SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME
79
VHDL MODELING OF THE SRAM MODULE AND STATE
MACHINE CONTROLLER (SMC) MODULE OF RC4
STREAM CIPHER ALGORITHM FOR Wi-Fi
ENCRYPTION
Dr.A.M. Bhavikatti1
Mallikarjun.Mugali2
1,2
Dept of CSE, BKIT, Bhalki, Karnataka State, India
ABSTRACT
In this paper, VHDL modeling of the SRAM module and State Machine Controller (SMC)
module of RC4 stream cipher algorithm for Wi-Fi encryption is proposed. Various individual
modules of Wi-Fi security have been designed, verified functionally using VHDL-simulator.
In cryptography RC4 is the most widely used software stream cipher and is used in popular protocols
such as Transport Layer Security (TLS) (to protect Internet traffic) and WEP (to secure wireless
networks). While remarkable for its simplicity and speed in software, RC4 has weaknesses that argue
against its use in new systems. It is especially vulnerable when the beginning of the output key
stream is not discarded, or when nonrandom or related keys are used; some ways of using RC4 can
lead to very insecure cryptosystems such as WEP. Many stream ciphers are based on linear feedback
shift registers (LFSRs), which, while efficient in hardware, are less so in software. The design of
RC4 avoids the use of LFSRs, and is ideal for software implementation, as it requires only byte
manipulations. The RC4 algorithm will be implemented by FPGA using VHDL software platform.
Key words: VHDL simulation, RC4 stream cipher, SRAM module, State machine diagram
I. INTRODUCTION TO RC4 STREAM CIPHER
Cryptographic algorithms that can provide fast implementation, small size, low complexity,
and high security for resource-constrained devices such as wireless sensor devices are imperative.
Conventional cryptographic algorithms are very complex and consume significant amount of energy
when used by resource constrained devices for the provision of secure communication, and public
key algorithms are still not feasible in sensor networks for several reasons including limited storage
and excessive energy usage [1]. Therefore, security schemes should rely on a symmetric key
INTERNATIONAL JOURNAL OF ELECTRONICS AND
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 6, Issue 1, January (2015), pp. 79-85
© IAEME: http://www.iaeme.com/IJECET.asp
Journal Impact Factor (2015): 7.9817 (Calculated by GISI)
www.jifactor.com
IJECET
© I A E M E
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME
80
cryptography especially when systems have limited hardware resources. There are a number of
stream cipher algorithms presented to implement high performance software including IDEA,
ORYX, LEVIATHAN, MUGI, RC4, Helix, SEAL, SOBER, and SNOW. RC4 is a proprietary
stream cipher which was designed in 1987 by Ron Rivest. RC4 is widely used in security software
based on stream cipher including one in the encryption of traffic to and from secure web sites such as
Transport Layer Security (TLS), Secure Socket Layer (SSL), and Wired Equivalent Privacy (WEP)
implementations. RC4 is fast in comparison to other algorithms and it has a simple design hardware
implementation [2]. For instance, RC4 is five times faster than Data Encryption Standard (DES) and
fifteen times faster than Triple-DES [3].
RC4 has been used as the data encryption algorithm for many applications and protocols.
Some of the protocols and applications using RC4 include the Wi-Fi, Skype, and Bit Torrent, to
name a few. Several efficient approaches to the implementation of RC4 have been proposed [4].
II. PROPOSED BLOCK DIAGRAM OF RC4 STREAM CIPHER
The block diagram of the proposed architecture is shown in Figure1below. The block
diagram can be divided in to 6 different sub modules as shown and these sub modules are i)The
payload data processor and controller ii) SMC iii) Key set up and key stream generation block iv) K-
Stream serializer v) KRAM(256× 8) vi) Multiplexer. As it is not possible to present all the
simulation results in a single paper, it is divided in to three parts and first two parts are already
presented in [5] and [6]. So, these modules are not discussed further in this paper. This paper deals
with simulation of SRAM (256× 8) module, State Machine Controller (SMC) modules and an
analysis of RC4 algorithm state machine diagram.
Fig 1 Simulated module of Wi-Fi Encryption architecture
III. SIMULATION OF SRAM(256× 8) MODULE
The module SRAM is similar to KRAM. It is used to store the data from 0 to 255 at the
address from 0 to 255 i.e. same data is assigned to the same memory location. The address is
assigned by the output of Addr1.In this if MemWr is 1 and MemRd is 0, then data is written in to the
RAM and if if MemWr is 0 and MemRd is 1, then data is read out one by one from the RAM. Data is
International Journal of Electronics and Communication Engineering &
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp.
given in parallel form and is read out in parallel
and Fig 3 shows the simulated waveforms of SRAM
Fig 2
IV ANALYSIS OF RC4 ALGORITHM STATE MACHINE DIAGRAM
Different states of state machine
Algorithm state machine diagram.
4.1 Idle state: Data is at original state.
4.2 Initial state: In this state, first we fill the SRAM and KRAM. To fill both the RAM, the data is
given directly to the KRAM for filling the data randomly as a DataBus and address is given by
Addr1.The data at SRAM is filled with the help of
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
6472(Online), Volume 6, Issue 1, January (2015), pp.
81
in parallel form and is read out in parallel form. Fig 2 shows the simulated module of SRAM
and Fig 3 shows the simulated waveforms of SRAM.
Fig 2 Simulated module of SRAM
Fig 3 Simulated waveforms of SRAM
ALGORITHM STATE MACHINE DIAGRAM
Different states of state machine diagram are explained briefly here.
diagram.
Data is at original state.
In this state, first we fill the SRAM and KRAM. To fill both the RAM, the data is
given directly to the KRAM for filling the data randomly as a DataBus and address is given by
The data at SRAM is filled with the help of Addr1 which gives the address
Technology (IJECET), ISSN
6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME
Fig 2 shows the simulated module of SRAM
ALGORITHM STATE MACHINE DIAGRAM
are explained briefly here. Fig 4 shows RC4
In this state, first we fill the SRAM and KRAM. To fill both the RAM, the data is
given directly to the KRAM for filling the data randomly as a DataBus and address is given by
Addr1 which gives the address and at the same
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME
82
time, same data comes from the DataMux and are loaded at the same address. Addr1 gives the
location from 0 to 255(as cnt255) in both the RAM. The output of Addr1 is given to the-----
Fig 4 RC4 Algorithm state machine diagram
---KRAM that gives the address for DataBus of KRAM. The input of SRAM (as Addr[7:0]) show
address and Data fill linearly from DataIn as S0=0, S1=1,S2=2,-------S255=255.The initial state
exists till the SRAM/KRAM fill completely( all 255 locations).After filling, initialOver=1, and state
go to Addr2Cal state.
4.3 Addr2Cal state: In this state, Mux gives the KeyDataOut as MuxOut by selecting the Scl=1, and
SRAM gives the data through DataOut to DataDMux and SellDataOut select this DataOut as SR1
[7:0] and load this value in S_Reg1 and all these values from A2, SR1 and MuxOut are added.
4.4 Addr2Ld state: In this state, the output of Adder 1(Adder 1Out) is loaded in to the Addr2
register.
4.5 SJ State: Loaded value at Addr2 gives j value. This j value is the address, which is selected by
SelAddr(3:0) of AddrMux. The output of AddrMux gives address of SRAM. The value of that
location is obtained as DataOut, selected by DatMux as SR2 [7:0] and stored at S_Reg2 as SJ.
4.6 Swap SI: In this state, the address is taken from Addr2, which is selected by AddrMux as
Addr[7:0] and the data is loaded on this address of SRAM as DataIn by selecting Reg2[7:0] through
DataMux.
4.7 Swap SJ: In this state, the address is taken from Addr1, which is selected by AddrMux as
Addr[7:0] and the data is loaded on this address of SRAM as DataIn by selecting Reg1[7:0] through
DataMux.
All process like Addr2Cal, Addr2Ld, SJ, Swap SI and Swap SJ occurred 255 times. When
Keysetupover=1, Flag=1, then it goes to Addr2Gen state.
4.8 Addr2Gen state: At this state, again we obtained the value of J by KeySetup phase.
4.9TCal state: When Swap SJ is complete, flag will be high and reaches the TCal state.
International Journal of Electronics and Communication Engineering &
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp.
4.10Kbyte state: The data was given to FIFO in
4.11 Encryption state: The key data byte from K_StreamSerializer and plaintext from
DataSerializer comes out serially in the form of bits.
IV. STATE MACHINE CONTROLLER (SMC) MODULE
This is considered as the
Controller (SMC) module. By this, we can control all the modules .This state machine will work
whenever InitialOver and KeySetUpOver are high.
step. First it controls Addr, SRAM and KRAM. When enable is high means that it was writing key
data in it. Then it is going to the
input and it is given to the SRAM and this process run up to 256 times.
key data bytes is performed. Then it goes to Adder 2Gen.In this state, it takes the data from S_Reg
and gives it to the Adder i.e in Adder 2Ld.It adds the given
the help of AddrMux, which swap it and then gives it to the K_SteamSerilizer. At the same time,
with the help of FIFO, the available
parallel data input to serial output, which is further EX
6(a) and (b) shows the simulation waveforms of State Machine Controller (SMC) module
Fig 5 State Machine Controller (SMC) module
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
6472(Online), Volume 6, Issue 1, January (2015), pp.
83
The data was given to FIFO in the initial state is now loaded in to DataSerializer.
The key data byte from K_StreamSerializer and plaintext from
DataSerializer comes out serially in the form of bits.
STATE MACHINE CONTROLLER (SMC) MODULE
This is considered as the heart of the whole architecture. Fig 5 shows the State Machine
By this, we can control all the modules .This state machine will work
whenever InitialOver and KeySetUpOver are high. This means that all the modules will work step by
SRAM and KRAM. When enable is high means that it was writing key
another state i.e. Adder 2Ld. In this state, adder will add the given
and it is given to the SRAM and this process run up to 256 times. In this process, swapping of
key data bytes is performed. Then it goes to Adder 2Gen.In this state, it takes the data from S_Reg
and gives it to the Adder i.e in Adder 2Ld.It adds the given input and then gives it to the SRAM with
the help of AddrMux, which swap it and then gives it to the K_SteamSerilizer. At the same time,
available KeyData is given to the DataSerilizer. Both sterilizers convert
ut to serial output, which is further EX-ORed to give the encrypted data serially.
6(a) and (b) shows the simulation waveforms of State Machine Controller (SMC) module
State Machine Controller (SMC) module
Technology (IJECET), ISSN
6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME
the initial state is now loaded in to DataSerializer.
The key data byte from K_StreamSerializer and plaintext from
Fig 5 shows the State Machine
By this, we can control all the modules .This state machine will work
This means that all the modules will work step by
SRAM and KRAM. When enable is high means that it was writing key
In this state, adder will add the given
In this process, swapping of
key data bytes is performed. Then it goes to Adder 2Gen.In this state, it takes the data from S_Reg
input and then gives it to the SRAM with
the help of AddrMux, which swap it and then gives it to the K_SteamSerilizer. At the same time,
is given to the DataSerilizer. Both sterilizers convert
ORed to give the encrypted data serially. Fig
6(a) and (b) shows the simulation waveforms of State Machine Controller (SMC) module
International Journal of Electronics and Communication Engineering &
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp.
Fig 6(a) Simulation waveforms of
Fig 6(b) Simulation waveforms of State Machine Controller (SMC) module
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
6472(Online), Volume 6, Issue 1, January (2015), pp.
84
Simulation waveforms of State Machine Controller (SMC) module
Simulation waveforms of State Machine Controller (SMC) module
Technology (IJECET), ISSN
6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME
State Machine Controller (SMC) module
Simulation waveforms of State Machine Controller (SMC) module
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME
85
T a b l e 1 D e t a i l s o f S i m u la t i o n
V. CONCLUSIONS
Various individual modules of RC4 stream cipher for Wi-Fi security have been designed,
verified functionally using VHDL Simulator, synthesized by the synthesis tool and a final net list has
been created. The proposed design provides high data throughput using 8-bit word and variable key
length, from 8-bit to 128-bit. The proposed system achieves a data throughput of up to 22Mbps at a
clock frequency of 64 MHz .The design has been synthesized using FPGA technology from Xilinx.
Table 1 below shows the details of simulation. The measurement result and comparison with
previous implementation prove that the one proposed is flexible solution for any cryptographic
system.
VI. REFERENCES
1. Sharma K, Ghose MK, Kumar D, Singh RPK, Pandey VK, “A comparative study of various
security approaches used in wireless sensor networks” Int J Adv Sci Technol, 177(77), 2010.
2. Gupta SS, Chattopadhyay A, Sinha K, Maitra S, Sinha B, “ High-performance hardware
implementation for RC4 stream cipher” IEEE Trans Comput 62(4):730–743,2013.
3. Ahmad S, Beg MR, Abbas Q, Ahmad J, Atif S, “ Comparative study between stream cipher
and block cipher using RC4 and Hill Cipher” Int J Comput Appl (0975–8887), 1(25),2010.
4. Disha Handa, Bhanu Kapoor “ State of the Art Realistic Cryptographic Approaches for RC4
Symmetric Stream Cipher”, International Journal on Computational Sciences & Applications
(IJCSA) Vol.4, No.4, August 2014.
5. A.M.Bhavikatti, S. Srinivas Rao “VHDL Modeling of the payload data processor and
controller of RC4 stream cipher for Wi-Fi encryption” ,ICVED-2008, Proceedings of
International Conference on Embedded system & VLSI Design, 20-21 March 2008, at
PDVVP College of Engineering, Ahmednagar.
6. Dr.A.M.Bhavikatti, “VHDL Simulation of KRAM, Multiplexer and K Stream serializer
modules of RC4 Stream Cipher for Wi-Fi Security” ,International Journal of Advances in
Wireless and Mobile Communications (AWMC) ,ISSN 0973-6972, Volume 6, Number 1,
pp17-23,2013.
7. Meha Sharma and Rewa Sharma, “VHDL Implementation of Discrete Wavelet
Transformation For Efficient Power Systems” International journal of Electronics and
Communication Engineering &Technology (IJECET), Volume 1, Issue 1, 2010, pp. 10 - 20,
ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
8. Sapna and Prof. B. P. Singh, “Low Power SRAM” International journal of Electronics and
Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2013, pp. 257 -
263, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

More Related Content

What's hot

Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...
Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...
Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...CSCJournals
 
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...IJERA Editor
 
implementation and design of 32-bit adder
implementation and design of 32-bit adderimplementation and design of 32-bit adder
implementation and design of 32-bit adderveereshwararao
 
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...IJERA Editor
 
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET Journal
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder ijcisjournal
 
Viterbi decoder in optical comm system
Viterbi decoder in optical comm systemViterbi decoder in optical comm system
Viterbi decoder in optical comm systemBoni Anissuzzaman
 
Area, Delay and Power Comparison of Adder Topologies
Area, Delay and Power Comparison of Adder TopologiesArea, Delay and Power Comparison of Adder Topologies
Area, Delay and Power Comparison of Adder TopologiesVLSICS Design
 
A Computers Architecture project on Barrel shifters
A Computers Architecture project on Barrel shiftersA Computers Architecture project on Barrel shifters
A Computers Architecture project on Barrel shifterssvrohith 9
 
Speed Control of Three Phase Induction Motor Using Neural Network
Speed Control of Three Phase Induction Motor Using Neural NetworkSpeed Control of Three Phase Induction Motor Using Neural Network
Speed Control of Three Phase Induction Motor Using Neural NetworkIJCSIS Research Publications
 
High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...IJMER
 
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-HardwareImplementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-HardwareIJMER
 
Optimization MVSIS vs AIG Rewriting (ABC)
Optimization MVSIS vs AIG Rewriting (ABC)Optimization MVSIS vs AIG Rewriting (ABC)
Optimization MVSIS vs AIG Rewriting (ABC)IJEEE
 
Design of Linear Plasma Position Controllers with Intelligent Feedback System...
Design of Linear Plasma Position Controllers with Intelligent Feedback System...Design of Linear Plasma Position Controllers with Intelligent Feedback System...
Design of Linear Plasma Position Controllers with Intelligent Feedback System...IJECEIAES
 
Design of 64 bit error tolerant adder
Design of 64 bit error tolerant adderDesign of 64 bit error tolerant adder
Design of 64 bit error tolerant adderiaemedu
 
IRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP CoreIRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP CoreIRJET Journal
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...ijsrd.com
 
Implementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's mapImplementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's mapijcsit
 

What's hot (20)

Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...
Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...
Design of Binary to BCD Code Converter using Area Optimized Quantum Dot Cellu...
 
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
 
implementation and design of 32-bit adder
implementation and design of 32-bit adderimplementation and design of 32-bit adder
implementation and design of 32-bit adder
 
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
 
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder
 
Viterbi decoder in optical comm system
Viterbi decoder in optical comm systemViterbi decoder in optical comm system
Viterbi decoder in optical comm system
 
Area, Delay and Power Comparison of Adder Topologies
Area, Delay and Power Comparison of Adder TopologiesArea, Delay and Power Comparison of Adder Topologies
Area, Delay and Power Comparison of Adder Topologies
 
A Computers Architecture project on Barrel shifters
A Computers Architecture project on Barrel shiftersA Computers Architecture project on Barrel shifters
A Computers Architecture project on Barrel shifters
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
Speed Control of Three Phase Induction Motor Using Neural Network
Speed Control of Three Phase Induction Motor Using Neural NetworkSpeed Control of Three Phase Induction Motor Using Neural Network
Speed Control of Three Phase Induction Motor Using Neural Network
 
High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...
 
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-HardwareImplementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
 
Optimization MVSIS vs AIG Rewriting (ABC)
Optimization MVSIS vs AIG Rewriting (ABC)Optimization MVSIS vs AIG Rewriting (ABC)
Optimization MVSIS vs AIG Rewriting (ABC)
 
Design of Linear Plasma Position Controllers with Intelligent Feedback System...
Design of Linear Plasma Position Controllers with Intelligent Feedback System...Design of Linear Plasma Position Controllers with Intelligent Feedback System...
Design of Linear Plasma Position Controllers with Intelligent Feedback System...
 
Design of 64 bit error tolerant adder
Design of 64 bit error tolerant adderDesign of 64 bit error tolerant adder
Design of 64 bit error tolerant adder
 
IRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP CoreIRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP Core
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
 
Implementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's mapImplementation of a stream cipher based on bernoulli's map
Implementation of a stream cipher based on bernoulli's map
 

Viewers also liked

2)linear select memory organization
2)linear select memory organization2)linear select memory organization
2)linear select memory organizationrezaman2012
 
Detection of Damage in Beam from Measured Natural Frequencies Using Support V...
Detection of Damage in Beam from Measured Natural Frequencies Using Support V...Detection of Damage in Beam from Measured Natural Frequencies Using Support V...
Detection of Damage in Beam from Measured Natural Frequencies Using Support V...Subhajit Mondal
 
Random Access Memory
Random Access Memory Random Access Memory
Random Access Memory rohitladdu
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 

Viewers also liked (6)

RAM Design
RAM DesignRAM Design
RAM Design
 
2)linear select memory organization
2)linear select memory organization2)linear select memory organization
2)linear select memory organization
 
Detection of Damage in Beam from Measured Natural Frequencies Using Support V...
Detection of Damage in Beam from Measured Natural Frequencies Using Support V...Detection of Damage in Beam from Measured Natural Frequencies Using Support V...
Detection of Damage in Beam from Measured Natural Frequencies Using Support V...
 
RAM (Random Access Memory)
RAM (Random Access Memory)RAM (Random Access Memory)
RAM (Random Access Memory)
 
Random Access Memory
Random Access Memory Random Access Memory
Random Access Memory
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar to Vhdl modeling of the sram module and state machine controller smc module of rc4 stream cipher algorithm for wi fi encryption

Data security using advanced encryption standard aes in reconfigurable hard...
Data security using advanced encryption standard  aes  in reconfigurable hard...Data security using advanced encryption standard  aes  in reconfigurable hard...
Data security using advanced encryption standard aes in reconfigurable hard...IAEME Publication
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud ComputingIRJET Journal
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksCSCJournals
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor csandit
 
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORSMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORcscpconf
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...cscpconf
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET Journal
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET Journal
 
Demystifying the JESD204B High-speed Data Converter-to-FPGA interface
Demystifying the JESD204B High-speed Data Converter-to-FPGA interfaceDemystifying the JESD204B High-speed Data Converter-to-FPGA interface
Demystifying the JESD204B High-speed Data Converter-to-FPGA interfaceAnalog Devices, Inc.
 
Design and Verification of the UART and SPI protocol using UVM
Design and Verification of the UART and SPI protocol using UVMDesign and Verification of the UART and SPI protocol using UVM
Design and Verification of the UART and SPI protocol using UVMIRJET Journal
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
 
Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences forIAEME Publication
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...IRJET Journal
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET Journal
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...IJNSA Journal
 

Similar to Vhdl modeling of the sram module and state machine controller smc module of rc4 stream cipher algorithm for wi fi encryption (20)

Data security using advanced encryption standard aes in reconfigurable hard...
Data security using advanced encryption standard  aes  in reconfigurable hard...Data security using advanced encryption standard  aes  in reconfigurable hard...
Data security using advanced encryption standard aes in reconfigurable hard...
 
Bm36382385
Bm36382385Bm36382385
Bm36382385
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud Computing
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor
 
SMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSORSMART AS A CRYPTOGRAPHIC PROCESSOR
SMART AS A CRYPTOGRAPHIC PROCESSOR
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
 
Demystifying the JESD204B High-speed Data Converter-to-FPGA interface
Demystifying the JESD204B High-speed Data Converter-to-FPGA interfaceDemystifying the JESD204B High-speed Data Converter-to-FPGA interface
Demystifying the JESD204B High-speed Data Converter-to-FPGA interface
 
Design and Verification of the UART and SPI protocol using UVM
Design and Verification of the UART and SPI protocol using UVMDesign and Verification of the UART and SPI protocol using UVM
Design and Verification of the UART and SPI protocol using UVM
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences for
 
Aes
AesAes
Aes
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Vhdl modeling of the sram module and state machine controller smc module of rc4 stream cipher algorithm for wi fi encryption

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME 79 VHDL MODELING OF THE SRAM MODULE AND STATE MACHINE CONTROLLER (SMC) MODULE OF RC4 STREAM CIPHER ALGORITHM FOR Wi-Fi ENCRYPTION Dr.A.M. Bhavikatti1 Mallikarjun.Mugali2 1,2 Dept of CSE, BKIT, Bhalki, Karnataka State, India ABSTRACT In this paper, VHDL modeling of the SRAM module and State Machine Controller (SMC) module of RC4 stream cipher algorithm for Wi-Fi encryption is proposed. Various individual modules of Wi-Fi security have been designed, verified functionally using VHDL-simulator. In cryptography RC4 is the most widely used software stream cipher and is used in popular protocols such as Transport Layer Security (TLS) (to protect Internet traffic) and WEP (to secure wireless networks). While remarkable for its simplicity and speed in software, RC4 has weaknesses that argue against its use in new systems. It is especially vulnerable when the beginning of the output key stream is not discarded, or when nonrandom or related keys are used; some ways of using RC4 can lead to very insecure cryptosystems such as WEP. Many stream ciphers are based on linear feedback shift registers (LFSRs), which, while efficient in hardware, are less so in software. The design of RC4 avoids the use of LFSRs, and is ideal for software implementation, as it requires only byte manipulations. The RC4 algorithm will be implemented by FPGA using VHDL software platform. Key words: VHDL simulation, RC4 stream cipher, SRAM module, State machine diagram I. INTRODUCTION TO RC4 STREAM CIPHER Cryptographic algorithms that can provide fast implementation, small size, low complexity, and high security for resource-constrained devices such as wireless sensor devices are imperative. Conventional cryptographic algorithms are very complex and consume significant amount of energy when used by resource constrained devices for the provision of secure communication, and public key algorithms are still not feasible in sensor networks for several reasons including limited storage and excessive energy usage [1]. Therefore, security schemes should rely on a symmetric key INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2015): 7.9817 (Calculated by GISI) www.jifactor.com IJECET © I A E M E
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME 80 cryptography especially when systems have limited hardware resources. There are a number of stream cipher algorithms presented to implement high performance software including IDEA, ORYX, LEVIATHAN, MUGI, RC4, Helix, SEAL, SOBER, and SNOW. RC4 is a proprietary stream cipher which was designed in 1987 by Ron Rivest. RC4 is widely used in security software based on stream cipher including one in the encryption of traffic to and from secure web sites such as Transport Layer Security (TLS), Secure Socket Layer (SSL), and Wired Equivalent Privacy (WEP) implementations. RC4 is fast in comparison to other algorithms and it has a simple design hardware implementation [2]. For instance, RC4 is five times faster than Data Encryption Standard (DES) and fifteen times faster than Triple-DES [3]. RC4 has been used as the data encryption algorithm for many applications and protocols. Some of the protocols and applications using RC4 include the Wi-Fi, Skype, and Bit Torrent, to name a few. Several efficient approaches to the implementation of RC4 have been proposed [4]. II. PROPOSED BLOCK DIAGRAM OF RC4 STREAM CIPHER The block diagram of the proposed architecture is shown in Figure1below. The block diagram can be divided in to 6 different sub modules as shown and these sub modules are i)The payload data processor and controller ii) SMC iii) Key set up and key stream generation block iv) K- Stream serializer v) KRAM(256× 8) vi) Multiplexer. As it is not possible to present all the simulation results in a single paper, it is divided in to three parts and first two parts are already presented in [5] and [6]. So, these modules are not discussed further in this paper. This paper deals with simulation of SRAM (256× 8) module, State Machine Controller (SMC) modules and an analysis of RC4 algorithm state machine diagram. Fig 1 Simulated module of Wi-Fi Encryption architecture III. SIMULATION OF SRAM(256× 8) MODULE The module SRAM is similar to KRAM. It is used to store the data from 0 to 255 at the address from 0 to 255 i.e. same data is assigned to the same memory location. The address is assigned by the output of Addr1.In this if MemWr is 1 and MemRd is 0, then data is written in to the RAM and if if MemWr is 0 and MemRd is 1, then data is read out one by one from the RAM. Data is
  • 3. International Journal of Electronics and Communication Engineering & 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. given in parallel form and is read out in parallel and Fig 3 shows the simulated waveforms of SRAM Fig 2 IV ANALYSIS OF RC4 ALGORITHM STATE MACHINE DIAGRAM Different states of state machine Algorithm state machine diagram. 4.1 Idle state: Data is at original state. 4.2 Initial state: In this state, first we fill the SRAM and KRAM. To fill both the RAM, the data is given directly to the KRAM for filling the data randomly as a DataBus and address is given by Addr1.The data at SRAM is filled with the help of International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 6472(Online), Volume 6, Issue 1, January (2015), pp. 81 in parallel form and is read out in parallel form. Fig 2 shows the simulated module of SRAM and Fig 3 shows the simulated waveforms of SRAM. Fig 2 Simulated module of SRAM Fig 3 Simulated waveforms of SRAM ALGORITHM STATE MACHINE DIAGRAM Different states of state machine diagram are explained briefly here. diagram. Data is at original state. In this state, first we fill the SRAM and KRAM. To fill both the RAM, the data is given directly to the KRAM for filling the data randomly as a DataBus and address is given by The data at SRAM is filled with the help of Addr1 which gives the address Technology (IJECET), ISSN 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME Fig 2 shows the simulated module of SRAM ALGORITHM STATE MACHINE DIAGRAM are explained briefly here. Fig 4 shows RC4 In this state, first we fill the SRAM and KRAM. To fill both the RAM, the data is given directly to the KRAM for filling the data randomly as a DataBus and address is given by Addr1 which gives the address and at the same
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME 82 time, same data comes from the DataMux and are loaded at the same address. Addr1 gives the location from 0 to 255(as cnt255) in both the RAM. The output of Addr1 is given to the----- Fig 4 RC4 Algorithm state machine diagram ---KRAM that gives the address for DataBus of KRAM. The input of SRAM (as Addr[7:0]) show address and Data fill linearly from DataIn as S0=0, S1=1,S2=2,-------S255=255.The initial state exists till the SRAM/KRAM fill completely( all 255 locations).After filling, initialOver=1, and state go to Addr2Cal state. 4.3 Addr2Cal state: In this state, Mux gives the KeyDataOut as MuxOut by selecting the Scl=1, and SRAM gives the data through DataOut to DataDMux and SellDataOut select this DataOut as SR1 [7:0] and load this value in S_Reg1 and all these values from A2, SR1 and MuxOut are added. 4.4 Addr2Ld state: In this state, the output of Adder 1(Adder 1Out) is loaded in to the Addr2 register. 4.5 SJ State: Loaded value at Addr2 gives j value. This j value is the address, which is selected by SelAddr(3:0) of AddrMux. The output of AddrMux gives address of SRAM. The value of that location is obtained as DataOut, selected by DatMux as SR2 [7:0] and stored at S_Reg2 as SJ. 4.6 Swap SI: In this state, the address is taken from Addr2, which is selected by AddrMux as Addr[7:0] and the data is loaded on this address of SRAM as DataIn by selecting Reg2[7:0] through DataMux. 4.7 Swap SJ: In this state, the address is taken from Addr1, which is selected by AddrMux as Addr[7:0] and the data is loaded on this address of SRAM as DataIn by selecting Reg1[7:0] through DataMux. All process like Addr2Cal, Addr2Ld, SJ, Swap SI and Swap SJ occurred 255 times. When Keysetupover=1, Flag=1, then it goes to Addr2Gen state. 4.8 Addr2Gen state: At this state, again we obtained the value of J by KeySetup phase. 4.9TCal state: When Swap SJ is complete, flag will be high and reaches the TCal state.
  • 5. International Journal of Electronics and Communication Engineering & 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 4.10Kbyte state: The data was given to FIFO in 4.11 Encryption state: The key data byte from K_StreamSerializer and plaintext from DataSerializer comes out serially in the form of bits. IV. STATE MACHINE CONTROLLER (SMC) MODULE This is considered as the Controller (SMC) module. By this, we can control all the modules .This state machine will work whenever InitialOver and KeySetUpOver are high. step. First it controls Addr, SRAM and KRAM. When enable is high means that it was writing key data in it. Then it is going to the input and it is given to the SRAM and this process run up to 256 times. key data bytes is performed. Then it goes to Adder 2Gen.In this state, it takes the data from S_Reg and gives it to the Adder i.e in Adder 2Ld.It adds the given the help of AddrMux, which swap it and then gives it to the K_SteamSerilizer. At the same time, with the help of FIFO, the available parallel data input to serial output, which is further EX 6(a) and (b) shows the simulation waveforms of State Machine Controller (SMC) module Fig 5 State Machine Controller (SMC) module International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 6472(Online), Volume 6, Issue 1, January (2015), pp. 83 The data was given to FIFO in the initial state is now loaded in to DataSerializer. The key data byte from K_StreamSerializer and plaintext from DataSerializer comes out serially in the form of bits. STATE MACHINE CONTROLLER (SMC) MODULE This is considered as the heart of the whole architecture. Fig 5 shows the State Machine By this, we can control all the modules .This state machine will work whenever InitialOver and KeySetUpOver are high. This means that all the modules will work step by SRAM and KRAM. When enable is high means that it was writing key another state i.e. Adder 2Ld. In this state, adder will add the given and it is given to the SRAM and this process run up to 256 times. In this process, swapping of key data bytes is performed. Then it goes to Adder 2Gen.In this state, it takes the data from S_Reg and gives it to the Adder i.e in Adder 2Ld.It adds the given input and then gives it to the SRAM with the help of AddrMux, which swap it and then gives it to the K_SteamSerilizer. At the same time, available KeyData is given to the DataSerilizer. Both sterilizers convert ut to serial output, which is further EX-ORed to give the encrypted data serially. 6(a) and (b) shows the simulation waveforms of State Machine Controller (SMC) module State Machine Controller (SMC) module Technology (IJECET), ISSN 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME the initial state is now loaded in to DataSerializer. The key data byte from K_StreamSerializer and plaintext from Fig 5 shows the State Machine By this, we can control all the modules .This state machine will work This means that all the modules will work step by SRAM and KRAM. When enable is high means that it was writing key In this state, adder will add the given In this process, swapping of key data bytes is performed. Then it goes to Adder 2Gen.In this state, it takes the data from S_Reg input and then gives it to the SRAM with the help of AddrMux, which swap it and then gives it to the K_SteamSerilizer. At the same time, is given to the DataSerilizer. Both sterilizers convert ORed to give the encrypted data serially. Fig 6(a) and (b) shows the simulation waveforms of State Machine Controller (SMC) module
  • 6. International Journal of Electronics and Communication Engineering & 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. Fig 6(a) Simulation waveforms of Fig 6(b) Simulation waveforms of State Machine Controller (SMC) module International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 6472(Online), Volume 6, Issue 1, January (2015), pp. 84 Simulation waveforms of State Machine Controller (SMC) module Simulation waveforms of State Machine Controller (SMC) module Technology (IJECET), ISSN 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME State Machine Controller (SMC) module Simulation waveforms of State Machine Controller (SMC) module
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME 85 T a b l e 1 D e t a i l s o f S i m u la t i o n V. CONCLUSIONS Various individual modules of RC4 stream cipher for Wi-Fi security have been designed, verified functionally using VHDL Simulator, synthesized by the synthesis tool and a final net list has been created. The proposed design provides high data throughput using 8-bit word and variable key length, from 8-bit to 128-bit. The proposed system achieves a data throughput of up to 22Mbps at a clock frequency of 64 MHz .The design has been synthesized using FPGA technology from Xilinx. Table 1 below shows the details of simulation. The measurement result and comparison with previous implementation prove that the one proposed is flexible solution for any cryptographic system. VI. REFERENCES 1. Sharma K, Ghose MK, Kumar D, Singh RPK, Pandey VK, “A comparative study of various security approaches used in wireless sensor networks” Int J Adv Sci Technol, 177(77), 2010. 2. Gupta SS, Chattopadhyay A, Sinha K, Maitra S, Sinha B, “ High-performance hardware implementation for RC4 stream cipher” IEEE Trans Comput 62(4):730–743,2013. 3. Ahmad S, Beg MR, Abbas Q, Ahmad J, Atif S, “ Comparative study between stream cipher and block cipher using RC4 and Hill Cipher” Int J Comput Appl (0975–8887), 1(25),2010. 4. Disha Handa, Bhanu Kapoor “ State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher”, International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.4, August 2014. 5. A.M.Bhavikatti, S. Srinivas Rao “VHDL Modeling of the payload data processor and controller of RC4 stream cipher for Wi-Fi encryption” ,ICVED-2008, Proceedings of International Conference on Embedded system & VLSI Design, 20-21 March 2008, at PDVVP College of Engineering, Ahmednagar. 6. Dr.A.M.Bhavikatti, “VHDL Simulation of KRAM, Multiplexer and K Stream serializer modules of RC4 Stream Cipher for Wi-Fi Security” ,International Journal of Advances in Wireless and Mobile Communications (AWMC) ,ISSN 0973-6972, Volume 6, Number 1, pp17-23,2013. 7. Meha Sharma and Rewa Sharma, “VHDL Implementation of Discrete Wavelet Transformation For Efficient Power Systems” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 1, Issue 1, 2010, pp. 10 - 20, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 8. Sapna and Prof. B. P. Singh, “Low Power SRAM” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2013, pp. 257 - 263, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.