SlideShare a Scribd company logo
1 of 11
Download to read offline
International INTERNATIONAL Journal of Electronics and Communication JOURNAL Engineering OF ELECTRONICS & Technology (IJECET), AND 
ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 01-33 © IAEME 
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) 
ISSN 0976 – 6464(Print) 
ISSN 0976 – 6472(Online) 
Volume 5, Issue 10, October (2014), pp. 34-44 
© IAEME: http://www.iaeme.com/IJECET.asp 
Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 
www.jifactor.com 
IJECET 
© I A E M E 
HARDWARE IMPLEMENTATION OF THE SERPENT 
BLOCK CIPHER USING FPGA TECHNOLOGY 
Mai Hossam Taher1 
Electronics and Communications Dept.Mansoura University, Egypt 
Ali E.Taki El_Deen2 
IEEE senior member, Alexandria University, Egypt 
Mohy E.Abo-Elsoud3 
IEEE senior member, Electronics and Communications Dept. Mansoura University, Egypt 
 34 
 
ABSTRACT 
Governments, military, corporations, financial institutions, hospitals and private businesses 
amass a great deal of confidential information about their employees, customers, products, research 
and financial status. Most of this information is now collected, processed and stored on electronic 
computers and transmitted across networks to other computers. This leads to the need of securing 
data from any unauthorized access. This paper presents the Serpent encryption and the proposed 
decryption algorithms. The results are simulated and implemented design using ModelSim 6.5 and 
Xilinx ISE 14.2 platform. The new Xilinx Spartan-6 is speed up the Serpent algorithm and reduce 
the power consumption. Comparisons with other Symmetric Block Algorithms are discussed. 
Keywords: Cryptography, Serpent, AES, Mars, Twofish, RC6, FPGA, Hardware Implementation. 
1. INTRODUCTION 
Cryptography is referred to as study of secret. This is a process where a readable message is 
converted into a form which is unreadable to others except for the one it is intended to. Whenever 
confidential information is sent, there is possibility of an unauthorized third party attack in order to 
learn the confidential information. Cryptanalysis is the process by which an unintended receiver 
discovers the decryption process, and thereby the plaintext[1]. 
Modern encryption techniques start with the Data Encryption Standard (DES) which was 
developed in the early 1970s at IBM and based on an earlier design by Horst Feistel. But it is expired
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
now because DES has a relatively small 56-bit key which was becoming vulnerable to brute force 
attacks. In addition, the DES was designed primarily for hardware and is relatively slow when 
implemented in software[2]. 
While Triple-DES avoids the problem of a small key size, it is very slow even in hardware; it 
is unsuitable for limited-resource platforms; and it may be affected by potential security issues 
connected with the (today comparatively small) block size of 64 bits. 
For these reasons, the US National Institute of Standards and Technology has issued a call for 
a successor algorithm, to be called the Advanced Encryption Standard or AES. The essential 
requirement is that AES should be both faster than triple DES and at least as secure: it should have a 
128 bit block length and a 256 bit key length (though keys of 128 and 192 bits must also be 
supported).Fifteen algorithms were submitted to the First AES Candidate Conference in August 
1998[3].One year later, NIST announced the five finalists: MARS, RC6™, Rijndael, Serpent and 
Twofish. 
In 2006, Rijndael has also received some criticism suggesting that its mathematical structure 
 35 
 
might lead to attacks in the future. 
Because of above problems that lead to using Serpent block cipher which has the highest 
security factor and simplest design equation. 
Serpent designed by Ross Anderson, Eli Biham and Lars Knudsen as a candidate for the 
Advanced Encryption Standard. It was a finalist in the AES competition. Serpent and Rijndael are 
somewhat similar[4].Although it was not finally selected, Serpent was considered very secure and 
with a high potential in hardware implementations[5]. 
A field-programmable gate array (FPGA) is a large-scale integrated circuit that can be 
programmed after it is manufactured rather than being limited to a predetermined, unchangeable 
hardware function. The term field-programmable refers to the ability to change the operation of the 
device in the field, while gate array is a somewhat dated reference to the basic internal 
architecture that makes this after-the-fact reprogramming possible. 
FPGA chip adoption across all industries is driven by the fact that FPGAs combine the best 
parts of application-specific integrated circuits (ASICs) and processor-based systems. FPGAs 
provide hardware-timed speed and reliability. 
The paper is organized as: Section (2) introduces Serpent Encryption Algorithm. Section (3) 
presents the proposed Serpent Decryption Algorithm. Section (4) discusses Specifics of FPGA 
Implementation. Section (5) Comparisons with other Symmetric Block Cipher are given. Section (6) 
discusses Experimental Results. Section (7). The advantages of Spartan-6 are represented. Finally the 
paper is concluded in section (8). 
2. SERPENT ENCRYPTION ALGORITHM 
Serpent is a 32-round substitution permutation network (SPN) operating on four 32-bit 
words, thus having a block size of 128 bits[3].In fig.1, Serpent encrypts a 128-bit plaintext to a 
128-bit ciphertext in 32 rounds with 33 sub keys. The user key length is assumed to be variable but 
in the proposal, it is fixed to be 128, 192 or 256 bits. It should be mentioned that the short keys with 
less than 256 bits are mapped to 256 bits keys by appending one ’1’ bit to the MSB end followed by 
as many ’0’ bits as required to produce 256 bits. The cipher consists of an initial permutation IP, 
32 rounds, and a final permutation FP. Each round involves a key mixing operation, a pass through 
S-boxes, and a linear transformation. In the last round, the linear transformation is replaced by an 
additional key mixing operation. The whole data path from the plaintext P to the cipher text C can be 
formally described by a sequence of the following equations[6]:
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
B0 := IP( P ) (1) 
 36 
 
Bi+1 := LT( SBoxi mod 8( BKi ) ), i = 0 
… 30 
(2) 
B32:= SBox7 (B31 K31) K32 (3) 
C: = FP (B32) 
(4) 
2.1. Key Mixing 
At each round, a 128-bit sub key is XORed with the current intermediate data  Fig.2. 
2.2. The S-Boxes 
Serpent has 8 individual 1×16 S-Boxes which repeat every 8 round. Every 128-bit input of 
the S-Box will be divided to 32 blocks of 4-bits and every block will be applied to a 4×4 S-Box. The 
outputs of these 32 S-Boxes will be concatenated again together to perform a 128-bit block. 
Fig 1: Serpent Encryption
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
Fig 2: Key Mixing 
 37 
 
2.3. Linear Transform 
The 128-bit output of S-Box will be divided to four 32-bits and these words are linearly 
mixed by some shift, rotate and XOR operations. A complete round of Serpent is described as [6]: 
0, 1, 2,3:= () 
0:= 0  13 
2:= 2  3 
1:= 1 0 2 
3:= 3 2  (0  3) 
1:= 1  1 
3:= 3  7 
0:= 0 1 3 
2:= 2 3  (1  7) 
0:= 0  5 
2:= 2  22 
+1:= 0,1,2,3 
Where  meansLeft Rotation and  means LeftShift. In the last round, this linear 
transform is replaced by an additional key mixing. 
32:= 7(31 31) 32 
3. THE PROPOSED SERPENT DECRYPTION ALGORITHM 
Decryption is different from encryption in that the inverse of the S-boxes must be used in the 
reverse order, as well as the inverse linear transformation and reverse order of the sub keys Fig.3.
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
Fig 3: Decryption 
 38 
 
3.1. Inverse Linear Transform 
The 128-bit will be divided to four 32-bits and these words are linearly mixed by some shift, 
rotate and XOR operations. A complete round of Serpent is described as: 
0, 1, 2, 3:= () 
X2:= X2 22 
0:= 0 5 
2:= 2 X3  (X1 7) 
0:= 0 13 
3:= 3  7 
1:= 1  1 
3:= 3  X2 (X0  3) 
1:= 102 
2:= 2  3 
0:= 0  13 
+1:= 0, 1, 2, 3 
Where  means RightRotation and  means LeftShift. 
4. SPECIFICS OF FPGA IMPLEMENTATION 
Field-programmable gate arrays (FPGAs) are reprogram- able silicon chips. Ross Freeman, 
the cofounder of Xilinx, invented the first FPGA in 1985. 
FPGA devices are a highly promising alternative for implementing private-key cryptographic 
algorithms. Compared with software-based implementations, FPGA implementations can achieve 
superior performance [7]. 
For serpent algorithm to access effective implementation in both software and hardware, 
some specific aspects of FPGA architecture must be chosen. In all FPGA devices from this producer,
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
so called Look-Up Table (LUT) is the element located in every logic cell which is provided for 
generation of any combinational function. Xilinx Spartan-6 XC6SLX45 is chosen. 
In Spartan-6 architecture, in turn, every LUT table has the total capacity of 64b being sufficient for 
generation of a 6-input Boolean function but, alternatively, can be configured for generation of two 
different 5-input functions of the same variables. These configuration nuances will have significant 
impact on implementation of the cipher transformations[8]. 
VHDL stands for VHSIC Hardware Description Language, and VHSIC in turn stands for 
Very High Speed Integrated Circuits. VHDL is an acronym for Very High Speed Integrated Circuit 
Hardware Description Language which is a programming language used to describe a logic circuit 
by function, data flow behaviour, or structure[9]. 
VHDL aims at modeling or documenting electronics systems. Due to the nature of hardware 
components which are always running, VHDL is a highly concurrent language, built upon an event-based 
timing model. A VHDL program can be transformed with a synthesis tool into a netlist, that is, 
 39 
 
a detailed gate-level implementation[10]. 
Serpent code was implemented in Xilinx ISE Design suite version 14.2. 
5. COMPARISON BETWEEN 128-BITS SYMMETRIC BLOCK CIPHERS 
In our implementations, we focused on the safety factor performance because the security is 
the most important factor in the evaluation. Our throughput and Area results are compared with the 
FPGA-based results inNIST final report [11]. Only the cryptographic core of serpent algorithm was 
implemented using FPGA. 
Table 1: Differences between 128 symmetric block ciphers 
Cipher Serpent RC6 Rijndael Twofish Mars 
Structure 
Substitution 
permutation network 
Feistel network 
Substitution-permutation 
network 
Feistel 
network 
Feistel 
network 
Key Size 128, 192, 256-bits 128, 192, 256-bits 128, 192, 256-bits 
Up to 256- 
bits 
Up to 448- 
bits 
No.round 32 20 10 16 32 
No.SubKeys 33 44 11 42 40 
No.SBoxes 8 None 1 8 2 
Size.SBoxes 
64 bits 
(16 x 4) 
- 
2048 bits 
(256 x 8) 
64 bits 
(16 x 4) 
8192 bits 
(256 x 32) 
Total ROM bits 512 - 2048 512 16384 
Speed 69 43 20 18 34 
Safety Factor 3.56 1.18 1.56 2.67 1.90 
Area [Kgates] 504 1,643 613 432 2,936 
Through-put 
[Mbit/s] 
932 204 1,950 394 226 
Key Setup 
Time(μs) 
0.09 0.15 0.20 0.25 3.12
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
 40 
 
6. EXPERIMENTAL RESULTS 
Serpent architectures were implemented in Spartan-6 XC6SLX45 from Xilinx which was 
selected as a representative test platform and it served this role very well. 
Briefly the Implementation of the Serpent algorithm based on FPGA has the following steps: 
• Create design used VHDL codeusing FPGA Adv8.1(Mentor Graphics tools). 
• SimulateRTL(Register Transfer Level) with ModelSim SE 6.3. 
• Synthesize RTL design to target technology with precision synthesis. 
• Design flow to the Xilinx – Project Navigator, ISE 14.2, entry using EDIF file (electronic 
data interchange format) from Mentor Graphics tools. 
• Implement design (Transfer, map, place and route).Once a design is implemented, generate a 
bitstream file, then bit file can be downloaded. 
The simulation results are shown in Fig.4, 5. The RTL results for SBOX and Linear 
Transformation are shown in Fig6, 7, 8, 9. RTL for final encryption block in Xilinx ISE is shown in 
Fig10. 
Advantages of Spartan-6: 
Spartan-6 FPGA increased performance, density, evolutionary feature enhancements and 
Dramatic cost and power reductions[12]. 
Table 2: Differences between Xilinx families 
Feature 
Spartan-3A 
(90nm) 
Spartan-6 
(45nm) 
Logic Cells(Kbit) Up to 55k Up to 150k 
LUT Design 4-input LUT +2FF 6-input LUT +2FF 
Block RAM(Mbit) Up to 2 Mbit Up to 5 Mbit 
Transceiver count / Speed No Up to 8 / Up to 3.125 Gbps 
Memory Interface 400Mbps DDR3 800Mbps 
Max Differential IO 640 Mbps 1050 Mbps 
Multipliers/DSP Up to 126 Multipliers / DSP Up to 184 DSP 48 Blocks 
Memory Controllers No Up to 4 Hard Blocks 
Clock Management DCM only DCM  PLL 
Security Device DNA only Device DNA  AES 
1-Text encryption: 
Plaintext: 
Mai Hossam Taher Ahmed 
Ciphertext: 
¾yI2é-)yÐF°ùö“´l¡ès¶HAÆH+ 
æ‘JE+ 6ï nGO´øEØî–+ 6ï nGO´øEØî–+ 6ï nGO´øEØî–+ 6ï nGO´øEØî– 
+ 6ï nGO´øEØî–+ 6ï nGO´øEØî–
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
 41 
 
Simulation Results: 
(a) 
(b) 
Fig 4: Pre-Synthesis for text using serpent (a) Encryption, and (b) Decryption 
Fig 5: Pre-Synthesis for Image using Serpent Encryption Decryption Block 
Fig 6: RTL Schematic for Serpent Sbox
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 
Fig 7: 
34-44 
Technology Schematic for Serpent Sbox 
Fig 8: RTL Schematic and Technology Schematic of Serpent Linear Transformation 
Fig 9:Mentor Graphics Technology Schematic serpent Encryption 
 42 
 
– 
4 © IAEME
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
Fig 10: Xilinx RTL Schematic of Serpent Encryption 
Table 3: Xilinx ISE XPower Analyzer for SERPENT Encryption Algorithm on Spartan6- 
XC6SLX45 
Table 4: Resource used in the FPGA Implementation of AES using Spartan-3A, Virtex-II, Virtex-5, 
and Spartan-6 
Spartan-3A, Virtex-5 Spartan-6 
Process 90nm 65nm 45nm 
 43 
 
Static Power 
Consumption (mw) 
450 1209 370 
IOS 
Used 15 15 15 
Avail. 372 640 218 
Global 
Buffers 
Used 1 1 1 
Avail. 24 32 32 
LUTs 
Used 9071 7044 4278 
Avail. 11776 69120 27288 
CLB 
Slices 
Used 5279 1870 1494 
Avail. 5888 17280 6822 
Block 
RAMs 
Used 0 0 0 
Avail. 20 400 116
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 
 44 
 
7. CONCLUSION 
No doubt, the AES algorithm is faster, but the Serpent algorithm is more secure. 
Comparisons with other Symmetric Block Cipher have been investigated. In this paper, we have 
successfully implemented the Serpent algorithm using Spartan-6 FPGA device from Xilinx. Finally, 
the results have been shown that the hardware implementation is faster than the software as well as 
increase system security. In addition, it is noted that they save logic area and reduce the power 
consumption. 
REFERENCES 
[1] Richard A. Mollin, “An Introduction to Cryptography”, Second Edition, ISBN: 1584886188 / 
9781584886181, 2005. 
[2] http://www.britanncia.com/EBchecked/topic/145058/cryptology/233467/The-Data- 
Encryption-Standard-and-the-Advanced-Encryption-Standard. 
[3] Anderson, R., Biham, E.  Knudsen, L. (2000). The Case for Serpent. Proc. Third AES 
Candidate Conf.New York, http://csrc.nist.gov/archive/aes/ index.html (accessed April 2012). 
[4] KGaj, P.Chodowiec, “Comparison of the hardware performance of the AES candidates using 
reconfigurable hardware”, The Third Advanced Encryption Standard Candidate Conference, 
April 13–14, 2000, New York, USA (proceedings 
availablefromhttp://csrc.nist.gov/encryption/aes/round2/conf3/aes3conf.htm), 2000. 
[5] Jürgen Becker, Marco Platzner, Serge Vernalde, Field Programmable Logic and 
Application, 14th Edition, ISBN: 978-3-540-22989-6, 2004. 
[6] Anderson, R., Biham, E.  Knudsen, L. (1998).Serpent: A Proposal for the Advanced 
Encryption Standard. Proc. First Advanced Encryption Standard (AES) Candidate Conf. 
Ventura,California, http://www.cl.cam.ac.uk /~rja14/ serpent.html (accessed April 2012). 
[7] Implementation of symmetric block ciphers in popular-grade FPGA Devices, Journal of 
Polish Safety and Reliability Association Summer Safety and Reliability Seminars, Volume 
3, Number 2, 2012. 
[8] JarosławSugier, LOW-COST PROGRAMMABLE HARDWARE SOLUTIONS 
IMPROVING CONFIDENTIALITY IN COMPUTER SYSTEMS, Proceedings of the 13th 
International Conference “Reliability and Statistics in Transportation and Communication” 
(RelStat’13), 16–19 October 2013, Riga, Latvia, p. 387–396, ISBN 978-9984-818-58-0. 
[9] Bibilo, P.N. and Avdeev, N.A., VHDL. Effektivnoeispol’ zovaniepriproektirovaniitsifrovykh 
sistem (VHDL. Effective Use in Design of Digital Systems), Moscow: SOLON_Press, 2006. 
[10] Peter J. Ashenden, VHDL Tutorial, Elsevier Science (USA), 2004. 
[11] Bryan Weeks, Mark Bean, Tom Rozylowicz, Chris Ficke, Hardware Performance 
Simulations of Round 2 Advanced Encryption Standard Algorithms, National Security 
Agency (NSA). 
[12] Xilinx, Inc. (2011). Spartan-6 Family Overview. DS160.PDF, www.xilinx.com (accessed 
April 2012). 
[13] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using 
Reconfigurable Hardware”, International Journal of Computer Engineering  Technology 
(IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 
0976 – 6375. 
[14] Ahmad Salameh Abusukhon, “Block Cipher Encryption for Text-To-Image Algorithm”, 
International Journal of Computer Engineering  Technology (IJCET), Volume 4, Issue 3, 
2013, pp. 50 - 59, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
An approach to hide data in video using steganography
An approach to hide data in video using steganographyAn approach to hide data in video using steganography
An approach to hide data in video using steganographyeSAT Publishing House
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 
modha-2016-cae-652304
modha-2016-cae-652304modha-2016-cae-652304
modha-2016-cae-652304Kruti Modha
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageKevin Tong
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET Journal
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography WorkbookArthyR3
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesIJERA Editor
 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network securityArthyR3
 

What's hot (18)

Network Coding
Network CodingNetwork Coding
Network Coding
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
40120130406011 2-3
40120130406011 2-340120130406011 2-3
40120130406011 2-3
 
An approach to hide data in video using steganography
An approach to hide data in video using steganographyAn approach to hide data in video using steganography
An approach to hide data in video using steganography
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
modha-2016-cae-652304
modha-2016-cae-652304modha-2016-cae-652304
modha-2016-cae-652304
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
G05124550
G05124550G05124550
G05124550
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network security
 

Viewers also liked

A economia da mineração e a sociedade brasileir (.97a)
A economia da mineração e a sociedade brasileir (.97a)A economia da mineração e a sociedade brasileir (.97a)
A economia da mineração e a sociedade brasileir (.97a)mauroamoroso
 
Introducción a la Informática Jurídica
Introducción a la Informática JurídicaIntroducción a la Informática Jurídica
Introducción a la Informática JurídicaDirectorio Tacna
 
Tutorial webquest
Tutorial webquestTutorial webquest
Tutorial webquestameliarlima
 
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FORCopy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FORLimbs AndThings
 
Sparkling Pom Juice
Sparkling Pom Juice Sparkling Pom Juice
Sparkling Pom Juice steve singer
 
010 kmob succes in projectteams gedragsontwikkeling infra
010 kmob succes in projectteams   gedragsontwikkeling infra010 kmob succes in projectteams   gedragsontwikkeling infra
010 kmob succes in projectteams gedragsontwikkeling infraCROW
 
Introduã§ã£o e conclusã£o
Introduã§ã£o e conclusã£oIntroduã§ã£o e conclusã£o
Introduã§ã£o e conclusã£oThassiane Oliveira
 
Kelas ii sd ipa_s rositawaty
Kelas ii sd ipa_s rositawatyKelas ii sd ipa_s rositawaty
Kelas ii sd ipa_s rositawatyw0nd0
 
Guía de derechos y responsabilidades ip
Guía de derechos y responsabilidades ipGuía de derechos y responsabilidades ip
Guía de derechos y responsabilidades ipcantadorantonio
 
Resultado proposta webquest
Resultado proposta webquestResultado proposta webquest
Resultado proposta webquestameliarlima
 
Neurian paiva santos-completo _lendas e mitos
Neurian paiva santos-completo _lendas e mitosNeurian paiva santos-completo _lendas e mitos
Neurian paiva santos-completo _lendas e mitoslimn
 

Viewers also liked (20)

Cachorrinho
CachorrinhoCachorrinho
Cachorrinho
 
A economia da mineração e a sociedade brasileir (.97a)
A economia da mineração e a sociedade brasileir (.97a)A economia da mineração e a sociedade brasileir (.97a)
A economia da mineração e a sociedade brasileir (.97a)
 
Introducción a la Informática Jurídica
Introducción a la Informática JurídicaIntroducción a la Informática Jurídica
Introducción a la Informática Jurídica
 
Tutorial webquest
Tutorial webquestTutorial webquest
Tutorial webquest
 
F:\Resultado De Encuesta1
F:\Resultado De Encuesta1F:\Resultado De Encuesta1
F:\Resultado De Encuesta1
 
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FORCopy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
Copy of I GLEE YOU MORES S THE A TO AND IT THAT M BUT OF MORE FOR
 
Sparkling Pom Juice
Sparkling Pom Juice Sparkling Pom Juice
Sparkling Pom Juice
 
010 kmob succes in projectteams gedragsontwikkeling infra
010 kmob succes in projectteams   gedragsontwikkeling infra010 kmob succes in projectteams   gedragsontwikkeling infra
010 kmob succes in projectteams gedragsontwikkeling infra
 
Undergraduate ru
Undergraduate ruUndergraduate ru
Undergraduate ru
 
Facebook
FacebookFacebook
Facebook
 
La carta
La cartaLa carta
La carta
 
Ilusao de otica
Ilusao de oticaIlusao de otica
Ilusao de otica
 
Introduã§ã£o e conclusã£o
Introduã§ã£o e conclusã£oIntroduã§ã£o e conclusã£o
Introduã§ã£o e conclusã£o
 
1112
11121112
1112
 
Kelas ii sd ipa_s rositawaty
Kelas ii sd ipa_s rositawatyKelas ii sd ipa_s rositawaty
Kelas ii sd ipa_s rositawaty
 
Guía de derechos y responsabilidades ip
Guía de derechos y responsabilidades ipGuía de derechos y responsabilidades ip
Guía de derechos y responsabilidades ip
 
Natureza parte 2
Natureza parte 2Natureza parte 2
Natureza parte 2
 
Resultado proposta webquest
Resultado proposta webquestResultado proposta webquest
Resultado proposta webquest
 
Neurian paiva santos-completo _lendas e mitos
Neurian paiva santos-completo _lendas e mitosNeurian paiva santos-completo _lendas e mitos
Neurian paiva santos-completo _lendas e mitos
 
10 rol 2014 b
10 rol 2014 b10 rol 2014 b
10 rol 2014 b
 

Similar to Hardware implementation of the serpent block cipher using fpga technology

Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithmsijsrd.com
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2IAEME Publication
 
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3GOptimized architecture for SNOW 3G
Optimized architecture for SNOW 3GIJECEIAES
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmTELKOMNIKA JOURNAL
 
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic AlgorithmsIOSR Journals
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONcscpconf
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...IJECEIAES
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor csandit
 
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORSMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORcscpconf
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISijcisjournal
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...IOSR Journals
 

Similar to Hardware implementation of the serpent block cipher using fpga technology (20)

Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Aes
AesAes
Aes
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
 
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3GOptimized architecture for SNOW 3G
Optimized architecture for SNOW 3G
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
 
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic Algorithms
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor
 
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORSMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSOR
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
A03530107
A03530107A03530107
A03530107
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Hardware implementation of the serpent block cipher using fpga technology

  • 1. International INTERNATIONAL Journal of Electronics and Communication JOURNAL Engineering OF ELECTRONICS & Technology (IJECET), AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 01-33 © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com IJECET © I A E M E HARDWARE IMPLEMENTATION OF THE SERPENT BLOCK CIPHER USING FPGA TECHNOLOGY Mai Hossam Taher1 Electronics and Communications Dept.Mansoura University, Egypt Ali E.Taki El_Deen2 IEEE senior member, Alexandria University, Egypt Mohy E.Abo-Elsoud3 IEEE senior member, Electronics and Communications Dept. Mansoura University, Egypt 34 ABSTRACT Governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. This leads to the need of securing data from any unauthorized access. This paper presents the Serpent encryption and the proposed decryption algorithms. The results are simulated and implemented design using ModelSim 6.5 and Xilinx ISE 14.2 platform. The new Xilinx Spartan-6 is speed up the Serpent algorithm and reduce the power consumption. Comparisons with other Symmetric Block Algorithms are discussed. Keywords: Cryptography, Serpent, AES, Mars, Twofish, RC6, FPGA, Hardware Implementation. 1. INTRODUCTION Cryptography is referred to as study of secret. This is a process where a readable message is converted into a form which is unreadable to others except for the one it is intended to. Whenever confidential information is sent, there is possibility of an unauthorized third party attack in order to learn the confidential information. Cryptanalysis is the process by which an unintended receiver discovers the decryption process, and thereby the plaintext[1]. Modern encryption techniques start with the Data Encryption Standard (DES) which was developed in the early 1970s at IBM and based on an earlier design by Horst Feistel. But it is expired
  • 2. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME now because DES has a relatively small 56-bit key which was becoming vulnerable to brute force attacks. In addition, the DES was designed primarily for hardware and is relatively slow when implemented in software[2]. While Triple-DES avoids the problem of a small key size, it is very slow even in hardware; it is unsuitable for limited-resource platforms; and it may be affected by potential security issues connected with the (today comparatively small) block size of 64 bits. For these reasons, the US National Institute of Standards and Technology has issued a call for a successor algorithm, to be called the Advanced Encryption Standard or AES. The essential requirement is that AES should be both faster than triple DES and at least as secure: it should have a 128 bit block length and a 256 bit key length (though keys of 128 and 192 bits must also be supported).Fifteen algorithms were submitted to the First AES Candidate Conference in August 1998[3].One year later, NIST announced the five finalists: MARS, RC6™, Rijndael, Serpent and Twofish. In 2006, Rijndael has also received some criticism suggesting that its mathematical structure 35 might lead to attacks in the future. Because of above problems that lead to using Serpent block cipher which has the highest security factor and simplest design equation. Serpent designed by Ross Anderson, Eli Biham and Lars Knudsen as a candidate for the Advanced Encryption Standard. It was a finalist in the AES competition. Serpent and Rijndael are somewhat similar[4].Although it was not finally selected, Serpent was considered very secure and with a high potential in hardware implementations[5]. A field-programmable gate array (FPGA) is a large-scale integrated circuit that can be programmed after it is manufactured rather than being limited to a predetermined, unchangeable hardware function. The term field-programmable refers to the ability to change the operation of the device in the field, while gate array is a somewhat dated reference to the basic internal architecture that makes this after-the-fact reprogramming possible. FPGA chip adoption across all industries is driven by the fact that FPGAs combine the best parts of application-specific integrated circuits (ASICs) and processor-based systems. FPGAs provide hardware-timed speed and reliability. The paper is organized as: Section (2) introduces Serpent Encryption Algorithm. Section (3) presents the proposed Serpent Decryption Algorithm. Section (4) discusses Specifics of FPGA Implementation. Section (5) Comparisons with other Symmetric Block Cipher are given. Section (6) discusses Experimental Results. Section (7). The advantages of Spartan-6 are represented. Finally the paper is concluded in section (8). 2. SERPENT ENCRYPTION ALGORITHM Serpent is a 32-round substitution permutation network (SPN) operating on four 32-bit words, thus having a block size of 128 bits[3].In fig.1, Serpent encrypts a 128-bit plaintext to a 128-bit ciphertext in 32 rounds with 33 sub keys. The user key length is assumed to be variable but in the proposal, it is fixed to be 128, 192 or 256 bits. It should be mentioned that the short keys with less than 256 bits are mapped to 256 bits keys by appending one ’1’ bit to the MSB end followed by as many ’0’ bits as required to produce 256 bits. The cipher consists of an initial permutation IP, 32 rounds, and a final permutation FP. Each round involves a key mixing operation, a pass through S-boxes, and a linear transformation. In the last round, the linear transformation is replaced by an additional key mixing operation. The whole data path from the plaintext P to the cipher text C can be formally described by a sequence of the following equations[6]:
  • 3. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME B0 := IP( P ) (1) 36 Bi+1 := LT( SBoxi mod 8( BKi ) ), i = 0 … 30 (2) B32:= SBox7 (B31 K31) K32 (3) C: = FP (B32) (4) 2.1. Key Mixing At each round, a 128-bit sub key is XORed with the current intermediate data Fig.2. 2.2. The S-Boxes Serpent has 8 individual 1×16 S-Boxes which repeat every 8 round. Every 128-bit input of the S-Box will be divided to 32 blocks of 4-bits and every block will be applied to a 4×4 S-Box. The outputs of these 32 S-Boxes will be concatenated again together to perform a 128-bit block. Fig 1: Serpent Encryption
  • 4. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME Fig 2: Key Mixing 37 2.3. Linear Transform The 128-bit output of S-Box will be divided to four 32-bits and these words are linearly mixed by some shift, rotate and XOR operations. A complete round of Serpent is described as [6]: 0, 1, 2,3:= () 0:= 0 13 2:= 2 3 1:= 1 0 2 3:= 3 2 (0 3) 1:= 1 1 3:= 3 7 0:= 0 1 3 2:= 2 3 (1 7) 0:= 0 5 2:= 2 22 +1:= 0,1,2,3 Where meansLeft Rotation and means LeftShift. In the last round, this linear transform is replaced by an additional key mixing. 32:= 7(31 31) 32 3. THE PROPOSED SERPENT DECRYPTION ALGORITHM Decryption is different from encryption in that the inverse of the S-boxes must be used in the reverse order, as well as the inverse linear transformation and reverse order of the sub keys Fig.3.
  • 5. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME Fig 3: Decryption 38 3.1. Inverse Linear Transform The 128-bit will be divided to four 32-bits and these words are linearly mixed by some shift, rotate and XOR operations. A complete round of Serpent is described as: 0, 1, 2, 3:= () X2:= X2 22 0:= 0 5 2:= 2 X3 (X1 7) 0:= 0 13 3:= 3 7 1:= 1 1 3:= 3 X2 (X0 3) 1:= 102 2:= 2 3 0:= 0 13 +1:= 0, 1, 2, 3 Where means RightRotation and means LeftShift. 4. SPECIFICS OF FPGA IMPLEMENTATION Field-programmable gate arrays (FPGAs) are reprogram- able silicon chips. Ross Freeman, the cofounder of Xilinx, invented the first FPGA in 1985. FPGA devices are a highly promising alternative for implementing private-key cryptographic algorithms. Compared with software-based implementations, FPGA implementations can achieve superior performance [7]. For serpent algorithm to access effective implementation in both software and hardware, some specific aspects of FPGA architecture must be chosen. In all FPGA devices from this producer,
  • 6. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME so called Look-Up Table (LUT) is the element located in every logic cell which is provided for generation of any combinational function. Xilinx Spartan-6 XC6SLX45 is chosen. In Spartan-6 architecture, in turn, every LUT table has the total capacity of 64b being sufficient for generation of a 6-input Boolean function but, alternatively, can be configured for generation of two different 5-input functions of the same variables. These configuration nuances will have significant impact on implementation of the cipher transformations[8]. VHDL stands for VHSIC Hardware Description Language, and VHSIC in turn stands for Very High Speed Integrated Circuits. VHDL is an acronym for Very High Speed Integrated Circuit Hardware Description Language which is a programming language used to describe a logic circuit by function, data flow behaviour, or structure[9]. VHDL aims at modeling or documenting electronics systems. Due to the nature of hardware components which are always running, VHDL is a highly concurrent language, built upon an event-based timing model. A VHDL program can be transformed with a synthesis tool into a netlist, that is, 39 a detailed gate-level implementation[10]. Serpent code was implemented in Xilinx ISE Design suite version 14.2. 5. COMPARISON BETWEEN 128-BITS SYMMETRIC BLOCK CIPHERS In our implementations, we focused on the safety factor performance because the security is the most important factor in the evaluation. Our throughput and Area results are compared with the FPGA-based results inNIST final report [11]. Only the cryptographic core of serpent algorithm was implemented using FPGA. Table 1: Differences between 128 symmetric block ciphers Cipher Serpent RC6 Rijndael Twofish Mars Structure Substitution permutation network Feistel network Substitution-permutation network Feistel network Feistel network Key Size 128, 192, 256-bits 128, 192, 256-bits 128, 192, 256-bits Up to 256- bits Up to 448- bits No.round 32 20 10 16 32 No.SubKeys 33 44 11 42 40 No.SBoxes 8 None 1 8 2 Size.SBoxes 64 bits (16 x 4) - 2048 bits (256 x 8) 64 bits (16 x 4) 8192 bits (256 x 32) Total ROM bits 512 - 2048 512 16384 Speed 69 43 20 18 34 Safety Factor 3.56 1.18 1.56 2.67 1.90 Area [Kgates] 504 1,643 613 432 2,936 Through-put [Mbit/s] 932 204 1,950 394 226 Key Setup Time(μs) 0.09 0.15 0.20 0.25 3.12
  • 7. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 40 6. EXPERIMENTAL RESULTS Serpent architectures were implemented in Spartan-6 XC6SLX45 from Xilinx which was selected as a representative test platform and it served this role very well. Briefly the Implementation of the Serpent algorithm based on FPGA has the following steps: • Create design used VHDL codeusing FPGA Adv8.1(Mentor Graphics tools). • SimulateRTL(Register Transfer Level) with ModelSim SE 6.3. • Synthesize RTL design to target technology with precision synthesis. • Design flow to the Xilinx – Project Navigator, ISE 14.2, entry using EDIF file (electronic data interchange format) from Mentor Graphics tools. • Implement design (Transfer, map, place and route).Once a design is implemented, generate a bitstream file, then bit file can be downloaded. The simulation results are shown in Fig.4, 5. The RTL results for SBOX and Linear Transformation are shown in Fig6, 7, 8, 9. RTL for final encryption block in Xilinx ISE is shown in Fig10. Advantages of Spartan-6: Spartan-6 FPGA increased performance, density, evolutionary feature enhancements and Dramatic cost and power reductions[12]. Table 2: Differences between Xilinx families Feature Spartan-3A (90nm) Spartan-6 (45nm) Logic Cells(Kbit) Up to 55k Up to 150k LUT Design 4-input LUT +2FF 6-input LUT +2FF Block RAM(Mbit) Up to 2 Mbit Up to 5 Mbit Transceiver count / Speed No Up to 8 / Up to 3.125 Gbps Memory Interface 400Mbps DDR3 800Mbps Max Differential IO 640 Mbps 1050 Mbps Multipliers/DSP Up to 126 Multipliers / DSP Up to 184 DSP 48 Blocks Memory Controllers No Up to 4 Hard Blocks Clock Management DCM only DCM PLL Security Device DNA only Device DNA AES 1-Text encryption: Plaintext: Mai Hossam Taher Ahmed Ciphertext: ¾yI2é-)yÐF°ùö“´l¡ès¶HAÆH+ æ‘JE+ 6ï nGO´øEØî–+ 6ï nGO´øEØî–+ 6ï nGO´øEØî–+ 6ï nGO´øEØî– + 6ï nGO´øEØî–+ 6ï nGO´øEØî–
  • 8. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 41 Simulation Results: (a) (b) Fig 4: Pre-Synthesis for text using serpent (a) Encryption, and (b) Decryption Fig 5: Pre-Synthesis for Image using Serpent Encryption Decryption Block Fig 6: RTL Schematic for Serpent Sbox
  • 9. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. Fig 7: 34-44 Technology Schematic for Serpent Sbox Fig 8: RTL Schematic and Technology Schematic of Serpent Linear Transformation Fig 9:Mentor Graphics Technology Schematic serpent Encryption 42 – 4 © IAEME
  • 10. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME Fig 10: Xilinx RTL Schematic of Serpent Encryption Table 3: Xilinx ISE XPower Analyzer for SERPENT Encryption Algorithm on Spartan6- XC6SLX45 Table 4: Resource used in the FPGA Implementation of AES using Spartan-3A, Virtex-II, Virtex-5, and Spartan-6 Spartan-3A, Virtex-5 Spartan-6 Process 90nm 65nm 45nm 43 Static Power Consumption (mw) 450 1209 370 IOS Used 15 15 15 Avail. 372 640 218 Global Buffers Used 1 1 1 Avail. 24 32 32 LUTs Used 9071 7044 4278 Avail. 11776 69120 27288 CLB Slices Used 5279 1870 1494 Avail. 5888 17280 6822 Block RAMs Used 0 0 0 Avail. 20 400 116
  • 11. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 10, October (2014), pp. 34-44 © IAEME 44 7. CONCLUSION No doubt, the AES algorithm is faster, but the Serpent algorithm is more secure. Comparisons with other Symmetric Block Cipher have been investigated. In this paper, we have successfully implemented the Serpent algorithm using Spartan-6 FPGA device from Xilinx. Finally, the results have been shown that the hardware implementation is faster than the software as well as increase system security. In addition, it is noted that they save logic area and reduce the power consumption. REFERENCES [1] Richard A. Mollin, “An Introduction to Cryptography”, Second Edition, ISBN: 1584886188 / 9781584886181, 2005. [2] http://www.britanncia.com/EBchecked/topic/145058/cryptology/233467/The-Data- Encryption-Standard-and-the-Advanced-Encryption-Standard. [3] Anderson, R., Biham, E. Knudsen, L. (2000). The Case for Serpent. Proc. Third AES Candidate Conf.New York, http://csrc.nist.gov/archive/aes/ index.html (accessed April 2012). [4] KGaj, P.Chodowiec, “Comparison of the hardware performance of the AES candidates using reconfigurable hardware”, The Third Advanced Encryption Standard Candidate Conference, April 13–14, 2000, New York, USA (proceedings availablefromhttp://csrc.nist.gov/encryption/aes/round2/conf3/aes3conf.htm), 2000. [5] Jürgen Becker, Marco Platzner, Serge Vernalde, Field Programmable Logic and Application, 14th Edition, ISBN: 978-3-540-22989-6, 2004. [6] Anderson, R., Biham, E. Knudsen, L. (1998).Serpent: A Proposal for the Advanced Encryption Standard. Proc. First Advanced Encryption Standard (AES) Candidate Conf. Ventura,California, http://www.cl.cam.ac.uk /~rja14/ serpent.html (accessed April 2012). [7] Implementation of symmetric block ciphers in popular-grade FPGA Devices, Journal of Polish Safety and Reliability Association Summer Safety and Reliability Seminars, Volume 3, Number 2, 2012. [8] JarosławSugier, LOW-COST PROGRAMMABLE HARDWARE SOLUTIONS IMPROVING CONFIDENTIALITY IN COMPUTER SYSTEMS, Proceedings of the 13th International Conference “Reliability and Statistics in Transportation and Communication” (RelStat’13), 16–19 October 2013, Riga, Latvia, p. 387–396, ISBN 978-9984-818-58-0. [9] Bibilo, P.N. and Avdeev, N.A., VHDL. Effektivnoeispol’ zovaniepriproektirovaniitsifrovykh sistem (VHDL. Effective Use in Design of Digital Systems), Moscow: SOLON_Press, 2006. [10] Peter J. Ashenden, VHDL Tutorial, Elsevier Science (USA), 2004. [11] Bryan Weeks, Mark Bean, Tom Rozylowicz, Chris Ficke, Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms, National Security Agency (NSA). [12] Xilinx, Inc. (2011). Spartan-6 Family Overview. DS160.PDF, www.xilinx.com (accessed April 2012). [13] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [14] Ahmad Salameh Abusukhon, “Block Cipher Encryption for Text-To-Image Algorithm”, International Journal of Computer Engineering Technology (IJCET), Volume 4, Issue 3, 2013, pp. 50 - 59, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.