SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645
www.ijmer.com 2442 | Page
R. Vijaya Durga1
, K. V. Ramana Rao2
, K. Prasanna Kumar3
[M.tech] Department of Electronics and Communication Engineering, Pydah College of engineering and Technology,
Affliated to JNTUK, Ghambheeram, Visakhapatnam-531163
ABSTRACT: The continuous increase in demand for security in electronic systems and communication systems which
lacks a secure architecture has resulted in the need to provide cryptography architecture with high secure core. The
hardware implementation of the cryptography core which incorporates multiple algorithm for security purpose was already
developed but if the architecture is capable of switching between the algorithms used for encryption /decryption as
controlled by the host computer dynamically, then the security over the data path will be increased by making the attempt for
hacking too difficult. The switching between heterogeneous algorithms will also increase the confusion level. This proposed
architecture implements three symmetric algorithms namely the standard AES, standard DES and proposed modified DES
(MDES) algorithms. Representing these algorithms in the functional block level and also using the new concept of common
S-Box , results in operations that are common to all the three algorithms, allows us to merge them in a single architecture
and thus there is an area reduction of 14.5% in cryptography core with 2 S-Boxes rather than using 11 S-Box. The
operation of this cryptography core is controlled by the control signals, selecting which algorithm to work at time, making it
difficult to hack the information transferred through the data line.
I. INTRODUCTION
The cryptography technique users always have demanded high security for the data they transfer, and this
demand increases day-by-day as the information transferred is hacked unlawfully. To meet this needs, though some
works with different architectures are designed, this project introduces a simple new technique having three algorithms
onto a single core, making the architecture to function as any one of the algorithm at different time instance helps in
increasing the security level. In the proposed cryptography architecture we have implemented the private key
algorithm and the algorithms used here are standard AES which is a 128-b block cipher algorithm, standard DES
and MDES both of which are 64-b block cipher algorithms.
A cryptography system can be implemented either in software or hardware. Software implementation allows
multiple algorithms to be supported on the same platform but they are usually slow and are considered to be more vulnerable
to side channel attack, which uses physical measurements on the devices, for example the power consumption of the
processor to detect the encryption / decryption key while on the other hand the hardware implementation is comparatively
faster and more secure as compared to that of software. The main concept used in order to increase the security is
that, the inputs to core module is a 128-b data and 128-b key and the output is also 128-b which generally
confuses the hacker since AES generates an output which is 128-b data but the other two algorithm generates output of 64-b
data which is hidden in the 128-b data that is coming out of the module and also the control signal which selects the
algorithms operation increases the security level because before the hacker hacks the information the
encrypted/decrypted data will be transmitted since he doesn‟t know which algorithm is used at what time as it is
been controlled by the host medium with the control signal being sent via the secure data channel with the help
of private key algorithm.
II. STRATEGY
Some of the strategy used in designing algorithm is as follows. In designing the Key Schedule module for AES
encryption, we had used on the fly key method i.e. the keys are generated in accordance with the working of each round in
AES flow. Instead of pre-generating the keys required for the encryption process which consumes lot of time and reduces the
frequency and speed of operation, but by using this strategy keys are generated whenever the round operation works helping
in increasing the throughput.
The technique used to design common S-Box is show in the Fig.1 we know that the number of S-Boxes used for
DES algorithm is 8 and each box contain 64 elements of 4-b each. So the number of elements as a whole is 64 X 8 = 512
elements. And the common S-Box that we are going to use is (16 x 16 = 256) capable of holding 256 elements of 8-b each
this is nothing but the S-Box that we use for AES and DES algorithms. Now, what we do is we club two elements starting
from starting element till end and represent them in the hexadecimal value and dump it into the common S-Box. As already
told the total elements in DES is 512 and each is of 4-b. Now, we just club two elements from DES S-Box i.e. of 4-b each
and represent it as 8-b elements that fits into the Common S-Box. As show in the example the element 14 and 4 of 4-b each
is clubbed and represented as E4 and the value is dumped into the first location of the Common S-Box and as such this is
done for the rest of the elements and thus all the elements of DES S-Box is dumped into Common S-Box and hence the
required functionality is achieved. But there is a small change because of this common box in the cipher function of the DES
algorithm i.e. instead of using 6 i/p  4o/p LUT , we require an LUT of 8 i/p  8 o/p. And by using this technique we
now require 2 S-Box as a whole instead of 11 S-Box, one for AES- inv-S-Box which is mandatory and other S-Box that is
common to all the three algorithms and because of this strategy there is area reduction in the whole of the architecture.
Implementation of Cryptography Architecture with High
Secure Core
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645
www.ijmer.com 2443 | Page
Fig.1. Common S-Box Technique
III. CRYPTOGRAPHY CORE ARCHITECHTURE
The complete cryptography architecture is designed using Verilog HDL language and is synthesized using Xilinx
and cadence RTL compiler. The cryptography core functions as standard AES or standard DES or MDES according to the
selection of the control signals. The block diagram of the complete cryptography architecture is shown in the Fig.2.
Fig.2. Cryptography architecture
IV. CRYPTOGRPHY CORE OPERATION
The working of the core is started with the help of enable signal. As soon as the architecture is given enable signal,
the structure start working as any of these algorithms on the basis of the control signal provided the algorithms works in flow
with the clock signal.
ENABLE CONTROL1 CONTOL2 OUTPUT
0 ?? ? HIGH IMPEDANCE
1 00 1 AES ENCRYPTION
1 00 0 AES DECRYPTION
1 01 1
DES
ENCRYPTION
1 01 0
DES
DECRYPTION
1 10 1
MDES
ENCRYPTION
1 10 0
MDES
DECRYPTION
Table.1. Working Operation of Cryptography Core
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645
www.ijmer.com 2444 | Page
The Table.1 reveals the combinations of the control signal and is corresponding algorithm selection for functioning
of the architecture.
The necessary operations required for direct implementation of the cryptography algorithm is shown in Below Table.2.
ALGORI
THM
Expand
/
Permut
ation
LUT
Logic
al
XOR
Circular/L
ogical
Right/Left
shift
LUT
(S-
box)
AES -
8in=>
8out
32 (32 by
8b)
2
DES
32,48,5
6,64
6in=>
4out
32,
48
28(by 1b
or 2b)
8
MDES
32,48,5
6,64
8in=>
8out
32,48
,64
28(by 1b
or 2b)
1
Table.2.Basic Operation Required For Implementation of the algorithm
This gives us an idea on what are the operations that governs the working condition of the algorithm.
ALGORI
THM
Expand
/
Permut
ation
LUT
Logica
l
XOR
Circular/L
ogical
Right/Left
shift
LUT
(S-
box)
AES -
8in=>
8out
32 (32 by
8b)
2
DES
32,48,5
6,64
6in=>
4out
32,
48
28(by 1b
or 2b)
8
MDES
32,48,5
6,64
8in=>
8out
32,48
,64
28(by 1b
or 2b)
1
Table.3. Basic Operation Required For Implementation after Reordering
The procedure for designing this cryptography core is to express the high level operations of each algorithm in
terms of basic arithmetic and logical operations to maximize the Number of common operations among the algorithms and
also using the common S-Box technique results in minimize the overall required architecture area. Hence some of the
operations that are common to the algorithms are expansion (32 to 48), compression (48 to 32), LUT, permutation, xor
operation, which gets plugged into architecture of the algorithm whenever it is called for functioning. Table.3 shows the
operations required for each algorithm after reorganization of the architecture.
V. SECURITY ENHANCEMENT IN CRYPTOGRAPHY CORE
In the working operation of the cryptography core a simple technique is used in order to increase the security level
to the data being transferred. Fig.3 shows technique show the technique used.
Fig.3. Security Enhancement Technique
Here the data input and the key to core is of 128-b and the data out is also128-b. In general when the data‟s are
encrypted using AES algorithm, the output transferred is 128-b, but when the other two algorithms are used for encryption
process the data out should be 64-b as these two algorithms are 64-b block cipher algorithms as explained before, but the
data coming out of this core is of 128-b, i.e. the 64-b encrypted/decrypted data is embedded into the 128-b data coming out.
This helps in increasing the security level because in general if it is going to be 64-b data, the hacker has to try all
2
64
combinations to data out to crack and find the information which takes a longer time, but here as the important data is
embedded into 128-b data coming out, it‟s a tough job to hack the information and apart from this, the selection of which
algorithm to work at what time by the host medium too increase security level.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645
www.ijmer.com 2445 | Page
VI. EXPERIMENTAL RESULTS
The Table.4 shows the result of the cell usage and other details when the design is targeted to ASIC and synthesized
using the Xilinx‟s RTL compiler. Here the cell usage of cryptography core using 2 S-Box is less when compared to that of
using 11 S-Box.
ALGORITHM
No of
Cells
Used
Power(
w)
Time
Period(
ns)
Frequen
cy of
Operatio
n (MHz)
CRYPCORE(
11 S-BOX)
28815
3
0.156
24.597 40.683
CRYPCORE( 2
S-BOX)
24583
8
0.082 24.733 40.431
Table.4. Area and Timing Report for Design Using Xilinx‟s RTL Compiler Targeting 180 nm
VII. CONCLUSION
A simple technique to address the important issue of performance improvement of the cryptography core is
discussed in this work and also explains the design of cryptography core for electronic devices and other desired applications
used for secure data transmission using private Key algorithm. Through the simulation and synthesize results, we have
inferred that performance level of the cryptography core is increased and we have achieved this by expressing the operations
of the three algorithms namely the standard AES, standard DES and MDES in terms Of basic arithmetic and logical
operations that maximizes the number of common blocks among them and also using common S-Box technique, resulting in
merging of these three algorithms in a single core. And, this design also increasing the security level by controlling the core
to Operate in different algorithms at a particular time with the help of control signal which is transferred via secure data line
using private key algorithm, making it too difficult for hacking and other external attacks. A few extra works that can be
added to this design in future to enhance its capabilities are implementing the private key cryptography algorithm onto this
core, which helps in secure transfer of keys and the control signals used for the operation of the core.
REFERENCES
[1] Data Encryption Standards (DES), Oct.1999.FIPS standards publications.
[2] Advanced Encryption Standard (AED), Nov.2001.FIPS standards publication 197.
[3] AES and DES Algorithm, “Wikipedia-Free Encyclopaedia”.
[4] Atul Kahate, “Cryptography and Network Security”, 2003.
[5] William stalling, „‟Cryptography and Network Security Principles and Practice‟‟.
[6] John Daemen and Vincent Rijmen, “AES proposal: Rijndael”.
[7] J.Bhaskar, “Verilog HDL primer and Verilog HDL synthesize”.

More Related Content

What's hot

Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETEnhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETIRJET Journal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...eSAT Publishing House
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET Journal
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field AJAL A J
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeHigh Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeIJERA Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,paperpublications3
 

What's hot (19)

A03530107
A03530107A03530107
A03530107
 
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETEnhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESET
 
G05124550
G05124550G05124550
G05124550
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
D018141922
D018141922D018141922
D018141922
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
VHDL Encryption
VHDL EncryptionVHDL Encryption
VHDL Encryption
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeHigh Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
 

Viewers also liked

Assessing Water Demand And Supply For Srinagar City (J&K) India, Under Chang...
Assessing Water Demand And Supply For Srinagar City (J&K)  India, Under Chang...Assessing Water Demand And Supply For Srinagar City (J&K)  India, Under Chang...
Assessing Water Demand And Supply For Srinagar City (J&K) India, Under Chang...IJMER
 
A new structure in Tandem Solar Cells
A new structure in Tandem Solar CellsA new structure in Tandem Solar Cells
A new structure in Tandem Solar CellsIJMER
 
Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...
Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...
Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...IJMER
 
Vision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result RecordsVision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result RecordsIJMER
 
Amulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport SystemAmulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport SystemIJMER
 
Worker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling SoftwareWorker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling SoftwareIJMER
 
An Analytical Study of International Standards on Minority Rights
An Analytical Study of International Standards on Minority  Rights An Analytical Study of International Standards on Minority  Rights
An Analytical Study of International Standards on Minority Rights IJMER
 
Efficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyEfficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyIJMER
 
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...IJMER
 
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...IJMER
 
Analytic Model of Wind Disturbance Torque on Servo Tracking Antenna
Analytic Model of Wind Disturbance Torque on Servo Tracking AntennaAnalytic Model of Wind Disturbance Torque on Servo Tracking Antenna
Analytic Model of Wind Disturbance Torque on Servo Tracking AntennaIJMER
 
SISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systemsSISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systemsIJMER
 
Safety Margin of Slope Stability Using Common Deterministic Methods
Safety Margin of Slope Stability Using Common Deterministic  MethodsSafety Margin of Slope Stability Using Common Deterministic  Methods
Safety Margin of Slope Stability Using Common Deterministic MethodsIJMER
 
MHD Free Convection and Mass Transfer Flow past a Vertical Flat Plate
MHD Free Convection and Mass Transfer Flow past a Vertical Flat PlateMHD Free Convection and Mass Transfer Flow past a Vertical Flat Plate
MHD Free Convection and Mass Transfer Flow past a Vertical Flat PlateIJMER
 
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh NetworksSecure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh NetworksIJMER
 
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
Data Mining Techniques in Higher Education an Empirical Study  for the Univer...Data Mining Techniques in Higher Education an Empirical Study  for the Univer...
Data Mining Techniques in Higher Education an Empirical Study for the Univer...IJMER
 
About the 2-Banach Spaces
About the 2-Banach Spaces About the 2-Banach Spaces
About the 2-Banach Spaces IJMER
 
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...IJMER
 
Optimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewOptimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewIJMER
 
On The Transcendental Equation
On The Transcendental EquationOn The Transcendental Equation
On The Transcendental EquationIJMER
 

Viewers also liked (20)

Assessing Water Demand And Supply For Srinagar City (J&K) India, Under Chang...
Assessing Water Demand And Supply For Srinagar City (J&K)  India, Under Chang...Assessing Water Demand And Supply For Srinagar City (J&K)  India, Under Chang...
Assessing Water Demand And Supply For Srinagar City (J&K) India, Under Chang...
 
A new structure in Tandem Solar Cells
A new structure in Tandem Solar CellsA new structure in Tandem Solar Cells
A new structure in Tandem Solar Cells
 
Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...
Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...
Analysis of Temperature loss of Hot Metal during Hot Rolling Process at Steel...
 
Vision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result RecordsVision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result Records
 
Amulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport SystemAmulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport System
 
Worker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling SoftwareWorker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling Software
 
An Analytical Study of International Standards on Minority Rights
An Analytical Study of International Standards on Minority  Rights An Analytical Study of International Standards on Minority  Rights
An Analytical Study of International Standards on Minority Rights
 
Efficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyEfficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar Energy
 
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
 
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...
 
Analytic Model of Wind Disturbance Torque on Servo Tracking Antenna
Analytic Model of Wind Disturbance Torque on Servo Tracking AntennaAnalytic Model of Wind Disturbance Torque on Servo Tracking Antenna
Analytic Model of Wind Disturbance Torque on Servo Tracking Antenna
 
SISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systemsSISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systems
 
Safety Margin of Slope Stability Using Common Deterministic Methods
Safety Margin of Slope Stability Using Common Deterministic  MethodsSafety Margin of Slope Stability Using Common Deterministic  Methods
Safety Margin of Slope Stability Using Common Deterministic Methods
 
MHD Free Convection and Mass Transfer Flow past a Vertical Flat Plate
MHD Free Convection and Mass Transfer Flow past a Vertical Flat PlateMHD Free Convection and Mass Transfer Flow past a Vertical Flat Plate
MHD Free Convection and Mass Transfer Flow past a Vertical Flat Plate
 
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh NetworksSecure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
 
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
Data Mining Techniques in Higher Education an Empirical Study  for the Univer...Data Mining Techniques in Higher Education an Empirical Study  for the Univer...
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
 
About the 2-Banach Spaces
About the 2-Banach Spaces About the 2-Banach Spaces
About the 2-Banach Spaces
 
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...
 
Optimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewOptimization of Tool Wear: A Review
Optimization of Tool Wear: A Review
 
On The Transcendental Equation
On The Transcendental EquationOn The Transcendental Equation
On The Transcendental Equation
 

Similar to Implementation of Cryptography Architecture with High Secure Core

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...ijcsit
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...IRJET Journal
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET Journal
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 

Similar to Implementation of Cryptography Architecture with High Secure Core (20)

Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Aes
AesAes
Aes
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
publication
publicationpublication
publication
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Implementation of Cryptography Architecture with High Secure Core

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645 www.ijmer.com 2442 | Page R. Vijaya Durga1 , K. V. Ramana Rao2 , K. Prasanna Kumar3 [M.tech] Department of Electronics and Communication Engineering, Pydah College of engineering and Technology, Affliated to JNTUK, Ghambheeram, Visakhapatnam-531163 ABSTRACT: The continuous increase in demand for security in electronic systems and communication systems which lacks a secure architecture has resulted in the need to provide cryptography architecture with high secure core. The hardware implementation of the cryptography core which incorporates multiple algorithm for security purpose was already developed but if the architecture is capable of switching between the algorithms used for encryption /decryption as controlled by the host computer dynamically, then the security over the data path will be increased by making the attempt for hacking too difficult. The switching between heterogeneous algorithms will also increase the confusion level. This proposed architecture implements three symmetric algorithms namely the standard AES, standard DES and proposed modified DES (MDES) algorithms. Representing these algorithms in the functional block level and also using the new concept of common S-Box , results in operations that are common to all the three algorithms, allows us to merge them in a single architecture and thus there is an area reduction of 14.5% in cryptography core with 2 S-Boxes rather than using 11 S-Box. The operation of this cryptography core is controlled by the control signals, selecting which algorithm to work at time, making it difficult to hack the information transferred through the data line. I. INTRODUCTION The cryptography technique users always have demanded high security for the data they transfer, and this demand increases day-by-day as the information transferred is hacked unlawfully. To meet this needs, though some works with different architectures are designed, this project introduces a simple new technique having three algorithms onto a single core, making the architecture to function as any one of the algorithm at different time instance helps in increasing the security level. In the proposed cryptography architecture we have implemented the private key algorithm and the algorithms used here are standard AES which is a 128-b block cipher algorithm, standard DES and MDES both of which are 64-b block cipher algorithms. A cryptography system can be implemented either in software or hardware. Software implementation allows multiple algorithms to be supported on the same platform but they are usually slow and are considered to be more vulnerable to side channel attack, which uses physical measurements on the devices, for example the power consumption of the processor to detect the encryption / decryption key while on the other hand the hardware implementation is comparatively faster and more secure as compared to that of software. The main concept used in order to increase the security is that, the inputs to core module is a 128-b data and 128-b key and the output is also 128-b which generally confuses the hacker since AES generates an output which is 128-b data but the other two algorithm generates output of 64-b data which is hidden in the 128-b data that is coming out of the module and also the control signal which selects the algorithms operation increases the security level because before the hacker hacks the information the encrypted/decrypted data will be transmitted since he doesn‟t know which algorithm is used at what time as it is been controlled by the host medium with the control signal being sent via the secure data channel with the help of private key algorithm. II. STRATEGY Some of the strategy used in designing algorithm is as follows. In designing the Key Schedule module for AES encryption, we had used on the fly key method i.e. the keys are generated in accordance with the working of each round in AES flow. Instead of pre-generating the keys required for the encryption process which consumes lot of time and reduces the frequency and speed of operation, but by using this strategy keys are generated whenever the round operation works helping in increasing the throughput. The technique used to design common S-Box is show in the Fig.1 we know that the number of S-Boxes used for DES algorithm is 8 and each box contain 64 elements of 4-b each. So the number of elements as a whole is 64 X 8 = 512 elements. And the common S-Box that we are going to use is (16 x 16 = 256) capable of holding 256 elements of 8-b each this is nothing but the S-Box that we use for AES and DES algorithms. Now, what we do is we club two elements starting from starting element till end and represent them in the hexadecimal value and dump it into the common S-Box. As already told the total elements in DES is 512 and each is of 4-b. Now, we just club two elements from DES S-Box i.e. of 4-b each and represent it as 8-b elements that fits into the Common S-Box. As show in the example the element 14 and 4 of 4-b each is clubbed and represented as E4 and the value is dumped into the first location of the Common S-Box and as such this is done for the rest of the elements and thus all the elements of DES S-Box is dumped into Common S-Box and hence the required functionality is achieved. But there is a small change because of this common box in the cipher function of the DES algorithm i.e. instead of using 6 i/p  4o/p LUT , we require an LUT of 8 i/p  8 o/p. And by using this technique we now require 2 S-Box as a whole instead of 11 S-Box, one for AES- inv-S-Box which is mandatory and other S-Box that is common to all the three algorithms and because of this strategy there is area reduction in the whole of the architecture. Implementation of Cryptography Architecture with High Secure Core
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645 www.ijmer.com 2443 | Page Fig.1. Common S-Box Technique III. CRYPTOGRAPHY CORE ARCHITECHTURE The complete cryptography architecture is designed using Verilog HDL language and is synthesized using Xilinx and cadence RTL compiler. The cryptography core functions as standard AES or standard DES or MDES according to the selection of the control signals. The block diagram of the complete cryptography architecture is shown in the Fig.2. Fig.2. Cryptography architecture IV. CRYPTOGRPHY CORE OPERATION The working of the core is started with the help of enable signal. As soon as the architecture is given enable signal, the structure start working as any of these algorithms on the basis of the control signal provided the algorithms works in flow with the clock signal. ENABLE CONTROL1 CONTOL2 OUTPUT 0 ?? ? HIGH IMPEDANCE 1 00 1 AES ENCRYPTION 1 00 0 AES DECRYPTION 1 01 1 DES ENCRYPTION 1 01 0 DES DECRYPTION 1 10 1 MDES ENCRYPTION 1 10 0 MDES DECRYPTION Table.1. Working Operation of Cryptography Core
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645 www.ijmer.com 2444 | Page The Table.1 reveals the combinations of the control signal and is corresponding algorithm selection for functioning of the architecture. The necessary operations required for direct implementation of the cryptography algorithm is shown in Below Table.2. ALGORI THM Expand / Permut ation LUT Logic al XOR Circular/L ogical Right/Left shift LUT (S- box) AES - 8in=> 8out 32 (32 by 8b) 2 DES 32,48,5 6,64 6in=> 4out 32, 48 28(by 1b or 2b) 8 MDES 32,48,5 6,64 8in=> 8out 32,48 ,64 28(by 1b or 2b) 1 Table.2.Basic Operation Required For Implementation of the algorithm This gives us an idea on what are the operations that governs the working condition of the algorithm. ALGORI THM Expand / Permut ation LUT Logica l XOR Circular/L ogical Right/Left shift LUT (S- box) AES - 8in=> 8out 32 (32 by 8b) 2 DES 32,48,5 6,64 6in=> 4out 32, 48 28(by 1b or 2b) 8 MDES 32,48,5 6,64 8in=> 8out 32,48 ,64 28(by 1b or 2b) 1 Table.3. Basic Operation Required For Implementation after Reordering The procedure for designing this cryptography core is to express the high level operations of each algorithm in terms of basic arithmetic and logical operations to maximize the Number of common operations among the algorithms and also using the common S-Box technique results in minimize the overall required architecture area. Hence some of the operations that are common to the algorithms are expansion (32 to 48), compression (48 to 32), LUT, permutation, xor operation, which gets plugged into architecture of the algorithm whenever it is called for functioning. Table.3 shows the operations required for each algorithm after reorganization of the architecture. V. SECURITY ENHANCEMENT IN CRYPTOGRAPHY CORE In the working operation of the cryptography core a simple technique is used in order to increase the security level to the data being transferred. Fig.3 shows technique show the technique used. Fig.3. Security Enhancement Technique Here the data input and the key to core is of 128-b and the data out is also128-b. In general when the data‟s are encrypted using AES algorithm, the output transferred is 128-b, but when the other two algorithms are used for encryption process the data out should be 64-b as these two algorithms are 64-b block cipher algorithms as explained before, but the data coming out of this core is of 128-b, i.e. the 64-b encrypted/decrypted data is embedded into the 128-b data coming out. This helps in increasing the security level because in general if it is going to be 64-b data, the hacker has to try all 2 64 combinations to data out to crack and find the information which takes a longer time, but here as the important data is embedded into 128-b data coming out, it‟s a tough job to hack the information and apart from this, the selection of which algorithm to work at what time by the host medium too increase security level.
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2442-2445 ISSN: 2249-6645 www.ijmer.com 2445 | Page VI. EXPERIMENTAL RESULTS The Table.4 shows the result of the cell usage and other details when the design is targeted to ASIC and synthesized using the Xilinx‟s RTL compiler. Here the cell usage of cryptography core using 2 S-Box is less when compared to that of using 11 S-Box. ALGORITHM No of Cells Used Power( w) Time Period( ns) Frequen cy of Operatio n (MHz) CRYPCORE( 11 S-BOX) 28815 3 0.156 24.597 40.683 CRYPCORE( 2 S-BOX) 24583 8 0.082 24.733 40.431 Table.4. Area and Timing Report for Design Using Xilinx‟s RTL Compiler Targeting 180 nm VII. CONCLUSION A simple technique to address the important issue of performance improvement of the cryptography core is discussed in this work and also explains the design of cryptography core for electronic devices and other desired applications used for secure data transmission using private Key algorithm. Through the simulation and synthesize results, we have inferred that performance level of the cryptography core is increased and we have achieved this by expressing the operations of the three algorithms namely the standard AES, standard DES and MDES in terms Of basic arithmetic and logical operations that maximizes the number of common blocks among them and also using common S-Box technique, resulting in merging of these three algorithms in a single core. And, this design also increasing the security level by controlling the core to Operate in different algorithms at a particular time with the help of control signal which is transferred via secure data line using private key algorithm, making it too difficult for hacking and other external attacks. A few extra works that can be added to this design in future to enhance its capabilities are implementing the private key cryptography algorithm onto this core, which helps in secure transfer of keys and the control signals used for the operation of the core. REFERENCES [1] Data Encryption Standards (DES), Oct.1999.FIPS standards publications. [2] Advanced Encryption Standard (AED), Nov.2001.FIPS standards publication 197. [3] AES and DES Algorithm, “Wikipedia-Free Encyclopaedia”. [4] Atul Kahate, “Cryptography and Network Security”, 2003. [5] William stalling, „‟Cryptography and Network Security Principles and Practice‟‟. [6] John Daemen and Vincent Rijmen, “AES proposal: Rijndael”. [7] J.Bhaskar, “Verilog HDL primer and Verilog HDL synthesize”.