_and_more_data_manipulation_sp15John Todora
 
RTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic MultiplierRTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic MultiplierMohd Esa
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard desVaibhav Khanna
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud ComputingIRJET Journal
 
Implementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's mapImplementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's mapijcsit
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
 
Move mask moves_rev01_fa16
Move mask moves_rev01_fa16Move mask moves_rev01_fa16
Move mask moves_rev01_fa16John Todora
 

What's hot (20)

Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture
 
H04425053
H04425053H04425053
H04425053
 
11 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa1411 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa14
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNAN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
 
Address translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhuteAddress translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhute
 
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
 
Data Manipulation and Math Instruction on RSLogix 500
Data Manipulation and Math Instruction on RSLogix 500Data Manipulation and Math Instruction on RSLogix 500
Data Manipulation and Math Instruction on RSLogix 500
 
M04302093096
M04302093096M04302093096
M04302093096
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
 
03 shift registers_and_more_data_manipulation_sp15
03 shift registers_and_more_data_manipulation_sp1503 shift registers_and_more_data_manipulation_sp15
03 shift registers_and_more_data_manipulation_sp15
 
RTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic MultiplierRTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud Computing
 
Implementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's mapImplementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's map
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
Move mask moves_rev01_fa16
Move mask moves_rev01_fa16Move mask moves_rev01_fa16
Move mask moves_rev01_fa16
 
Digital Components
Digital ComponentsDigital Components
Digital Components
 

Similar to Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze Soft Core Processor

Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfRamRaja15
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityIRJET Journal
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyIAEME Publication
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICpaperpublications3
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor csandit
 
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORSMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORcscpconf
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Shiraz316
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLidescitation
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 

Similar to Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze Soft Core Processor (20)

Final report
Final reportFinal report
Final report
 
icwet1097
icwet1097icwet1097
icwet1097
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
 
Aes
AesAes
Aes
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technology
 
A04660105
A04660105A04660105
A04660105
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor
 
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORSMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSOR
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
 
11
1111
11
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze Soft Core Processor

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 5, October 2018, pp. 3544~3549 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5.pp3544-3549  3544 Journal homepage: http://iaescore.com/journals/index.php/IJECE Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze Soft Core Processor G. Renuka1 , V. Usha Shree2 , P. Chandra Sekhar Reddy3 1 Department of Electronics and Communication Engineering, S R Engineering College, Warangal, Telangana, India 2 Department of Electronics and Communication Engineering, JBREC, Hyderabad, Telangana, India 3 Department of Electronics and Communication Engineering, JNTUH, Kukatpally, Hyderabad, Telangana, India Article Info ABSTRACT Article history: Received Apr 21, 2018 Revised Jul 21, 2018 Accepted Jul 28, 2016 Encryption algorithms play a dominant role in preventing unauthorized access to important data. This paper focus on the implementations of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms on Microblaze soft core Processor and also their implementations on XC6VLX240t FPGA using Verilog Hardware Description language. This paper also gives a comparison of the issues related to the hardware and software implementations of the two cryptographic algorithms.Keyword: Advanced encryption standard Data encryption standard FPGA Microblaze Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: G. Renuka, Departement of Electronics and Communication Engineering, S R Engineering College (Autonomous), Warangal, Telangana, India. Email: renuka_g@srecwarangal.ac.in 1. INTRODUCTION Data encryption Standard (DES) [1]-[3] is adopted in 1977 by NIST (National Institute of Standards & Technology as Federal Information Processing Standard 46 (FIPS PUB 46). DES encrypts the data of 64 bits using 56 bit key length into 64 bit cipher text. Figure 1 shows the general description of the DES algorithm for encryption. The encryption is carried out by first doing the initial permutation and then it is followed by 16 rounds consisting of permutation and substitution functions. Finally the intermediate output pass through the inverse initial permutation. For generating the 16 48-bit keys that are used in each of the 16 rounds, the 64-bit key is used as the input to the algorithm. It is then passed to the initial permutation (PC1). The sub key is produced by circular left shifts and permutation function2 (PC2).The 64-bit plain text after initial permutation is divided into left (L) and right (R) halves of 32-bit quantities. The right half is first expanded using expander and then xored with key (Ki). It is then passed through the s-boxes and the output is then permutated and xored with the left half to produce the right half for the next round. The left half is swapped with the right half to produce the left half for the next round. The decryption process uses the same encryption algorithm but the sub keys are applied in reverse order.In July 1998 DES has been proved insecure, when Electronic frontier Foundation (EFF) has announced that it has broken DES.The search for the more secure algorithm has given birth to a new encryption algorithm called Advanced Encryption Standard (AES) (FIPS PUB 197) [4] developed by Dr Vincent Rijmen and Dr. Joan Daemen .It is also called Rijndael algorithm named after its developers.
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze … (G. Renuka) 3545 Figure 1. General structure of DES algorithm AES uses block length of 128 bits of data and the key length be independently specified to be 128,192 and 256 bits. The algorithm consists of 10 rounds as shown in the Figure 2, for a key length of 128 bits. Unlike DES, AES does not use a feistel structure.Every round of AES comprises of 4 stages- substitute bytes, Mix columns, shift rows and add round key, except the last round which does not contain the mix column stage. Figure 2. AES algorithm with key length of 128 bits Initially the 128 bit key is xored with plain text in Add Round Key stage. The 128 bit data is depicted as a square matrix of bytes called as state. The 16 bytes are arranged as first four bytes as the first column, second four bytes as second column and so on. The first stage of substitute bytes uses a 16x16 matrix byte values called s-boxes. Each and every individual byte of the state is mapped into a new byte which is obtained by the intersection of row and column elements. For decryption inverse s-box is taken for substitute byte transformation. In the shift row transformation, the first row is of the state is unchanged and the second row undergoes one byte circular left shift and the third row undergoes two byte circular left
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3544 – 3549 3546 shift and the fourth row undergoes a three byte circular left shifts. The decryption process uses the Inverse shift row transformation which performs circular right shift for the respective rows.The mix column transformation is carried out by performing matrix multiplication on the state. In the Add round key transformation the state is xored with the expanded key. 2. OVERVIEW OF MICROBLAZE PROCESSOR The Microblaze is a soft core processor. It is designed for Xilinx FPGAs from Xilinx [5]. It is implemented entirely using logic fabric of Xilinx FPGAs. Microblaze is an embedded soft RISC processor which uses 32-bit instruction word, 32-bit address and data buses, 32 registers each of width 32-bit, Big-endian format with three or five pipeline stages. It uses two buses in Harvard Architecture, PLB (processor Local Bus) and LMB (Local Memory Bus). It has dedicated unidirectional point-to-point data streaming interfaces. It also supports up to 16 FSLs (Fast Simplex Links) with dedicated Cache Link ports. Figure 3 shows the microblaze core block diagram. Figure 3. Microblaze core block diagram The ALU consist of hardware multipliers/DSP48, Floating Point Unit (FPU), Barrel shifter. The FPU implements IEEE 754 single-precision, floating-point standards supporting addition, multiplication, division, comparison and subtraction. The processor includes Instruction decoder, program counter and Instruction cache. 3. XILINX PLATFORM STUDIO The Xilinx Platform Studio (XPS), it is used for developing the hardware portion of the embedded processor system. Xilinx Embedded Development Kit (EDK) [6] is associate integrated software system tool suite.A usual embedded system [8] style project involves: hardware platform making, hardware platform verification (simulation), software system platform construction, software system application creation, and verification. Xilinx Platform Studio package Development Kit (SDK) is in Association with Nursing integrated development atmosphere, complimentary to XPS, that's used for C/C++ embedded package application construction and verification. SDK is made on the Eclipse open source framework. Soft Development Kit (SDK) may be a suite of tools that allows you to style a package application for elite Soft IP Cores within the Xilinx Embedded Development Kit (EDK).The package application will be written during a "C or C++" then the entire embedded processor system for user application are finished, else correct & download the bit file into FPGA. Then FPGA behaves like processor implemented on it in a Xilinx Field Programmable Gate Array (FPGA) device.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze … (G. Renuka) 3547 4. EXPERIMENTAL SETUP The AES and DES algorithms are described using Verilog [7]. Synthesis and Place & Route is done using Xilinx ISE 14.5. The device used for implementation is Xilinx Virtex-6 XC6VLX240t FPGA [8]. Table 1 summarizes the configuration of FPGA. Table 1. Configuration of FPGA Family Virtex-6 Device XC6VLX240T Package FF1156 Speed grade -1 There are many soft core processors available like PowerPC [9], NIOS3 [10], LEON3 [11] and Microblaze [12], [13]. We have chosen Xilinx Microblaze for our implementations. The designs are created with Xilinx Platform Studio (XPS) as shown in the Figure 4. Figure 4. System assembly view for soft core processor The programs for AES and DES are written using C code. They are compiled in SDK (Software Development Kit) [14]. The SDK provides a platform for applications targeted for embedded Microblaze. 5. RESULTS AND ANALYSIS 5.1. Performance of DES algorithm The results of the DES algorithms implemented on Xilinx Microblaze are shown in Figure 5 and the simulation results of DES are shown in Figure 6. Figure 5. Results of DES output seen through HyperTerminal
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3544 – 3549 3548 Figure 6. Simulation of 128 bit DES encryption 5.2. Performance of AES algorithm The results of the AES algorithms implemented on Xilinx Microblaze are shown in Figure 7 and the Simulation results of AES are in Figure 8. Figure 7. Results of AES output seen through HyperTerminal Figure 8. Simulation of 128 bit AES encryption
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze … (G. Renuka) 3549 The Table 2 summerises the implementation results of AES and DES algorithms. Table 2. Comparision of AES and DES Algorithms No of slices used Max. freq(MHz) AES algorithm using verilog 1456 181.752 DES algorithm using verilog 450 264.896 AES algorithm using microblaze 12,611 100.664 6. CONCLUSION Although DES is replaced by AES, the study of DES algorithm provides us with an insight in understanding the principles used in symmetric ciphers. A comparison of both implementations reveals that a direct Verilog implementation gives a better speed and area option rather then implementing in the soft core Microblaze processor. But the design effort to implement the algorithms on Microblaze is comparatively less than the direct Verilog implementation. Therefore, a tradeoff has to be made between the design effort, area and speed optimizations when choosing the options for various implementations. REFERENCES [1] “Data encryption standard (DES)”, National Bureau of Standards (U. S.), Federal Information Processing Standards Publication 46, National Technical Information Service,Springfield, VA, Apr. 1977. [2] W. Stallings, “Cryptography and Network Security: Principles and Practice”, 4th ed, Prentice-Hall, 2006 [3] Baker, W, “Introduction to the Analysis of the Data Encryption Standard (DES) Laguna Hills”, CA: Aegean Park Presss, 1991. [4] Daemen, J and Rijmen, V, A Specification for The AES Algorithm.NIST (National Institute of Standardsand Technology)http://csrc.nist.gov/archive/aes/rijndael/wsdindex.html, 2010. [5] www.xilinx.com/ [6] Xilinx: Getting Started with the Virtex-6 FPGA ML605 Embedded KitUG730 (v1.1) June 14, 2010 [7] Samir Palnitkar, “Verilog HDL, A Guide to Digital Design and Synthesis”, Prentice Hall, 2003 [8] Xilinx: Embedded System Tools Reference Guide UG111 September 16, 2009 [9] Xilinx: ML605 Hardware User Guide UG534 (v1.8) October 2, 2012 [10] “IBM PowerPC Quick Reference Guide”, IBM Corp. 2005. [11] “NIOS 3.0 CPU Data Sheet”, Altera Corporation, 2004 http:Hwww.altera.com/literature/ds/ds_nios_cpu.pdf [12] Oukili, Soufiane, and Seddik Bri, “High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys”, International Journal of Electrical and Computer Engineering, vol. 6, no. 1, p. 298, 2016. [13] Espalmado, J. M. and Arboleda, E., “DARE Algorithm: A New Security Protocol by Integration of different Cryptographic Techniques”, International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 2, pp. 1032-1041, 2017. [14] Mone, Shubhada Parashar, and Sunita S. Dhotre, “Enforcing multi-user security policies in cloud computing”, International Journal of Electrical and Computer Engineering, vol. 3, no. 4, p. 504, 2013.