SlideShare a Scribd company logo
1 of 23
A FAST CRYPTOGRAPHY PIPELINED
HARDWARE DEVELOPED IN FPGA WITH
             VHDL

   KOTTAM KRUNAKARA REDDY INSTITUTE OF TECHNOLOGY




                              PRESENTED BY

                               K.KALPANA
                               B.DURGA PRASAD
                               L.SHIVA KRISHNA
                               B.HARI KRISHNA YADAV
CONTENTS

•   ABSTRACT
•   INTRODUCTION
•   AES
•   ENCRYPTION BLOCK DIAGRAM
•   ARCHITECTURE OF AES
•   ADVANTAGES
•   DISADVANTAGES
•   APPLICATIONS
•   CONCLUSION
•   FUTURE SCOPE
ABSTRACT

• Main objective :

               The main objective of the project is to increase the speed of
   encryption and decryption by using pipelined hardware

• Pipelined hardware cryptography was used to improve performance in
  order to achieve higher throughput and greater parallelism

• By using this we can easily reconfigure AES algorithm to 128,196 or 256
  bit keys
What is FPGA and why ?

• FPGA stands for field programmable gate array

• FPGA’s are semiconductor devices that are based around a
  matrix of configurable logic blocks connected via
  programmable inter connects

• Field Programmable Gate Arrays (FPGAs) offer a quicker,
  more customizable solution
What is pipelined hardware and parallelism?

• Pipelining increases the number of instructions that can be
  processed at once

• In parallelism large task originates as a set of independent
  programs and these can simply be executed on different
  processors
INTRODUCTION

• Cryptography is a form of secret writing it is developed in two
  standards

                1.DES-data encryption standard
                2.AES-advanced encryption standard

• Hardware based cryptography is more secure compared to
  software based cryptography
• The algorithm was implemented using Xilinx spartan-3 and
  Xilinx vertex-5 FPGA’s

• When implemented using these Xilinx spartan-3 is 50% faster
  than others

• The transformations of both Encryptions and Decryption are
  simulated using an iterative design approach in order to
  minimize the hardware consumption
AES-Advanced encryption standard

• AES is also called as RIJNDAEL algorithm,developed to
  replace unsafe DES and low triple DES

• The AES algorithm is a symmetric block cipher that can
  encrypt (encipher) and decrypt (decipher) information

• AES has a fixed block size of 128 bits and a key size of 128,
  192 or 256 bits
• AES operates on a 4 4 array of bytes, termed the state.

• For encryption, each round of AES (except the last round)
  consists of four phases
                    1.Subbytes
                    2.Shift rows
                    3.Mix columns
                    4.Addround key

• For decryption algorithm will use respective inverse operations
SubBytes –
           A non-linear substitution step where each byte is
  replaced with another according to a lookup table (known as S
  Box).
• ShiftRows –
               A transposition step where each row of the state
 is shifted cyclically a certain number of steps.
• MixColumns –
                A mixing operation which operates on the columns
  of the state, combining the four bytes in each column using a
  linear transformation.

• AddRoundKey –
              Each byte of the state is combined with the round
  key; each round key is derived from the cipher key using a key
  schedule.
• Key Expansion operation consists of three operations.
   1.RotWord
   2.SubWord
   3.XOR operations
Block diagram of I/O of encryption
Block diagram of Encryption
Architecture diagram of AES
• There are three main blocks in AES architecture.
  They are
              1.Key expansion
               2.Encryption
               3.Decryption
• The signals inside hardware are buses used to
  transfer the data between the blocks according to aes
  mode selection
Advantages

•   High Performance
•   Time to market
•   Reprogrammable
•   Reconfigurable
•   Long term maintenance
Disadvantages

• More expensive
• Power consumption is more
FUTURE SCOPE

• Micro electronics intends to use this work as part of larger
  projects such as smart metering in power systems and
  cryptography interface in data communication
Fast
Fast

More Related Content

What's hot

WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...
WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...
WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...GeeksLab Odessa
 
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PROIDEA
 
LCA14: LCA14-209: ODP Project Update
LCA14: LCA14-209: ODP Project UpdateLCA14: LCA14-209: ODP Project Update
LCA14: LCA14-209: ODP Project UpdateLinaro
 
using-apache-spark-for-generating-elasticsearch-indices-offline
using-apache-spark-for-generating-elasticsearch-indices-offlineusing-apache-spark-for-generating-elasticsearch-indices-offline
using-apache-spark-for-generating-elasticsearch-indices-offlineAndrej Babolcai
 
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...InfluxData
 
OpenDataPlane - Bill Fischofer
OpenDataPlane - Bill FischoferOpenDataPlane - Bill Fischofer
OpenDataPlane - Bill Fischoferharryvanhaaren
 
From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...
From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...
From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...Junho Suh
 
Spark architecture
Spark architectureSpark architecture
Spark architecturedatamantra
 
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...Brocade
 
High Performance Flow Matching Architecture for Openflow Data Plane
High Performance Flow Matching Architecture for Openflow Data PlaneHigh Performance Flow Matching Architecture for Openflow Data Plane
High Performance Flow Matching Architecture for Openflow Data PlaneMahesh Dananjaya
 
Telco junho cost-effective approach for telco network analysis in 5_g_final
Telco junho cost-effective approach for telco network analysis in 5_g_finalTelco junho cost-effective approach for telco network analysis in 5_g_final
Telco junho cost-effective approach for telco network analysis in 5_g_finalJunho Suh
 
LCU13: Discussion on ODP – Fastpath networking applications on manycore SoCs
LCU13: Discussion on ODP – Fastpath networking applications on manycore SoCsLCU13: Discussion on ODP – Fastpath networking applications on manycore SoCs
LCU13: Discussion on ODP – Fastpath networking applications on manycore SoCsLinaro
 

What's hot (16)

Description
DescriptionDescription
Description
 
WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...
WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...
WebCamp: Developer Day: Оптимизация Lift Framework для работы с большими пото...
 
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
 
LCA14: LCA14-209: ODP Project Update
LCA14: LCA14-209: ODP Project UpdateLCA14: LCA14-209: ODP Project Update
LCA14: LCA14-209: ODP Project Update
 
using-apache-spark-for-generating-elasticsearch-indices-offline
using-apache-spark-for-generating-elasticsearch-indices-offlineusing-apache-spark-for-generating-elasticsearch-indices-offline
using-apache-spark-for-generating-elasticsearch-indices-offline
 
Vlsi design flow
Vlsi design flowVlsi design flow
Vlsi design flow
 
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...
 
OpenDataPlane - Bill Fischofer
OpenDataPlane - Bill FischoferOpenDataPlane - Bill Fischofer
OpenDataPlane - Bill Fischofer
 
From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...
From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...
From Fixed-Function to Programmable Switching Chip for Network Packet Broker ...
 
Spark architecture
Spark architectureSpark architecture
Spark architecture
 
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
 
High Performance Flow Matching Architecture for Openflow Data Plane
High Performance Flow Matching Architecture for Openflow Data PlaneHigh Performance Flow Matching Architecture for Openflow Data Plane
High Performance Flow Matching Architecture for Openflow Data Plane
 
Open Networking
Open NetworkingOpen Networking
Open Networking
 
Telco junho cost-effective approach for telco network analysis in 5_g_final
Telco junho cost-effective approach for telco network analysis in 5_g_finalTelco junho cost-effective approach for telco network analysis in 5_g_final
Telco junho cost-effective approach for telco network analysis in 5_g_final
 
LCU13: Discussion on ODP – Fastpath networking applications on manycore SoCs
LCU13: Discussion on ODP – Fastpath networking applications on manycore SoCsLCU13: Discussion on ODP – Fastpath networking applications on manycore SoCs
LCU13: Discussion on ODP – Fastpath networking applications on manycore SoCs
 
Shantanu's Resume
Shantanu's ResumeShantanu's Resume
Shantanu's Resume
 

Similar to Fast

An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map andjpstudcorner
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
DPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles ShiflettDPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles ShiflettJim St. Leger
 
CASSANDRA - Next to RDBMS
CASSANDRA - Next to RDBMSCASSANDRA - Next to RDBMS
CASSANDRA - Next to RDBMSVipul Thakur
 
VLSI design Dr B.jagadeesh UNIT-5.pptx
VLSI design Dr B.jagadeesh   UNIT-5.pptxVLSI design Dr B.jagadeesh   UNIT-5.pptx
VLSI design Dr B.jagadeesh UNIT-5.pptxjagadeesh276791
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...IJMTST Journal
 
Ajal vjcet
Ajal vjcetAjal vjcet
Ajal vjcetAJAL A J
 
Project Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptxProject Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptxAkshitAgiwal1
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICpaperpublications3
 
FPGAs in the cloud? (October 2017)
FPGAs in the cloud? (October 2017)FPGAs in the cloud? (October 2017)
FPGAs in the cloud? (October 2017)Julien SIMON
 
Fpga implementation of encryption and decryption algorithm based on aes
Fpga implementation of encryption and decryption algorithm based on aesFpga implementation of encryption and decryption algorithm based on aes
Fpga implementation of encryption and decryption algorithm based on aeseSAT Publishing House
 
my.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxmy.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxhalosidiq1
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithmijsrd.com
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsSeddiq Q. Abd Al-Rahman
 

Similar to Fast (20)

Batch no.2
Batch no.2Batch no.2
Batch no.2
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
A04660105
A04660105A04660105
A04660105
 
DPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles ShiflettDPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles Shiflett
 
CASSANDRA - Next to RDBMS
CASSANDRA - Next to RDBMSCASSANDRA - Next to RDBMS
CASSANDRA - Next to RDBMS
 
VLSI design Dr B.jagadeesh UNIT-5.pptx
VLSI design Dr B.jagadeesh   UNIT-5.pptxVLSI design Dr B.jagadeesh   UNIT-5.pptx
VLSI design Dr B.jagadeesh UNIT-5.pptx
 
Node architecture
Node architectureNode architecture
Node architecture
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
Ajal vjcet
Ajal vjcetAjal vjcet
Ajal vjcet
 
Project Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptxProject Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptx
 
Publication
PublicationPublication
Publication
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
 
FPGAs in the cloud? (October 2017)
FPGAs in the cloud? (October 2017)FPGAs in the cloud? (October 2017)
FPGAs in the cloud? (October 2017)
 
Fpga implementation of encryption and decryption algorithm based on aes
Fpga implementation of encryption and decryption algorithm based on aesFpga implementation of encryption and decryption algorithm based on aes
Fpga implementation of encryption and decryption algorithm based on aes
 
my.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxmy.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptx
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
pps Matters
pps Matterspps Matters
pps Matters
 
3.pptx
3.pptx3.pptx
3.pptx
 

Fast

  • 1. A FAST CRYPTOGRAPHY PIPELINED HARDWARE DEVELOPED IN FPGA WITH VHDL KOTTAM KRUNAKARA REDDY INSTITUTE OF TECHNOLOGY PRESENTED BY K.KALPANA B.DURGA PRASAD L.SHIVA KRISHNA B.HARI KRISHNA YADAV
  • 2. CONTENTS • ABSTRACT • INTRODUCTION • AES • ENCRYPTION BLOCK DIAGRAM • ARCHITECTURE OF AES • ADVANTAGES • DISADVANTAGES • APPLICATIONS • CONCLUSION • FUTURE SCOPE
  • 3. ABSTRACT • Main objective : The main objective of the project is to increase the speed of encryption and decryption by using pipelined hardware • Pipelined hardware cryptography was used to improve performance in order to achieve higher throughput and greater parallelism • By using this we can easily reconfigure AES algorithm to 128,196 or 256 bit keys
  • 4. What is FPGA and why ? • FPGA stands for field programmable gate array • FPGA’s are semiconductor devices that are based around a matrix of configurable logic blocks connected via programmable inter connects • Field Programmable Gate Arrays (FPGAs) offer a quicker, more customizable solution
  • 5. What is pipelined hardware and parallelism? • Pipelining increases the number of instructions that can be processed at once • In parallelism large task originates as a set of independent programs and these can simply be executed on different processors
  • 6. INTRODUCTION • Cryptography is a form of secret writing it is developed in two standards 1.DES-data encryption standard 2.AES-advanced encryption standard • Hardware based cryptography is more secure compared to software based cryptography
  • 7. • The algorithm was implemented using Xilinx spartan-3 and Xilinx vertex-5 FPGA’s • When implemented using these Xilinx spartan-3 is 50% faster than others • The transformations of both Encryptions and Decryption are simulated using an iterative design approach in order to minimize the hardware consumption
  • 8. AES-Advanced encryption standard • AES is also called as RIJNDAEL algorithm,developed to replace unsafe DES and low triple DES • The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information • AES has a fixed block size of 128 bits and a key size of 128, 192 or 256 bits
  • 9. • AES operates on a 4 4 array of bytes, termed the state. • For encryption, each round of AES (except the last round) consists of four phases 1.Subbytes 2.Shift rows 3.Mix columns 4.Addround key • For decryption algorithm will use respective inverse operations
  • 10. SubBytes – A non-linear substitution step where each byte is replaced with another according to a lookup table (known as S Box).
  • 11. • ShiftRows – A transposition step where each row of the state is shifted cyclically a certain number of steps.
  • 12. • MixColumns – A mixing operation which operates on the columns of the state, combining the four bytes in each column using a linear transformation. • AddRoundKey – Each byte of the state is combined with the round key; each round key is derived from the cipher key using a key schedule.
  • 13. • Key Expansion operation consists of three operations. 1.RotWord 2.SubWord 3.XOR operations
  • 14. Block diagram of I/O of encryption
  • 15. Block diagram of Encryption
  • 17. • There are three main blocks in AES architecture. They are 1.Key expansion 2.Encryption 3.Decryption • The signals inside hardware are buses used to transfer the data between the blocks according to aes mode selection
  • 18. Advantages • High Performance • Time to market • Reprogrammable • Reconfigurable • Long term maintenance
  • 19. Disadvantages • More expensive • Power consumption is more
  • 20.
  • 21. FUTURE SCOPE • Micro electronics intends to use this work as part of larger projects such as smart metering in power systems and cryptography interface in data communication