SlideShare a Scribd company logo
1 of 7
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
A VLSI IMPLEMENTATION OF A RESOURCE EFFICIENT AND
SECURE ARCHITECTURE OF A BLOCK CIPHER
Satish Shivaram1
, R.Krishna2
, Vijayaprakash3
, K.V.Prasad4
1
Student, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India.
2
Assistant Professor, Electronics and communication, Bangalore Institute of Technology, Karnataka, India.
3
Professor, Electronics and Communication, Bangalore Institute of Technology, Karnataka , India.
4
Professor and HOD, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India.
Abstract
In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography
architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few
drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above
mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this
paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data
into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput
enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design
tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area
reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector.
Keywords : Cryptography, VLSI, FPGA , Block Cipher.
---------------------------------------------------------------------
***---------------------------------------------------------------------
1. INTRODUCTION
After the computer invention the need of developing
tools to protect the information (data) stored in the
computer raised. To fulfill this requirements number of
tools designed and developed with the main goal of
protecting information present in the computer from
hackers. These facilities are generally called as computer
security. The development of communication and network
facilities make it possible to share the information between
computers and then the problem of hacking of information
arises from this the concept of network security developed.
Cryptography is a technique that makes information not
readable by unauthorized persons, by the use of encoding
method. Some of the application of cryptography includes
the security of ATM cards, use of passwords in computer
and electronic commerce. Cryptography is derived from
the Greek words ‗kryptos‘(hidden) and ‗graphos‘(written)
respectively. Cryptography involves two processes. These
are encryption and decryption. Encryption converts the
plain text to cipher text. Decryption converts cipher text to
plain text.
The main goal of cryptography is to make our information
confidential. There are various cryptographic algorithms
have been developed. The design of any cryptographic
algorithm requires the focus on three parameter: these are
―security, cost and performance‖. So depending on
particular application one can choose better algorithm
suitable for that application.
Standardized algorithms like AES, DES etc, fails to provide
security in applications such as RFID tag, sensor nodes, and
smart cards. These algorithms demands the support of more
resources, lightweight cryptography can be used as an
alternative for these application, which gives better security
compared to standardized cryptographic algorithms. This
gives motivation for the designer to move towards
lightweight cryptographic algorithms.
Hummingbird cryptography is one of the lightweight
cryptographic algorithms. Design of Hummingbird
cryptography is motivated by the enigma machine . It is
found that it uses small sized block and able to withstand
cryptographic attacks like linear and differential
cryptanalysis.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 172
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
In this paper hummingbird cryptographic algorithm is
considered and tries to modify the block cipher used to
reduce the area and enhanced performance without affecting
the security of algorithm.
In this paper block cipher is designed using throughput
enhanced and area reduced architecture. The secure key
used in this paper is 128 bit instead of 64 bit which was used
in previous work. The S-box used here makes use of the
readily available LUT which is shown in the methodology
section. Both encryption and decryption work are carried out
to show the given plain text is secured in high terms with
large number of bits. With the same key used the given plain
text can be obtained making the information more secure.
The area utilization of both throughput enhanced and area
reduced are obtained by synthesis report by using Xilinx
14.6 and are compared. Simulation results are obtained
using ModelSim 10.1 and the waveforms are observed.
The Theoretical backgrounds of cipher block and proposed
architecture will be described in the next two sections. The
simulation results and synthesis report will be discussed
before conclusion.
2. THEORETICAL BACKGROUND
In this section the basic flow chart of through put enhanced
design and area reduced design is incorporated.
In the first step the 16 bit plain text data is mixed with the
128 bit secure key which is subdivided into 8 different 16 bit
secure key. Followed by this step is substitution step where
the S-box plays an important role for both encryption and
decryption. In this paper readily available S-box LUT is
being used instead of representing Boolean expressions.
linear transformation is followed after substitution layer.
After eight times iteration the second round key with
exoring with all odd numbers of key is given to S-box and
linear transform layer. The process is repeated as shown in
fig 1.
The readily available S-box is shown below.
Table 1: S-Boxes given in Hexadecimal format
x 0 1 2 3 4 5 6 7
8 6 5 F 1 C A 9
0 7 E 1 5 B 8 2
2 E F 5 C 1 9 A
0 7 3 4 C 1 A F
x 8 9 A B C D E F
E B 2 4 7 0 D 3
3 A D 6 F C 4 9
B 4 6 8 0 7 3 D
D E 6 B 2 8 9 5
3. PROPOSED ARCHITECTURE
a. Throughput enhanced design:
In this paper, the cipher block is presented by new
expressions. The encryption and decryption block is
designed separately using 128 bit has the new proposed
design. The basic design of throughput enhanced design of
block cipher using 128 bit secure key is as shown in fig 1.
The proposed work goes well with the theoretical
background with flow chart starting with the key mixing
step with the given plain text. Followed by substitution layer
where S- box plays an important role. In this paper we are
using readily available S-box as shown in table 1.
Followed by linear transformation layer which is given by
m^m<<6^m<<10 expression for encryption. These steps are
repeated 8 times with different 16 bit secure key.
K9 is calculated with all the odd numbers of keys exoring
and leads to S-box substitution and linear transformation
and then k10 is calculated with all the even number of keys.
The final 16 bit encrypted data of the given plain text data is
obtained which is further made use in the decryption block
using the same 128 bit secure key.
Fig 1. Block diagram of proposed throughput enhanced
encryption unit
The decryption block using 128 bit secure key is as shown
in fig 2. Here the operation are carried out in a similar
manner as compared to encryption block which is the mirror
operation of it.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 173
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
The only difference is the way the S-box readings are made
which is inverse. In the next inverse linear transform the
expression is given by m^m<<6^m<<10^m<<12. All the
operations are inversed starting from key k10 to k1. The
decrypted data is same as the plain text given and the
procedure followed serves the purpose.
Fig 2. Block diagram of proposed throughput enhanced
decryption unit.
b. area reduced design:
in this paper major proposal is to get area reduction on fpga.
The area reduced design encryption is shown in fig 3.
In this design the number of components are reduced in the
first part of substitution and linear transformation unit. The
eight iterations are reduced with one unit where each key
processing output is stored in a flop and based on the key
select and data select operations are performed and the
synthesis report is been generated and compared with the
throughput enhanced version. We can see the number of 4
input LUTs used is reduced in this design.
Fig 3. Block diagram of proposed area reduced design unit.
Simulation results:
Simulation results are seen using ModelSim 10.1b
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 174
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
Fig 4. Waveform of throughput enhanced encryption using 128 bit secure key.
Fig 5. waveform of throughput enhanced decryption unit using 128 bit secure key
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 175
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
Fig 6. waveform of area reduced encryption unit using 128 bit secure key.Synthesis report :
Syntesis is done using Xilinx 14.6 version.
Table 2: Device utilization summary
Module Area in LUT
Throughput Oriented 128 252
Area oriented 128 104
Through put base paper 64 132
Area oriented 64 88
CONCLUSION
In this paper , the cipher block named throughput enhanced
and area reduced block ciphers are implemented. Both
encryption and decryption units are developed and
implemented. The round keys are generated and registered
using 128 bit secure key instead of 64 bit key used in the
previous work. The S – box implementation is done using
readily available LUTs instead of Boolean expression which
is time consuming and more number of slices for
implementation.
The simulation and synthesis reports are tabulated . as seen
from the table 2 area reduced design required lesser number
of 4 input LUT compared to throughput enhanced design.
This shows that single module chip area optimization is
observed in greater manner. This is a well balanced
architecture with high performance and low complexity.
This cipher block can also be used in wireless sensor nodes
and smart chips.
REFERENCES
[1] R. Anderson, E. Biham, and L. Knudsen, “Serpent: A
proposal for the advanced encryption standard,” in Proc. 1st
Advanced Encryption
Standard (AES) Conf., 1998.
[2] B. Singh, L. Alexander, and S. Burman, “On algebraic
relations of Serpent S-boxes”, Cryptology ePrint Archive,
Report 2009/038, 2009.
[3] M. J. O. Saarinen, “Cryptanalysis of Hummingbird-1,”
in Proc. the 18th
international conference on Fast software
encryption, Denmark, Feb.
2011.
[4] C. Patterson, “A Dynamic FPGA Implementation of the
Serpent Block Cipher,” Lecture Notes in Computer Science,
Vol. 1965, pp 141-155,
2000.
[5] X. Fan, H. Hu, G. Gong, E. Smith, and D. Engels,
“Lightweight Implementation of Hummingbird
Cryptographic Algorithm on 4-Bit
Microcontrollers,” in Proc. 4th International Conference for
Internet Technology and Secured Transactions (ICITST
2009), pp. 838-844,
Nov. 2009.
[6] X. Fan, G. Gong, K. Lauffenburger, and T. Hicks,
“FPGA Implementations of the Hummingbird
Cryptographic Algorithm,” in
Proc. The 2010 IEEE International Symposium on
Hardware-Oriented Security and Trust (HOST 2010),
pp.48-51, 2010.
[7] X. Chen, Y. Zhu, Z. Gong, and Y. Luo, “Cryptanalysis
of the Lightweight Block Cipher Hummingbird-1,” in proc.
Fourth
International Conference on Emerging Intelligent Data and
Web Technologies (EIDWT), pp. 515 - 518, 2013.
[8] I. San and N. At, “Compact Hardware Architecture for
Hummingbird Cryptographic Algorithm,” in Proc. 2011
International Conference on
Field Programmable Logic and Applications (FPL), pp.376-
381, Sept. 2011.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 176
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
[9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A.
Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe,
“PRESENT: An Ultra-
Lightweight Block Cipher”, Cryptographic Hardware and
Embedded Systems, vol. 4727,Springer Heidelber, pp. 450-
466, 2007.
[10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA
Implementation of the SMS4 Block Cipher in the Chinese
WAPI Standard,” in Proc.
International Conference on Embedded Software and
Systems Symposia, pp.104-106, July 2008.
[11] X. Fan, “Efficient Cryptographic Algorithms and
Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis,
University of Waterloo, Canada,
March 2010.
[12] P. Bora and T. Czajka,“Implementation of the Serpent
Algorithm Using Altera FPGA Devices,” Public Comments
on AES Candidate
Algorithms-Round 2, available at : http://www.nist.gov/aes/.
[13] A.J. Elbirt and C Paar, “An FPGA implementation and
performance evaluation of the Serpent block cipher,” In
Proc. ACM Eighth
International Symposium on Field Programmable Gate
Arrays (FPGA 2000), pp. 33–40, Feb 2000.
[14] X. Fan, G. Gong, and H. Hu, “Remedying the
Hummingbird Cryptographic Algorithm,” in Proc. The
2011 IEEE International
Workshop on Security and Privacy in Internet of Things
(SPIoT 2011), China, Nov. 2011.
[15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman,
Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and
implementation of block cipher in hummingbird algorithm
over FPGA", Fifth International Conference on Computing
Communications and Networking Technologies (ICCCNT),
2014.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
[9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A.
Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe,
“PRESENT: An Ultra-
Lightweight Block Cipher”, Cryptographic Hardware and
Embedded Systems, vol. 4727,Springer Heidelber, pp. 450-
466, 2007.
[10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA
Implementation of the SMS4 Block Cipher in the Chinese
WAPI Standard,” in Proc.
International Conference on Embedded Software and
Systems Symposia, pp.104-106, July 2008.
[11] X. Fan, “Efficient Cryptographic Algorithms and
Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis,
University of Waterloo, Canada,
March 2010.
[12] P. Bora and T. Czajka,“Implementation of the Serpent
Algorithm Using Altera FPGA Devices,” Public Comments
on AES Candidate
Algorithms-Round 2, available at : http://www.nist.gov/aes/.
[13] A.J. Elbirt and C Paar, “An FPGA implementation and
performance evaluation of the Serpent block cipher,” In
Proc. ACM Eighth
International Symposium on Field Programmable Gate
Arrays (FPGA 2000), pp. 33–40, Feb 2000.
[14] X. Fan, G. Gong, and H. Hu, “Remedying the
Hummingbird Cryptographic Algorithm,” in Proc. The
2011 IEEE International
Workshop on Security and Privacy in Internet of Things
(SPIoT 2011), China, Nov. 2011.
[15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman,
Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and
implementation of block cipher in hummingbird algorithm
over FPGA", Fifth International Conference on Computing
Communications and Networking Technologies (ICCCNT),
2014.
________________________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177

More Related Content

What's hot

Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...eSAT Journals
 
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map IJECEIAES
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityIRJET Journal
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET Journal
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...cscpconf
 
M021201092098
M021201092098M021201092098
M021201092098theijes
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...IJERA Editor
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
A new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithmA new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithmTELKOMNIKA JOURNAL
 
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...VLSICS Design
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureeSAT Publishing House
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 

What's hot (18)

Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
 
G05124550
G05124550G05124550
G05124550
 
M021201092098
M021201092098M021201092098
M021201092098
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
 
Hd3512461252
Hd3512461252Hd3512461252
Hd3512461252
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
A new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithmA new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithm
 
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
SCOPE OF REVERSIBLE ENGINEERING AT GATE-LEVEL: FAULT-TOLERANT COMBINATIONAL A...
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
D010321824
D010321824D010321824
D010321824
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 

Viewers also liked

тарас григорович
тарас григоровичтарас григорович
тарас григоровичkarishka99
 
Responsabilidad de empresarios por daños acusados
Responsabilidad de empresarios por daños acusadosResponsabilidad de empresarios por daños acusados
Responsabilidad de empresarios por daños acusadosDante Veliz G
 
Test para determinar tu nivel de adiccion al internet
Test para determinar tu nivel de adiccion al internetTest para determinar tu nivel de adiccion al internet
Test para determinar tu nivel de adiccion al internetJanina Zurita
 
буклет 2015
буклет 2015буклет 2015
буклет 2015puchckov
 
Correo electronico
Correo electronicoCorreo electronico
Correo electronicodanna rey
 
Jóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el Perú
Jóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el PerúJóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el Perú
Jóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el Perúconsultoriacetpros
 
Sistemas de informacion
Sistemas de informacionSistemas de informacion
Sistemas de informacionhorisrangel
 
Nioiononno commercial proposal
 Nioiononno commercial proposal Nioiononno commercial proposal
Nioiononno commercial proposalOlli D.
 
Paginas web y blogs
Paginas web y blogsPaginas web y blogs
Paginas web y blogsLina Pico
 
Еда и Идея
Еда и ИдеяЕда и Идея
Еда и Идеяhealthyfood
 
CA Inter With 6+ Experience in Accounts & Finance
CA Inter With  6+ Experience in Accounts & FinanceCA Inter With  6+ Experience in Accounts & Finance
CA Inter With 6+ Experience in Accounts & FinanceArnab Chakraborty
 
Marine biologist without video power point
Marine biologist without video power pointMarine biologist without video power point
Marine biologist without video power pointgarrettwaller
 

Viewers also liked (16)

тарас григорович
тарас григоровичтарас григорович
тарас григорович
 
Responsabilidad de empresarios por daños acusados
Responsabilidad de empresarios por daños acusadosResponsabilidad de empresarios por daños acusados
Responsabilidad de empresarios por daños acusados
 
Test para determinar tu nivel de adiccion al internet
Test para determinar tu nivel de adiccion al internetTest para determinar tu nivel de adiccion al internet
Test para determinar tu nivel de adiccion al internet
 
буклет 2015
буклет 2015буклет 2015
буклет 2015
 
Power point tic
Power point ticPower point tic
Power point tic
 
Base de datos
Base de datosBase de datos
Base de datos
 
Correo electronico
Correo electronicoCorreo electronico
Correo electronico
 
Jóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el Perú
Jóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el PerúJóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el Perú
Jóvenes que ni estudian ni trabajan suman más de 1 millón 30 mil en el Perú
 
Sistemas de informacion
Sistemas de informacionSistemas de informacion
Sistemas de informacion
 
Nioiononno commercial proposal
 Nioiononno commercial proposal Nioiononno commercial proposal
Nioiononno commercial proposal
 
Paginas web y blogs
Paginas web y blogsPaginas web y blogs
Paginas web y blogs
 
CPT marksheet
CPT marksheetCPT marksheet
CPT marksheet
 
Презентация радио Пилот Екатеринбург
Презентация радио Пилот ЕкатеринбургПрезентация радио Пилот Екатеринбург
Презентация радио Пилот Екатеринбург
 
Еда и Идея
Еда и ИдеяЕда и Идея
Еда и Идея
 
CA Inter With 6+ Experience in Accounts & Finance
CA Inter With  6+ Experience in Accounts & FinanceCA Inter With  6+ Experience in Accounts & Finance
CA Inter With 6+ Experience in Accounts & Finance
 
Marine biologist without video power point
Marine biologist without video power pointMarine biologist without video power point
Marine biologist without video power point
 

Similar to Resource Efficient Secure Block Cipher VLSI Design

Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreIJERA Editor
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsIJERA Editor
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...eSAT Journals
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...IRJET Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...IJNSA Journal
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET Journal
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONcscpconf
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...IOSRJECE
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...IJECEIAES
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISijcisjournal
 
An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...eSAT Publishing House
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsAM Publications
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 

Similar to Resource Efficient Secure Block Cipher VLSI Design (20)

Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
 
An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Implementation of MAC using Modified Booth Algorithm
Implementation of MAC using Modified Booth AlgorithmImplementation of MAC using Modified Booth Algorithm
Implementation of MAC using Modified Booth Algorithm
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic Mathematics
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Resource Efficient Secure Block Cipher VLSI Design

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 A VLSI IMPLEMENTATION OF A RESOURCE EFFICIENT AND SECURE ARCHITECTURE OF A BLOCK CIPHER Satish Shivaram1 , R.Krishna2 , Vijayaprakash3 , K.V.Prasad4 1 Student, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India. 2 Assistant Professor, Electronics and communication, Bangalore Institute of Technology, Karnataka, India. 3 Professor, Electronics and Communication, Bangalore Institute of Technology, Karnataka , India. 4 Professor and HOD, Electronics and Communication, Bangalore Institute of Technology, Karnataka, India. Abstract In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector. Keywords : Cryptography, VLSI, FPGA , Block Cipher. --------------------------------------------------------------------- ***--------------------------------------------------------------------- 1. INTRODUCTION After the computer invention the need of developing tools to protect the information (data) stored in the computer raised. To fulfill this requirements number of tools designed and developed with the main goal of protecting information present in the computer from hackers. These facilities are generally called as computer security. The development of communication and network facilities make it possible to share the information between computers and then the problem of hacking of information arises from this the concept of network security developed. Cryptography is a technique that makes information not readable by unauthorized persons, by the use of encoding method. Some of the application of cryptography includes the security of ATM cards, use of passwords in computer and electronic commerce. Cryptography is derived from the Greek words ‗kryptos‘(hidden) and ‗graphos‘(written) respectively. Cryptography involves two processes. These are encryption and decryption. Encryption converts the plain text to cipher text. Decryption converts cipher text to plain text. The main goal of cryptography is to make our information confidential. There are various cryptographic algorithms have been developed. The design of any cryptographic algorithm requires the focus on three parameter: these are ―security, cost and performance‖. So depending on particular application one can choose better algorithm suitable for that application. Standardized algorithms like AES, DES etc, fails to provide security in applications such as RFID tag, sensor nodes, and smart cards. These algorithms demands the support of more resources, lightweight cryptography can be used as an alternative for these application, which gives better security compared to standardized cryptographic algorithms. This gives motivation for the designer to move towards lightweight cryptographic algorithms. Hummingbird cryptography is one of the lightweight cryptographic algorithms. Design of Hummingbird cryptography is motivated by the enigma machine . It is found that it uses small sized block and able to withstand cryptographic attacks like linear and differential cryptanalysis. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 172
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 In this paper hummingbird cryptographic algorithm is considered and tries to modify the block cipher used to reduce the area and enhanced performance without affecting the security of algorithm. In this paper block cipher is designed using throughput enhanced and area reduced architecture. The secure key used in this paper is 128 bit instead of 64 bit which was used in previous work. The S-box used here makes use of the readily available LUT which is shown in the methodology section. Both encryption and decryption work are carried out to show the given plain text is secured in high terms with large number of bits. With the same key used the given plain text can be obtained making the information more secure. The area utilization of both throughput enhanced and area reduced are obtained by synthesis report by using Xilinx 14.6 and are compared. Simulation results are obtained using ModelSim 10.1 and the waveforms are observed. The Theoretical backgrounds of cipher block and proposed architecture will be described in the next two sections. The simulation results and synthesis report will be discussed before conclusion. 2. THEORETICAL BACKGROUND In this section the basic flow chart of through put enhanced design and area reduced design is incorporated. In the first step the 16 bit plain text data is mixed with the 128 bit secure key which is subdivided into 8 different 16 bit secure key. Followed by this step is substitution step where the S-box plays an important role for both encryption and decryption. In this paper readily available S-box LUT is being used instead of representing Boolean expressions. linear transformation is followed after substitution layer. After eight times iteration the second round key with exoring with all odd numbers of key is given to S-box and linear transform layer. The process is repeated as shown in fig 1. The readily available S-box is shown below. Table 1: S-Boxes given in Hexadecimal format x 0 1 2 3 4 5 6 7 8 6 5 F 1 C A 9 0 7 E 1 5 B 8 2 2 E F 5 C 1 9 A 0 7 3 4 C 1 A F x 8 9 A B C D E F E B 2 4 7 0 D 3 3 A D 6 F C 4 9 B 4 6 8 0 7 3 D D E 6 B 2 8 9 5 3. PROPOSED ARCHITECTURE a. Throughput enhanced design: In this paper, the cipher block is presented by new expressions. The encryption and decryption block is designed separately using 128 bit has the new proposed design. The basic design of throughput enhanced design of block cipher using 128 bit secure key is as shown in fig 1. The proposed work goes well with the theoretical background with flow chart starting with the key mixing step with the given plain text. Followed by substitution layer where S- box plays an important role. In this paper we are using readily available S-box as shown in table 1. Followed by linear transformation layer which is given by m^m<<6^m<<10 expression for encryption. These steps are repeated 8 times with different 16 bit secure key. K9 is calculated with all the odd numbers of keys exoring and leads to S-box substitution and linear transformation and then k10 is calculated with all the even number of keys. The final 16 bit encrypted data of the given plain text data is obtained which is further made use in the decryption block using the same 128 bit secure key. Fig 1. Block diagram of proposed throughput enhanced encryption unit The decryption block using 128 bit secure key is as shown in fig 2. Here the operation are carried out in a similar manner as compared to encryption block which is the mirror operation of it. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 173
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 The only difference is the way the S-box readings are made which is inverse. In the next inverse linear transform the expression is given by m^m<<6^m<<10^m<<12. All the operations are inversed starting from key k10 to k1. The decrypted data is same as the plain text given and the procedure followed serves the purpose. Fig 2. Block diagram of proposed throughput enhanced decryption unit. b. area reduced design: in this paper major proposal is to get area reduction on fpga. The area reduced design encryption is shown in fig 3. In this design the number of components are reduced in the first part of substitution and linear transformation unit. The eight iterations are reduced with one unit where each key processing output is stored in a flop and based on the key select and data select operations are performed and the synthesis report is been generated and compared with the throughput enhanced version. We can see the number of 4 input LUTs used is reduced in this design. Fig 3. Block diagram of proposed area reduced design unit. Simulation results: Simulation results are seen using ModelSim 10.1b ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 174
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 Fig 4. Waveform of throughput enhanced encryption using 128 bit secure key. Fig 5. waveform of throughput enhanced decryption unit using 128 bit secure key ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 175
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 Fig 6. waveform of area reduced encryption unit using 128 bit secure key.Synthesis report : Syntesis is done using Xilinx 14.6 version. Table 2: Device utilization summary Module Area in LUT Throughput Oriented 128 252 Area oriented 128 104 Through put base paper 64 132 Area oriented 64 88 CONCLUSION In this paper , the cipher block named throughput enhanced and area reduced block ciphers are implemented. Both encryption and decryption units are developed and implemented. The round keys are generated and registered using 128 bit secure key instead of 64 bit key used in the previous work. The S – box implementation is done using readily available LUTs instead of Boolean expression which is time consuming and more number of slices for implementation. The simulation and synthesis reports are tabulated . as seen from the table 2 area reduced design required lesser number of 4 input LUT compared to throughput enhanced design. This shows that single module chip area optimization is observed in greater manner. This is a well balanced architecture with high performance and low complexity. This cipher block can also be used in wireless sensor nodes and smart chips. REFERENCES [1] R. Anderson, E. Biham, and L. Knudsen, “Serpent: A proposal for the advanced encryption standard,” in Proc. 1st Advanced Encryption Standard (AES) Conf., 1998. [2] B. Singh, L. Alexander, and S. Burman, “On algebraic relations of Serpent S-boxes”, Cryptology ePrint Archive, Report 2009/038, 2009. [3] M. J. O. Saarinen, “Cryptanalysis of Hummingbird-1,” in Proc. the 18th international conference on Fast software encryption, Denmark, Feb. 2011. [4] C. Patterson, “A Dynamic FPGA Implementation of the Serpent Block Cipher,” Lecture Notes in Computer Science, Vol. 1965, pp 141-155, 2000. [5] X. Fan, H. Hu, G. Gong, E. Smith, and D. Engels, “Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontrollers,” in Proc. 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009), pp. 838-844, Nov. 2009. [6] X. Fan, G. Gong, K. Lauffenburger, and T. Hicks, “FPGA Implementations of the Hummingbird Cryptographic Algorithm,” in Proc. The 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), pp.48-51, 2010. [7] X. Chen, Y. Zhu, Z. Gong, and Y. Luo, “Cryptanalysis of the Lightweight Block Cipher Hummingbird-1,” in proc. Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 515 - 518, 2013. [8] I. San and N. At, “Compact Hardware Architecture for Hummingbird Cryptographic Algorithm,” in Proc. 2011 International Conference on Field Programmable Logic and Applications (FPL), pp.376- 381, Sept. 2011. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 176
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 [9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe, “PRESENT: An Ultra- Lightweight Block Cipher”, Cryptographic Hardware and Embedded Systems, vol. 4727,Springer Heidelber, pp. 450- 466, 2007. [10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA Implementation of the SMS4 Block Cipher in the Chinese WAPI Standard,” in Proc. International Conference on Embedded Software and Systems Symposia, pp.104-106, July 2008. [11] X. Fan, “Efficient Cryptographic Algorithms and Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis, University of Waterloo, Canada, March 2010. [12] P. Bora and T. Czajka,“Implementation of the Serpent Algorithm Using Altera FPGA Devices,” Public Comments on AES Candidate Algorithms-Round 2, available at : http://www.nist.gov/aes/. [13] A.J. Elbirt and C Paar, “An FPGA implementation and performance evaluation of the Serpent block cipher,” In Proc. ACM Eighth International Symposium on Field Programmable Gate Arrays (FPGA 2000), pp. 33–40, Feb 2000. [14] X. Fan, G. Gong, and H. Hu, “Remedying the Hummingbird Cryptographic Algorithm,” in Proc. The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), China, Nov. 2011. [15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman, Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and implementation of block cipher in hummingbird algorithm over FPGA", Fifth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2014. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 [9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin and C. Vikkelsoe, “PRESENT: An Ultra- Lightweight Block Cipher”, Cryptographic Hardware and Embedded Systems, vol. 4727,Springer Heidelber, pp. 450- 466, 2007. [10] G. Xianwei,L. Erhong, X. Liqin, C. Hanlin, “FPGA Implementation of the SMS4 Block Cipher in the Chinese WAPI Standard,” in Proc. International Conference on Embedded Software and Systems Symposia, pp.104-106, July 2008. [11] X. Fan, “Efficient Cryptographic Algorithms and Protocols for Mobile Ad Hoc Networks,” Ph.D. thesis, University of Waterloo, Canada, March 2010. [12] P. Bora and T. Czajka,“Implementation of the Serpent Algorithm Using Altera FPGA Devices,” Public Comments on AES Candidate Algorithms-Round 2, available at : http://www.nist.gov/aes/. [13] A.J. Elbirt and C Paar, “An FPGA implementation and performance evaluation of the Serpent block cipher,” In Proc. ACM Eighth International Symposium on Field Programmable Gate Arrays (FPGA 2000), pp. 33–40, Feb 2000. [14] X. Fan, G. Gong, and H. Hu, “Remedying the Hummingbird Cryptographic Algorithm,” in Proc. The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), China, Nov. 2011. [15]Saha, Shumit, Md. Rashedul Islam, Habibur Rahman, Mehadi Hassan, and A. B. M. Aowlad Hossain. "Design and implementation of block cipher in hummingbird algorithm over FPGA", Fifth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2014. ________________________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 177