Submit Search
Upload
Hardware implementation of the serpent block cipher using fpga technology
•
1 like
•
438 views
IAEME Publication
Follow
Hardware implementation of the serpent block cipher using fpga technology
Read less
Read more
Technology
Report
Share
Report
Share
1 of 11
Download now
Download to read offline
Recommended
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
ijsrd.com
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
IJECEIAES
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
Rc6 algorithm
Rc6 algorithm
Chethan Chetu
RC6
RC6
Zellagui Amine
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
G04701051058
G04701051058
ijceronline
Recommended
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
ijsrd.com
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
IJECEIAES
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
Rc6 algorithm
Rc6 algorithm
Chethan Chetu
RC6
RC6
Zellagui Amine
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
G04701051058
G04701051058
ijceronline
Network Coding
Network Coding
Kishoj Bajracharya
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
40120130406011 2-3
40120130406011 2-3
IAEME Publication
An approach to hide data in video using steganography
An approach to hide data in video using steganography
eSAT Publishing House
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
csandit
modha-2016-cae-652304
modha-2016-cae-652304
Kruti Modha
Js2517181724
Js2517181724
IJERA Editor
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
Shilpa ppt
Shilpa ppt
shilpa kanhurkar
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
G05124550
G05124550
IOSR-JEN
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
Kevin Tong
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET Journal
Cryptography Workbook
Cryptography Workbook
ArthyR3
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
IJERA Editor
Cs6701 cryptography and network security
Cs6701 cryptography and network security
ArthyR3
Cachorrinho
Cachorrinho
Mensagens Virtuais
A economia da mineração e a sociedade brasileir (.97a)
A economia da mineração e a sociedade brasileir (.97a)
mauroamoroso
Introducción a la Informática Jurídica
Introducción a la Informática Jurídica
Directorio Tacna
Tutorial webquest
Tutorial webquest
ameliarlima
More Related Content
What's hot
Network Coding
Network Coding
Kishoj Bajracharya
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
40120130406011 2-3
40120130406011 2-3
IAEME Publication
An approach to hide data in video using steganography
An approach to hide data in video using steganography
eSAT Publishing House
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
csandit
modha-2016-cae-652304
modha-2016-cae-652304
Kruti Modha
Js2517181724
Js2517181724
IJERA Editor
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
Shilpa ppt
Shilpa ppt
shilpa kanhurkar
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
G05124550
G05124550
IOSR-JEN
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
Kevin Tong
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET Journal
Cryptography Workbook
Cryptography Workbook
ArthyR3
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
IJERA Editor
Cs6701 cryptography and network security
Cs6701 cryptography and network security
ArthyR3
What's hot
(18)
Network Coding
Network Coding
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
40120130406011 2-3
40120130406011 2-3
An approach to hide data in video using steganography
An approach to hide data in video using steganography
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
modha-2016-cae-652304
modha-2016-cae-652304
Js2517181724
Js2517181724
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
Shilpa ppt
Shilpa ppt
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
G05124550
G05124550
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
Cryptography Workbook
Cryptography Workbook
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
Cs6701 cryptography and network security
Cs6701 cryptography and network security
Viewers also liked
Cachorrinho
Cachorrinho
Mensagens Virtuais
A economia da mineração e a sociedade brasileir (.97a)
A economia da mineração e a sociedade brasileir (.97a)
mauroamoroso
Introducción a la Informática Jurídica
Introducción a la Informática Jurídica
Directorio Tacna
Tutorial webquest
Tutorial webquest
ameliarlima
F:\Resultado De Encuesta1
F:\Resultado De Encuesta1
Maria Lidia Bermudez Ordoñez
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Limbs AndThings
Sparkling Pom Juice
Sparkling Pom Juice
steve singer
010 kmob succes in projectteams gedragsontwikkeling infra
010 kmob succes in projectteams gedragsontwikkeling infra
CROW
Undergraduate ru
Undergraduate ru
Aiganym Pakhrutdinova
Facebook
Facebook
I.E.P Peter Norton Nvo Chimbote
La carta
La carta
CADETEJAR
Ilusao de otica
Ilusao de otica
Mensagens Virtuais
Introduã§ã£o e conclusã£o
Introduã§ã£o e conclusã£o
Thassiane Oliveira
1112
1112
cbtlibrary
Kelas ii sd ipa_s rositawaty
Kelas ii sd ipa_s rositawaty
w0nd0
Guía de derechos y responsabilidades ip
Guía de derechos y responsabilidades ip
cantadorantonio
Natureza parte 2
Natureza parte 2
Mensagens Virtuais
Resultado proposta webquest
Resultado proposta webquest
ameliarlima
Neurian paiva santos-completo _lendas e mitos
Neurian paiva santos-completo _lendas e mitos
limn
10 rol 2014 b
10 rol 2014 b
Cclinic Unilibre
Viewers also liked
(20)
Cachorrinho
Cachorrinho
A economia da mineração e a sociedade brasileir (.97a)
A economia da mineração e a sociedade brasileir (.97a)
Introducción a la Informática Jurídica
Introducción a la Informática Jurídica
Tutorial webquest
Tutorial webquest
F:\Resultado De Encuesta1
F:\Resultado De Encuesta1
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Sparkling Pom Juice
Sparkling Pom Juice
010 kmob succes in projectteams gedragsontwikkeling infra
010 kmob succes in projectteams gedragsontwikkeling infra
Undergraduate ru
Undergraduate ru
Facebook
Facebook
La carta
La carta
Ilusao de otica
Ilusao de otica
Introduã§ã£o e conclusã£o
Introduã§ã£o e conclusã£o
1112
1112
Kelas ii sd ipa_s rositawaty
Kelas ii sd ipa_s rositawaty
Guía de derechos y responsabilidades ip
Guía de derechos y responsabilidades ip
Natureza parte 2
Natureza parte 2
Resultado proposta webquest
Resultado proposta webquest
Neurian paiva santos-completo _lendas e mitos
Neurian paiva santos-completo _lendas e mitos
10 rol 2014 b
10 rol 2014 b
Similar to Hardware implementation of the serpent block cipher using fpga technology
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
IJERA Editor
Analysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
ijsrd.com
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Aes
Aes
Manju Hegde
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
IJECEIAES
Js2517181724
Js2517181724
IJERA Editor
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
IAEME Publication
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3G
IJECEIAES
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
acijjournal
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
TELKOMNIKA JOURNAL
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic Algorithms
IOSR Journals
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
cscpconf
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
IJECEIAES
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor
csandit
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSOR
cscpconf
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
A03530107
A03530107
inventionjournals
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
ijcisjournal
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
IOSR Journals
Similar to Hardware implementation of the serpent block cipher using fpga technology
(20)
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
Analysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Aes
Aes
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
Js2517181724
Js2517181724
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3G
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic Algorithms
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSOR
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
A03530107
A03530107
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
More from IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
More from IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Recently uploaded
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
MarianaLemus7
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Hyundai Motor Group
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Precisely
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Recently uploaded
(20)
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Hardware implementation of the serpent block cipher using fpga technology
1.
International INTERNATIONAL Journal
of Electronics and Communication JOURNAL Engineering OF ELECTRONICS & Technology (IJECET), AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 01-33 © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com IJECET © I A E M E HARDWARE IMPLEMENTATION OF THE SERPENT BLOCK CIPHER USING FPGA TECHNOLOGY Mai Hossam Taher1 Electronics and Communications Dept.Mansoura University, Egypt Ali E.Taki El_Deen2 IEEE senior member, Alexandria University, Egypt Mohy E.Abo-Elsoud3 IEEE senior member, Electronics and Communications Dept. Mansoura University, Egypt 34 ABSTRACT Governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. This leads to the need of securing data from any unauthorized access. This paper presents the Serpent encryption and the proposed decryption algorithms. The results are simulated and implemented design using ModelSim 6.5 and Xilinx ISE 14.2 platform. The new Xilinx Spartan-6 is speed up the Serpent algorithm and reduce the power consumption. Comparisons with other Symmetric Block Algorithms are discussed. Keywords: Cryptography, Serpent, AES, Mars, Twofish, RC6, FPGA, Hardware Implementation. 1. INTRODUCTION Cryptography is referred to as study of secret. This is a process where a readable message is converted into a form which is unreadable to others except for the one it is intended to. Whenever confidential information is sent, there is possibility of an unauthorized third party attack in order to learn the confidential information. Cryptanalysis is the process by which an unintended receiver discovers the decryption process, and thereby the plaintext[1]. Modern encryption techniques start with the Data Encryption Standard (DES) which was developed in the early 1970s at IBM and based on an earlier design by Horst Feistel. But it is expired
2.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME now because DES has a relatively small 56-bit key which was becoming vulnerable to brute force attacks. In addition, the DES was designed primarily for hardware and is relatively slow when implemented in software[2]. While Triple-DES avoids the problem of a small key size, it is very slow even in hardware; it is unsuitable for limited-resource platforms; and it may be affected by potential security issues connected with the (today comparatively small) block size of 64 bits. For these reasons, the US National Institute of Standards and Technology has issued a call for a successor algorithm, to be called the Advanced Encryption Standard or AES. The essential requirement is that AES should be both faster than triple DES and at least as secure: it should have a 128 bit block length and a 256 bit key length (though keys of 128 and 192 bits must also be supported).Fifteen algorithms were submitted to the First AES Candidate Conference in August 1998[3].One year later, NIST announced the five finalists: MARS, RC6™, Rijndael, Serpent and Twofish. In 2006, Rijndael has also received some criticism suggesting that its mathematical structure 35 might lead to attacks in the future. Because of above problems that lead to using Serpent block cipher which has the highest security factor and simplest design equation. Serpent designed by Ross Anderson, Eli Biham and Lars Knudsen as a candidate for the Advanced Encryption Standard. It was a finalist in the AES competition. Serpent and Rijndael are somewhat similar[4].Although it was not finally selected, Serpent was considered very secure and with a high potential in hardware implementations[5]. A field-programmable gate array (FPGA) is a large-scale integrated circuit that can be programmed after it is manufactured rather than being limited to a predetermined, unchangeable hardware function. The term field-programmable refers to the ability to change the operation of the device in the field, while gate array is a somewhat dated reference to the basic internal architecture that makes this after-the-fact reprogramming possible. FPGA chip adoption across all industries is driven by the fact that FPGAs combine the best parts of application-specific integrated circuits (ASICs) and processor-based systems. FPGAs provide hardware-timed speed and reliability. The paper is organized as: Section (2) introduces Serpent Encryption Algorithm. Section (3) presents the proposed Serpent Decryption Algorithm. Section (4) discusses Specifics of FPGA Implementation. Section (5) Comparisons with other Symmetric Block Cipher are given. Section (6) discusses Experimental Results. Section (7). The advantages of Spartan-6 are represented. Finally the paper is concluded in section (8). 2. SERPENT ENCRYPTION ALGORITHM Serpent is a 32-round substitution permutation network (SPN) operating on four 32-bit words, thus having a block size of 128 bits[3].In fig.1, Serpent encrypts a 128-bit plaintext to a 128-bit ciphertext in 32 rounds with 33 sub keys. The user key length is assumed to be variable but in the proposal, it is fixed to be 128, 192 or 256 bits. It should be mentioned that the short keys with less than 256 bits are mapped to 256 bits keys by appending one ’1’ bit to the MSB end followed by as many ’0’ bits as required to produce 256 bits. The cipher consists of an initial permutation IP, 32 rounds, and a final permutation FP. Each round involves a key mixing operation, a pass through S-boxes, and a linear transformation. In the last round, the linear transformation is replaced by an additional key mixing operation. The whole data path from the plaintext P to the cipher text C can be formally described by a sequence of the following equations[6]:
3.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME B0 := IP( P ) (1) 36 Bi+1 := LT( SBoxi mod 8( BKi ) ), i = 0 … 30 (2) B32:= SBox7 (B31 K31) K32 (3) C: = FP (B32) (4) 2.1. Key Mixing At each round, a 128-bit sub key is XORed with the current intermediate data Fig.2. 2.2. The S-Boxes Serpent has 8 individual 1×16 S-Boxes which repeat every 8 round. Every 128-bit input of the S-Box will be divided to 32 blocks of 4-bits and every block will be applied to a 4×4 S-Box. The outputs of these 32 S-Boxes will be concatenated again together to perform a 128-bit block. Fig 1: Serpent Encryption
4.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME Fig 2: Key Mixing 37 2.3. Linear Transform The 128-bit output of S-Box will be divided to four 32-bits and these words are linearly mixed by some shift, rotate and XOR operations. A complete round of Serpent is described as [6]: 0, 1, 2,3:= () 0:= 0 13 2:= 2 3 1:= 1 0 2 3:= 3 2 (0 3) 1:= 1 1 3:= 3 7 0:= 0 1 3 2:= 2 3 (1 7) 0:= 0 5 2:= 2 22 +1:= 0,1,2,3 Where meansLeft Rotation and means LeftShift. In the last round, this linear transform is replaced by an additional key mixing. 32:= 7(31 31) 32 3. THE PROPOSED SERPENT DECRYPTION ALGORITHM Decryption is different from encryption in that the inverse of the S-boxes must be used in the reverse order, as well as the inverse linear transformation and reverse order of the sub keys Fig.3.
5.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME Fig 3: Decryption 38 3.1. Inverse Linear Transform The 128-bit will be divided to four 32-bits and these words are linearly mixed by some shift, rotate and XOR operations. A complete round of Serpent is described as: 0, 1, 2, 3:= () X2:= X2 22 0:= 0 5 2:= 2 X3 (X1 7) 0:= 0 13 3:= 3 7 1:= 1 1 3:= 3 X2 (X0 3) 1:= 102 2:= 2 3 0:= 0 13 +1:= 0, 1, 2, 3 Where means RightRotation and means LeftShift. 4. SPECIFICS OF FPGA IMPLEMENTATION Field-programmable gate arrays (FPGAs) are reprogram- able silicon chips. Ross Freeman, the cofounder of Xilinx, invented the first FPGA in 1985. FPGA devices are a highly promising alternative for implementing private-key cryptographic algorithms. Compared with software-based implementations, FPGA implementations can achieve superior performance [7]. For serpent algorithm to access effective implementation in both software and hardware, some specific aspects of FPGA architecture must be chosen. In all FPGA devices from this producer,
6.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME so called Look-Up Table (LUT) is the element located in every logic cell which is provided for generation of any combinational function. Xilinx Spartan-6 XC6SLX45 is chosen. In Spartan-6 architecture, in turn, every LUT table has the total capacity of 64b being sufficient for generation of a 6-input Boolean function but, alternatively, can be configured for generation of two different 5-input functions of the same variables. These configuration nuances will have significant impact on implementation of the cipher transformations[8]. VHDL stands for VHSIC Hardware Description Language, and VHSIC in turn stands for Very High Speed Integrated Circuits. VHDL is an acronym for Very High Speed Integrated Circuit Hardware Description Language which is a programming language used to describe a logic circuit by function, data flow behaviour, or structure[9]. VHDL aims at modeling or documenting electronics systems. Due to the nature of hardware components which are always running, VHDL is a highly concurrent language, built upon an event-based timing model. A VHDL program can be transformed with a synthesis tool into a netlist, that is, 39 a detailed gate-level implementation[10]. Serpent code was implemented in Xilinx ISE Design suite version 14.2. 5. COMPARISON BETWEEN 128-BITS SYMMETRIC BLOCK CIPHERS In our implementations, we focused on the safety factor performance because the security is the most important factor in the evaluation. Our throughput and Area results are compared with the FPGA-based results inNIST final report [11]. Only the cryptographic core of serpent algorithm was implemented using FPGA. Table 1: Differences between 128 symmetric block ciphers Cipher Serpent RC6 Rijndael Twofish Mars Structure Substitution permutation network Feistel network Substitution-permutation network Feistel network Feistel network Key Size 128, 192, 256-bits 128, 192, 256-bits 128, 192, 256-bits Up to 256- bits Up to 448- bits No.round 32 20 10 16 32 No.SubKeys 33 44 11 42 40 No.SBoxes 8 None 1 8 2 Size.SBoxes 64 bits (16 x 4) - 2048 bits (256 x 8) 64 bits (16 x 4) 8192 bits (256 x 32) Total ROM bits 512 - 2048 512 16384 Speed 69 43 20 18 34 Safety Factor 3.56 1.18 1.56 2.67 1.90 Area [Kgates] 504 1,643 613 432 2,936 Through-put [Mbit/s] 932 204 1,950 394 226 Key Setup Time(μs) 0.09 0.15 0.20 0.25 3.12
7.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 40 6. EXPERIMENTAL RESULTS Serpent architectures were implemented in Spartan-6 XC6SLX45 from Xilinx which was selected as a representative test platform and it served this role very well. Briefly the Implementation of the Serpent algorithm based on FPGA has the following steps: • Create design used VHDL codeusing FPGA Adv8.1(Mentor Graphics tools). • SimulateRTL(Register Transfer Level) with ModelSim SE 6.3. • Synthesize RTL design to target technology with precision synthesis. • Design flow to the Xilinx – Project Navigator, ISE 14.2, entry using EDIF file (electronic data interchange format) from Mentor Graphics tools. • Implement design (Transfer, map, place and route).Once a design is implemented, generate a bitstream file, then bit file can be downloaded. The simulation results are shown in Fig.4, 5. The RTL results for SBOX and Linear Transformation are shown in Fig6, 7, 8, 9. RTL for final encryption block in Xilinx ISE is shown in Fig10. Advantages of Spartan-6: Spartan-6 FPGA increased performance, density, evolutionary feature enhancements and Dramatic cost and power reductions[12]. Table 2: Differences between Xilinx families Feature Spartan-3A (90nm) Spartan-6 (45nm) Logic Cells(Kbit) Up to 55k Up to 150k LUT Design 4-input LUT +2FF 6-input LUT +2FF Block RAM(Mbit) Up to 2 Mbit Up to 5 Mbit Transceiver count / Speed No Up to 8 / Up to 3.125 Gbps Memory Interface 400Mbps DDR3 800Mbps Max Differential IO 640 Mbps 1050 Mbps Multipliers/DSP Up to 126 Multipliers / DSP Up to 184 DSP 48 Blocks Memory Controllers No Up to 4 Hard Blocks Clock Management DCM only DCM PLL Security Device DNA only Device DNA AES 1-Text encryption: Plaintext: Mai Hossam Taher Ahmed Ciphertext: ¾yI2é-)yÐF°ùö“´l¡ès¶HAÆH+ æ‘JE+ 6ï nGO´øEØî–+ 6ï nGO´øEØî–+ 6ï nGO´øEØî–+ 6ï nGO´øEØî– + 6ï nGO´øEØî–+ 6ï nGO´øEØî–
8.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 41 Simulation Results: (a) (b) Fig 4: Pre-Synthesis for text using serpent (a) Encryption, and (b) Decryption Fig 5: Pre-Synthesis for Image using Serpent Encryption Decryption Block Fig 6: RTL Schematic for Serpent Sbox
9.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. Fig 7: 34-44 Technology Schematic for Serpent Sbox Fig 8: RTL Schematic and Technology Schematic of Serpent Linear Transformation Fig 9:Mentor Graphics Technology Schematic serpent Encryption 42 – 4 © IAEME
10.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME Fig 10: Xilinx RTL Schematic of Serpent Encryption Table 3: Xilinx ISE XPower Analyzer for SERPENT Encryption Algorithm on Spartan6- XC6SLX45 Table 4: Resource used in the FPGA Implementation of AES using Spartan-3A, Virtex-II, Virtex-5, and Spartan-6 Spartan-3A, Virtex-5 Spartan-6 Process 90nm 65nm 45nm 43 Static Power Consumption (mw) 450 1209 370 IOS Used 15 15 15 Avail. 372 640 218 Global Buffers Used 1 1 1 Avail. 24 32 32 LUTs Used 9071 7044 4278 Avail. 11776 69120 27288 CLB Slices Used 5279 1870 1494 Avail. 5888 17280 6822 Block RAMs Used 0 0 0 Avail. 20 400 116
11.
International Journal of
Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 44 7. CONCLUSION No doubt, the AES algorithm is faster, but the Serpent algorithm is more secure. Comparisons with other Symmetric Block Cipher have been investigated. In this paper, we have successfully implemented the Serpent algorithm using Spartan-6 FPGA device from Xilinx. Finally, the results have been shown that the hardware implementation is faster than the software as well as increase system security. In addition, it is noted that they save logic area and reduce the power consumption. REFERENCES [1] Richard A. Mollin, “An Introduction to Cryptography”, Second Edition, ISBN: 1584886188 / 9781584886181, 2005. [2] http://www.britanncia.com/EBchecked/topic/145058/cryptology/233467/The-Data- Encryption-Standard-and-the-Advanced-Encryption-Standard. [3] Anderson, R., Biham, E. Knudsen, L. (2000). The Case for Serpent. Proc. Third AES Candidate Conf.New York, http://csrc.nist.gov/archive/aes/ index.html (accessed April 2012). [4] KGaj, P.Chodowiec, “Comparison of the hardware performance of the AES candidates using reconfigurable hardware”, The Third Advanced Encryption Standard Candidate Conference, April 13–14, 2000, New York, USA (proceedings availablefromhttp://csrc.nist.gov/encryption/aes/round2/conf3/aes3conf.htm), 2000. [5] Jürgen Becker, Marco Platzner, Serge Vernalde, Field Programmable Logic and Application, 14th Edition, ISBN: 978-3-540-22989-6, 2004. [6] Anderson, R., Biham, E. Knudsen, L. (1998).Serpent: A Proposal for the Advanced Encryption Standard. Proc. First Advanced Encryption Standard (AES) Candidate Conf. Ventura,California, http://www.cl.cam.ac.uk /~rja14/ serpent.html (accessed April 2012). [7] Implementation of symmetric block ciphers in popular-grade FPGA Devices, Journal of Polish Safety and Reliability Association Summer Safety and Reliability Seminars, Volume 3, Number 2, 2012. [8] JarosławSugier, LOW-COST PROGRAMMABLE HARDWARE SOLUTIONS IMPROVING CONFIDENTIALITY IN COMPUTER SYSTEMS, Proceedings of the 13th International Conference “Reliability and Statistics in Transportation and Communication” (RelStat’13), 16–19 October 2013, Riga, Latvia, p. 387–396, ISBN 978-9984-818-58-0. [9] Bibilo, P.N. and Avdeev, N.A., VHDL. Effektivnoeispol’ zovaniepriproektirovaniitsifrovykh sistem (VHDL. Effective Use in Design of Digital Systems), Moscow: SOLON_Press, 2006. [10] Peter J. Ashenden, VHDL Tutorial, Elsevier Science (USA), 2004. [11] Bryan Weeks, Mark Bean, Tom Rozylowicz, Chris Ficke, Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms, National Security Agency (NSA). [12] Xilinx, Inc. (2011). Spartan-6 Family Overview. DS160.PDF, www.xilinx.com (accessed April 2012). [13] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [14] Ahmad Salameh Abusukhon, “Block Cipher Encryption for Text-To-Image Algorithm”, International Journal of Computer Engineering Technology (IJCET), Volume 4, Issue 3, 2013, pp. 50 - 59, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Download now