SlideShare a Scribd company logo
1 of 6
Download to read offline
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025
ISSN: 2249-6645

Implementation of Low Power and High Speed encryption
Using Crypto-Hardware
G.VijayaBharathi, K.VasuBabu, M.tech,
Asst.Prof, VVIT, Nambur, Guntur.

ABSTRACT: Cryptographic algorithms such as International Data Encryption Algorithm (IDEA) have found various
applications in secure transmission of the data in networked instrumentation and distributed measurement systems. Modulo
2n +1 multiplier and squarer play a pivotal role in the implementation of such crypto-algorithms. In this work, an efficient
hardware design of the IDEA (International Data Encryption Algorithm) using novel modulo 2n + 1 multiplier and squarer
as the basic modules is proposed for faster, smaller and low-power IDEA hardware circuits. Novel hardware
implementation of the modulo 2n + 1 multiplier is shown by using the efficient compressors and sparse tree based inverted
end around carry adders is given. The novel modules are applied on IDEA algorithm and the resulting implementation is
compared both qualitatively and quantitatively with the IDEA implementation using the existing multiplier/squarer
implementations. Experimental measurement results show that the proposed design is faster and smaller and also consume
less power than similar hardware implementations making it a viable option for efficient hardware
designs.Yet,despiteitssophistication,manyfutureattemptsat
crackingDESshowedsignificant
signsofsuccess.Forexample,
thedistributive computing approachofspreadingcracking computationpoweroverthe Internet earnedRockeVerserandMichael
Sandersthe
prize
ofthe1997DESChallenge.DESChallenge
II
wasalso
crackedthefollowingyear.WiththeinventionoftheElectronic FrontierFoundationDESCracker, itwasshownthat a 56-bit
keyprotectionisinsufficient
againstexhaustivesearchemployedwithtoday'stechnology.Therefore,there
wasanurgentcallforastrongersecret-keyencryptionalgorithm.IDEAwasone ofthe algorithmstoanswerthatcall.

Key words —modulo 2n + 1 multiplier; International Data Encryption Algorithm (IDEA); Sparse-tree adder;
Power/area/speed measurement;

I.

INTRODUCTION

Thedemand
for
highsecurityincommunicationschannels,networkedInstrumentationanddistributedmeasurement
systemsisevergrowing
rapidly.Theconfidentiality
andsecurityrequirementsarebecomingmoreandmoreimportant
to
protectthedata transmittedandreceived. Thisleadsto the need for efficient design of cryptographic algorithms
whichofferdataintegrity, authentication, non-repudiationand confidentialityof the encrypteddataacrossthe communication
channels.Variouscryptographic
algorithmshavebeenstudied
andimplemented
toensuresecurityofthesesystems.Inthis
paper,modulo2n+1multiplier hasbeenmuchfocusasithas found itsimportant roleinIDEAalgorithm. Forexample,the
threemajoroperationsthatdecidetheoverallperformanceand delayoftheIDEA [1,4,15]aremodulo2 16 addition,bitwise XOR and
modulo216+1multiplicationand
the
GF(2n)
Montgomerymultiplicationandmodularexponentiationcan
beimplementedusingrepeatedmultiplication
andsquaringof
thevectors.Amongtheseoperations,
improvingthedelayandpowerefficiencyofthemodulo2n
+1multiplicationoperation
leadstosignificant
increaseintheperformanceoftheentirecryptographiccipher.
Numeroushardware
implementationsofthe
IDEAalgorithmareproposedintheliteratureusingdifferentmodulo
216+1multiplierarchitectures.TheIDEAalgorithmhasbeen
implementedinsoftware[3]onIntelPentiumII445MHzwith
encryptionrateof23.53Mb/Sec.Later,IDEAwasrealized on hardwarechipbyCurigeret al [1]withencryptionratesup to
177Mb/sec.Byusingabit-serialimplementation
[4],which
enablestheIDEAtobefully,pipelinedtheencryption
rates
reached500Mb/sec with125MHzclockrate.Theefficiency oftheIDEAciphercanstillbeimprovedifefficient basic modules
suchasmodulomultipliers
and
addersareused.
Theefficient
implementationofthemodulo2n+1multiplier
basedonnovelcompressorsandsparsetreebasedinverted end around carry adders is presentedin [7]. Even though
thearchitecture
ofthemodulomultiplierisveryefficiently
proposedin[6],thehardwareimplementationandoptimization
areconsiderablyimprovedin[7].Thisisresulted byreplacing thefulladder arrayswiththenovelcompressors andthefinal
stageadderwiththesparsetreebasedinvertedendaround carryadder.
Thepaperisorganizedasfollows;Section II-A introducesmultiplexer-basedcompressors. InSectionII-B,thehardware
implementationofmodulo2n+1multiplierisgiven.Section
IIIdiscussestheproposedimplementationoftheIDEAcipher
whichusesmodulo216
+1multiplier.Acomparisonofourimplementationtoa
recentlyproposedimplementationismade
inSectionIV.OurconclusionsaredrawninsectionV.

II.

PRELIMINARIES AND REVIEW

Novelmultiplexor(MUX)basedcompressorsand2n
+1
multiplierdesignhavebeenreported
reviewedinthissectionasfollows:
A. Compressors
1) MUXvs.XOR:
ExistingCMOSdesignsof2-1MUX
and2-inputXORareshowninFig.1.According
to[8],
the
ofMUXperformsbetterintermsofpoweranddelaycomparedtoXOR.Suppose,XandY
www.ijmer.com

in[7]andarebriefly

CMOSimplementation
are
3020 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025
ISSN: 2249-6645
inputstotheXORgate,theoutputisXY+XY.Thesame
XORcanbeimplementedusingMUXwithinputsX,Xand
selectbitY.Theefficientimplementationofcompressors[9]
isachievedbyusingbothoutputanditscomplement
ofthese
gates.Thisalsoreducesthetotalnumberofgarbageoutputs.
2) DescriptionofCompressors:
A(p,2)compressorwith pinputsX1,X2
governedbytheequation:

...Xp

andtwooutputbitsSumandCarry alongwithcarryinputbitsandcarryoutputbitsis

Blockdiagramofa5:2compressorisshowninFig.2.Efficient
designoftheexistingXOR-based
5:2compressor
[10,11],
whichtakes5inputs
and2carryinputs,
isshowninFig.3(a).
Thecriticalpathdelayofthisexistingcompressoris4∆-XOR
(delaydenotedby∆).

Thenewlydesignedcompressorsusemultiplexersinplace
ofXORgates,resultinginhighspeedarithmetic.
Also,as
showninFig.3(a)inalltheexistingCMOSimplementations
oftheXORandMUX
gatesboththeoutput
anditscomplementareavailablebutthedesignsofcompressors availablein literaturedonotusetheseoutputsefficiently. IntheCMOS
implementation of the MUX if both the selectbit and its complementaregeneratedinthepreviousstage thenitsoutput
isgeneratedwithmuchless
delaybecausetheswitchingofthe
transistorisalreadycompleted.
Andalsoifboththeselectbit
anditscomplementaregeneratedinthepreviousstagethentheadditionalstage
oftheinverteriseliminatedwhichreducesthe
overalldelayinthecriticalpath. ThenewMUX-based design of5:2compressors[9] isshownin Fig.3(b),the delayof which is∆XOR+3∆-MUX CGEN blockusedinFig.3(b)
canbe
obtainedfromtheequationCout1=(x1+x2)·x3+x1·x2andtheCMOSimplementationisgiveninFig.4.

www.ijmer.com

3021 | Page
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025
ISSN: 2249-6645
B.Hardware Implementation of the mod 2n+1 Multi plier/Squarer
The hardwareimplementationofthe modulomultiplier consistsofthreemodules.Firstmoduleistogeneratepartial
products,second module is to reduce the partial products to two final operands and the last module is to add the Sum and
Carry operands from partial products reduction to get the final result.
www.ijmer.com

1) Partial products generation:The n × n partial products matrix is obtained from the n + 1-bitinput vectors. This
partialproduct matrix is generated after repositioning the bits of the initial partial product matrix based on several
observations presented in [6]. The final partial products matrix after applying all the observations is shown in Fig. 5. The
partialproductbits can becomputedfrom AND,OR andNOT gates. The most complexfunctionof partialproduct
generationmoduleispn−1,n−1Vqn−2,wherepi,j=aibjandqi=pn,iVpi,n

2)
Partialproductsreduction:Thisisthemostimportant
modulewhichlargelydeterminesthecriticalpathdelayand
theoverallperformance ofthemultiplier.Hencethismodule needsto be designedso as to get minimumdelayandconsume
lesspower. Theimplementations fromtheliterature[5,6,13]usefull adders(FA)andhalfadders(HA)toconstructthismodule.
Theseriesoffulladdersinanycolumncanbereplacedby
thenovelcompressorsthattakethesamenumberofinputs.In
theproposedimplementationuseofsuggestedcompressorsis done which not only reduces the delay and power consumptionbut
also the area of the circuit. For a modulo 2 16 + 1multiplier in IDEA cipher the Carry Save Adder (CSA) arrayimplementation
using Full Adders requires fifteen full addersin series in any column, these fifteen full adders can bereplaced by two 7:2
compressors, one 5:2 compressor and two3:2 compressors.
Correction factor computation is an important step while generating the partial products matrix. The full adder
implementation [6] and the compressor based implementations [7]result in the same value. Because of the space constraints,
computation of the correction factor COR for full adder implementation [6] is not given in this paper. COR computation for
compressor implementation involves computingonly COR2, because COR1 is obtained based on repositioning of the partial
productterm, which issame for both implementations. The correctionfactor COR2 computation for FA implementation which
has n-1 stages of additions is shown in [6]. And the COR2 computation for the proposed multiplier implementation using the
compressors also yields the same result. Since, any (p, 2) compressor can be primarily designed using p- 2 FAs which give p
- 2 carry outs with 2nweight. Hence, the overall correction factor COR computation for CSA array FA implementation and
compressor implementation yield the same result i.e., 3 as shown in [5].
3) Final Stage addition:The partial product reduction module gives one n-bit carry vector and one n-bit sum vector which
need to be added in the final stage addition module. Very efficient parallel prefix adders are designed to do this operation
[2].
Suppose S and C are sum and carry vectors produced after the partial product reduction section. As it is shown in
the work of Zimmerman [2] that

www.ijmer.com

3022 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025
ISSN: 2249-6645

Equation (1) can be implemented using an invertedEnd-Around-Carry adder [2, 5, 6]. Even though the propagation
delay of this adder is in the order of log2n, it has a drawback of high interconnect complexity and high fan-out. This can be
overcome by sparse tree adder [12, 16] based on the prefix network logic. The sparse tree adder generates the carry for every
four bits instead of generating it at every stage and using a carry select block for selecting the final carry after the prefix
network. This sparse tree adder was proven to be much more efficient in terms of both delay and power when compared with
the existing prefix tree based adders [14]. Hence this sparse tree can be used to design Inverted-End-Around-Carry adder.
The newly designed Inverted-End-Around-Carry adder using sparse tree adder structure is shown in Fig. 6. This InvertedEAC adder is used in the final stage addition of the modulo 2n+1 multiplier. Theproposed implementation of the modulo 216
+ 1 multiplier for IDEA cipher is shown in Fig. 7 and R16R15 : : :R2R1R0 represents the final product of the modulo 216 + 1
multiplier.

III.

NOVEL IMPLEMENTATION OF IDEA CIRCUIT USINGTHE PROPOSED MODULO 2N+ 1
MULTIPLIER/SQUARER

The modulo 2n + 1 computation is an integral part of the International Data Encryption Algorithm (IDEA) where n =16 [1,
4, 15]. Three major operations that decide the overall delay and performance of IDEA cipher are:
1) Modulo 216 addition;
2) Bitwise-XOR;
3)Modulo 216 + 1 multiplication/squaring.
As the first two operations take less time and are easy to implement, the delay and power efficiency of the entire
IDEA cipher depends significantly on the modulo 216 + 1 multiplication/squaring operation. Hence, the IDEA cipher is
implemented using the proposed modulo multiplier and compared with the existing implementations.

www.ijmer.com

3023 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025
ISSN: 2249-6645
Toencrypt adatablockusingIDEAcipher,thedatashould be processed through three modulo multiplication operationsin a single
round and the manipulated data again shouldPass through seven such rounds iteratively and a final outputtransformation to
produce the final encrypted output. TheIDEA cipher takes 64-bit input data and produces a 64-bitcipher text with a 128-bit
key. The encryption and decryptionalgorithms in IDEA are almost identical except they utilizetwo different sets of sub key
generated by the same key with different processes. The IDEA encryption and decryptionprocesses consist of eight rounds of
data manipulation usingsubkeys and a final output transformation stage. In this cipher,all the operations are carried out on
16-bit sub-blocks. In theencryption process, the input data block of 64-bits is dividedinto 4 sub blocks of 16-bits each
(X1;X2;X3;X4). 52 sub-keys for the encryption process are generated from the original128-bit key by shifting a part of it.
Out of the 52 subkeys, sixdifferent subkeys (i.e., Z1(r);Z2(r);Z3(r);Z4 (r);Z5(r) and Z6(r) ,where r is the roundnumber) are used for
each round and theremaining 4 subkeys are used in the final output transformationstage. The 16-bit outputs at each round are
represented asY 1(r); Y 2(r); Y 3(r); Y 4(r)and W1; W2; W3; W4 are the outputs of the final output stage transformation. The 52
subkeys used for the decryption process are obtained using a different algorithm[17]. As shown in Fig. 8, the critical path
consists ofthreemodulo 216 + 1 multiplication operations, two modulo 216addition operations and two 16-bit XOR
operations in eachround. In the final output transformation stage, critical path consists of a single modulo 216 + 1
multiplication operation.The throughput of the IDEA cipher can be improved, if thedelay of the modulo 216+1
multiplication operation is reduced in the pipelined implementation of the IDEA cipher. Fig. 8shows the data path of
encryption process of the IDEA cipherand datapath of a single round with 4 pipeline stages with the proposed modulo
multiplier.

IV.

EXPERIMENTAL SIMULATIONAND RESULTS

The proposed design of the IDEA cipher with four pipelinestages using novel modulo 2n+1 multipliers is used to
analyse and compare with the well-known IDEA cipher implementations. The use of the novel modulo multiplier improves
thethroughput and performance of the IDEA cipher significantly.
A. Simulation environment
All the simulations have been carried out using MentorGraphics ASIC (Application-Specific IC) design suite.
Theproposed IDEA cipher design is specified using Verilog HDLand the multiplier descriptions are mapped on a 0.18
_mCMOS standard cell library usingLeonardo Spectrum synthesis tool from Mentor Graphics.

The design is optimized forhigh speed performance. Netlists generated from synthesis toolare passed on to standard
route and place tool; the layouts areiteratively generated to get the circuits with minimum area.The calculation of power and
delay are carried out using theEldosimulation tool. The proposed experimental simulationhas been performed at 1.8V with
all inputs fed at a frequency of 25MHz.
B. Simulation results
The IDEA cipher is implemented using both the proposedmultiplier and the multipliers presented in [6]. Various
performancemeasurements includingencryptionrate,delayand areafortheIDEAcipherusingboththeproposedmultiplier and
theexisting multiplierareparametricallyobtainedand listed inTableI. As expected, theproposedIDEA circuit
implementationachievessignificantimprovementsintermsof
throughput(i.e.,encryption
rate),latency(i.e.,criticalpath
delay)andarea(i.e.,circuitarea).

www.ijmer.com

3024 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025
ISSN: 2249-6645

V.

CONCLUSION

A hardware implementation of the IDEA cipher using novelmodulo 2n+1multipliers ispresented in this paper. It
isshown that the proposed modulo 2n+1 multiplier improvestheperformance of the variouscryptographic algorithms used
insecure communication systems of networked instrumentationand distributed measurement systems. Efficient
compressorsandsparsetreebasedinvertedendaroundcarryaddersare
usedtoreducethedelayandcomplexity
ofthemultiplier.
Simulations areperformedontheknownimplementation and theproposedimplementation.Thepresentedimplementation
isproven toperform betterthantheexistingoneinvarious aspects,(i.e., throughputandcriticalpathdelay).

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]

R. Zimmermann, A. Curiger, H. Bonnenberg, H. Kaeslin, N. Felber andW. Fichtner, A 177 Mb/s VLSI implementation of the
international dataencryption algorithm, IEEE J. Solid-State Circuits, 1994, 29, (3), pp.303-307
R. Zimmerman, Efficient VLSI implementation of modulo (2 n _ 1)addition and multiplication, IEEE trans. Comput., 2002, 51, pp.
1389-1399.
O. Cheung, K. Tsoi, P. Leong and M. Leong, Tradeoffs in parallel andserial implementations of the international data encryption
algorithmIDEA, Lecture Notes in Computer Science, vol. 2162, pp. 333-340,2001.
M. Leong, O. Cheung, K. Tsoi, and P. Leong, A bit-serial implementation of the international data encryption algorithm IDEA,
2000 IEEESymposium on Field-Programmable Custom Computing Machines, pp.122-131, 2000.
C. Efstathiou, H. Vergos, S. Dimitrakopoulos and D. Nikolos, Efficientdiminished-1 modulo 2n+ 1 multipliers, IEEE Trans.
Comput., 2005,54, pp. 491-496.
H. Vergos and C. Efstathiou, Design of efficient modulo 2n+ 1multipliers, IETComput. Digit. Tech., 2007, 1, (1), pp. 49-57.
R. Modugu, N. Park and M. Choi, A Fast Low-Power Modulo2n+ 1 Multiplier Design, 2009 IEEE International
Instrumentationand Measurement Technology Conference, pp.951-956, May 2009.
R. Zimmermann and W. Fichtner., Low-power logic styles: CMOSversus pass-transistor logic, IEEE J. Solid- State Circuits, vol.
32, pp.1079-1090, July 1997.
S. Veeramachaneni, L. Avinash, M. Rajashekhar and M. Srinivas,Efficient Modulo (2k _1) Binary to Residue Converters Systemon-Chip for Real-Time Applications, The 6th International Workshop onDec. 2006 pp.195 - 200.
C. Chang, J. Gu and M. Zhang, Ultra low-voltage lowpower CMOS4-2 and 5-2 compressors for fast arithmetic circuits, IEEE J.
Circuitsand Systems I, Vol. 51, No. 10, pp. 1985- 1997, 2004
M. Rouholamini, O. Kavehie, A. Mirbaha, S. Jasbi and K. Navi, ANew Design for 7:2 Compressors, Computer Systems and
Applications,2007. AICCSA ’07. IEEE/ACS International Conference on 13-16 May2007 Page(s):474 - 478.
S. Mathew, M. Anders, R. Krishnamurthy and S. Borkar, A 4-GHz130-nm address generation unit with 32-bit sparse-tree adder
core,IEEE Journal of Solid-State Circuits, Volume 38, Issue 5, May 2003Page(s):689 - 695.
Zhongde Wang, Graham A. Jullien, William C. Miller., An efficient treearchitecture for modulo 2n +1 multiplication, VLSI Signal
Processing14(3): 241-248 (1996).
P. Kogge and H. S. Stone., A parallel algorithm for the efficient solutionof a general class of recurrence equations, IEEE Trans.
Comput., vol.C-22, pp. 786-793, Aug 1973.
A. Curigeret. al., VINCI: VLSI Implementation of the New Secret-keyBlock Cipher IDEA, Proc. of the Custom Integrated
CircuitsConference, San Diego, USA, May 1993
Yan Sun, DongyuZheng, Minxuan Zhang, and Shaoqing Li HighPerformance Low-Power Sparse-Tree Binary Adders, 8th
InternationalConference on Solid state and Integrated Circuit Technology, ICSICT2006.
Yi-Jung Chen, Dyi-Rong Duh, Yunghsian Sam Han: Improved Modulo(2 n+1) Multiplier for IDEA, J. Inf. Sci. Eng. 23(3):911923(2007)

www.ijmer.com

3025 | Page

More Related Content

What's hot

High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...IOSR Journals
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET Journal
 
Reducing the Number Of Transistors In Carry Select Adder
Reducing the Number Of Transistors In Carry Select AdderReducing the Number Of Transistors In Carry Select Adder
Reducing the Number Of Transistors In Carry Select Adderpaperpublications3
 
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator cscpconf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
DUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORM
DUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORMDUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORM
DUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORMVLSICS Design
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...journalBEEI
 
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkStudy on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkRadita Apriana
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET Journal
 
A CORDIC based QR Decomposition Technique for MIMO Detection
A CORDIC based QR Decomposition Technique for MIMO Detection A CORDIC based QR Decomposition Technique for MIMO Detection
A CORDIC based QR Decomposition Technique for MIMO Detection IJECEIAES
 
IRJET- A Review: To Design Efficient 32 Bits Carry Select Adder by using ...
IRJET-  	  A Review: To Design Efficient 32 Bits Carry Select Adder by using ...IRJET-  	  A Review: To Design Efficient 32 Bits Carry Select Adder by using ...
IRJET- A Review: To Design Efficient 32 Bits Carry Select Adder by using ...IRJET Journal
 
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET Journal
 
Modified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformModified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformIJERA Editor
 
Folza_paper_mechatronics
Folza_paper_mechatronicsFolza_paper_mechatronics
Folza_paper_mechatronicsAlex Folz
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithmiosrjce
 
HPC Accelerating Combustion Engine Design
HPC Accelerating Combustion Engine DesignHPC Accelerating Combustion Engine Design
HPC Accelerating Combustion Engine Designinside-BigData.com
 

What's hot (20)

High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
 
Reducing the Number Of Transistors In Carry Select Adder
Reducing the Number Of Transistors In Carry Select AdderReducing the Number Of Transistors In Carry Select Adder
Reducing the Number Of Transistors In Carry Select Adder
 
An35225228
An35225228An35225228
An35225228
 
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator
 
[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng
[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng
[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng
 
A03530107
A03530107A03530107
A03530107
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
DUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORM
DUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORMDUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORM
DUAL FIELD DUAL CORE SECURE CRYPTOPROCESSOR ON FPGA PLATFORM
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...
 
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkStudy on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
 
W4408123126
W4408123126W4408123126
W4408123126
 
A CORDIC based QR Decomposition Technique for MIMO Detection
A CORDIC based QR Decomposition Technique for MIMO Detection A CORDIC based QR Decomposition Technique for MIMO Detection
A CORDIC based QR Decomposition Technique for MIMO Detection
 
IRJET- A Review: To Design Efficient 32 Bits Carry Select Adder by using ...
IRJET-  	  A Review: To Design Efficient 32 Bits Carry Select Adder by using ...IRJET-  	  A Review: To Design Efficient 32 Bits Carry Select Adder by using ...
IRJET- A Review: To Design Efficient 32 Bits Carry Select Adder by using ...
 
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
 
Modified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformModified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transform
 
Folza_paper_mechatronics
Folza_paper_mechatronicsFolza_paper_mechatronics
Folza_paper_mechatronics
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
HPC Accelerating Combustion Engine Design
HPC Accelerating Combustion Engine DesignHPC Accelerating Combustion Engine Design
HPC Accelerating Combustion Engine Design
 

Viewers also liked

Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...
Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...
Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...IJMER
 
On Some Integrals of Products of H -Functions
On Some Integrals of Products of  H -FunctionsOn Some Integrals of Products of  H -Functions
On Some Integrals of Products of H -FunctionsIJMER
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...IJMER
 
Behavioural Modelling Outcomes prediction using Casual Factors
Behavioural Modelling Outcomes prediction using Casual  FactorsBehavioural Modelling Outcomes prediction using Casual  Factors
Behavioural Modelling Outcomes prediction using Casual FactorsIJMER
 
On The Transcendental Equation
On The Transcendental EquationOn The Transcendental Equation
On The Transcendental EquationIJMER
 
A Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between AttributesA Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between AttributesIJMER
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Layered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion DectionLayered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion DectionIJMER
 
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa,  IndiaHeavy Mineral Studies of Beach Sands of Vagathor, North Goa,  India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, IndiaIJMER
 
Ijmer 46067782
Ijmer 46067782Ijmer 46067782
Ijmer 46067782IJMER
 
Optimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewOptimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewIJMER
 
Bj2421682173
Bj2421682173Bj2421682173
Bj2421682173IJMER
 
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...IJMER
 
Developing Infrared Controlled Automated Door System
Developing Infrared Controlled Automated Door SystemDeveloping Infrared Controlled Automated Door System
Developing Infrared Controlled Automated Door SystemIJMER
 
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...IJMER
 
ANN Based Prediction Model as a Condition Monitoring Tool for Machine Tools
ANN Based Prediction Model as a Condition Monitoring Tool for Machine ToolsANN Based Prediction Model as a Condition Monitoring Tool for Machine Tools
ANN Based Prediction Model as a Condition Monitoring Tool for Machine ToolsIJMER
 
Orientation Effects of Stress Concentrators on the Material Deformation Beha...
Orientation Effects of Stress Concentrators on the Material  Deformation Beha...Orientation Effects of Stress Concentrators on the Material  Deformation Beha...
Orientation Effects of Stress Concentrators on the Material Deformation Beha...IJMER
 
Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...
Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...
Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...IJMER
 
Ijmer 46043741
Ijmer 46043741Ijmer 46043741
Ijmer 46043741IJMER
 
Harmonic Analysis of VFD’s
Harmonic Analysis of VFD’sHarmonic Analysis of VFD’s
Harmonic Analysis of VFD’sIJMER
 

Viewers also liked (20)

Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...
Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...
Energy Based Analysis of a Thermal Power Station for Energy Efficiency Improv...
 
On Some Integrals of Products of H -Functions
On Some Integrals of Products of  H -FunctionsOn Some Integrals of Products of  H -Functions
On Some Integrals of Products of H -Functions
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
 
Behavioural Modelling Outcomes prediction using Casual Factors
Behavioural Modelling Outcomes prediction using Casual  FactorsBehavioural Modelling Outcomes prediction using Casual  Factors
Behavioural Modelling Outcomes prediction using Casual Factors
 
On The Transcendental Equation
On The Transcendental EquationOn The Transcendental Equation
On The Transcendental Equation
 
A Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between AttributesA Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between Attributes
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Layered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion DectionLayered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion Dection
 
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa,  IndiaHeavy Mineral Studies of Beach Sands of Vagathor, North Goa,  India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, India
 
Ijmer 46067782
Ijmer 46067782Ijmer 46067782
Ijmer 46067782
 
Optimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewOptimization of Tool Wear: A Review
Optimization of Tool Wear: A Review
 
Bj2421682173
Bj2421682173Bj2421682173
Bj2421682173
 
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
 
Developing Infrared Controlled Automated Door System
Developing Infrared Controlled Automated Door SystemDeveloping Infrared Controlled Automated Door System
Developing Infrared Controlled Automated Door System
 
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
 
ANN Based Prediction Model as a Condition Monitoring Tool for Machine Tools
ANN Based Prediction Model as a Condition Monitoring Tool for Machine ToolsANN Based Prediction Model as a Condition Monitoring Tool for Machine Tools
ANN Based Prediction Model as a Condition Monitoring Tool for Machine Tools
 
Orientation Effects of Stress Concentrators on the Material Deformation Beha...
Orientation Effects of Stress Concentrators on the Material  Deformation Beha...Orientation Effects of Stress Concentrators on the Material  Deformation Beha...
Orientation Effects of Stress Concentrators on the Material Deformation Beha...
 
Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...
Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...
Investigations of Surface Dissolution on Fatigue Crack Nucleation in Ni-22Cr-...
 
Ijmer 46043741
Ijmer 46043741Ijmer 46043741
Ijmer 46043741
 
Harmonic Analysis of VFD’s
Harmonic Analysis of VFD’sHarmonic Analysis of VFD’s
Harmonic Analysis of VFD’s
 

Similar to Implementation of Low Power and High Speed encryption Using Crypto-Hardware

High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...IJMER
 
Design and testing of systolic array multiplier using fault injecting schemes
Design and testing of systolic array multiplier using fault injecting schemesDesign and testing of systolic array multiplier using fault injecting schemes
Design and testing of systolic array multiplier using fault injecting schemesCSITiaesprime
 
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...IRJET Journal
 
FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...
FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...
FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...IOSRJVSP
 
Auto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA codeAuto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA codeIRJET Journal
 
Design and analysis of optimized CORDIC based GMSK system on FPGA platform
Design and analysis of optimized CORDIC based  GMSK system on FPGA platform Design and analysis of optimized CORDIC based  GMSK system on FPGA platform
Design and analysis of optimized CORDIC based GMSK system on FPGA platform IJECEIAES
 
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGA
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGAA LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGA
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGAIRJET Journal
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate arrayIJECEIAES
 
Implementation of Rotation and Vectoring-Mode Reconfigurable CORDIC
Implementation of Rotation and Vectoring-Mode Reconfigurable CORDICImplementation of Rotation and Vectoring-Mode Reconfigurable CORDIC
Implementation of Rotation and Vectoring-Mode Reconfigurable CORDICijtsrd
 
Multi Processor Architecture for image processing
Multi Processor Architecture for image processingMulti Processor Architecture for image processing
Multi Processor Architecture for image processingideas2ignite
 
Low complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acsLow complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acsIAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...IJNSA Journal
 
186 devlin p-poster(2)
186 devlin p-poster(2)186 devlin p-poster(2)
186 devlin p-poster(2)vaidehi87
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Embedded processor system for controllable period-width multichannel pulse wi...
Embedded processor system for controllable period-width multichannel pulse wi...Embedded processor system for controllable period-width multichannel pulse wi...
Embedded processor system for controllable period-width multichannel pulse wi...TELKOMNIKA JOURNAL
 

Similar to Implementation of Low Power and High Speed encryption Using Crypto-Hardware (20)

Cuda project paper
Cuda project paperCuda project paper
Cuda project paper
 
High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...
 
Design and testing of systolic array multiplier using fault injecting schemes
Design and testing of systolic array multiplier using fault injecting schemesDesign and testing of systolic array multiplier using fault injecting schemes
Design and testing of systolic array multiplier using fault injecting schemes
 
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...
 
FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...
FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...
FPGA Implementation of Multiplier-less CDF-5/3 Wavelet Transform for Image Pr...
 
Auto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA codeAuto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA code
 
Design and analysis of optimized CORDIC based GMSK system on FPGA platform
Design and analysis of optimized CORDIC based  GMSK system on FPGA platform Design and analysis of optimized CORDIC based  GMSK system on FPGA platform
Design and analysis of optimized CORDIC based GMSK system on FPGA platform
 
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGA
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGAA LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGA
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGA
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate array
 
Implementation of Rotation and Vectoring-Mode Reconfigurable CORDIC
Implementation of Rotation and Vectoring-Mode Reconfigurable CORDICImplementation of Rotation and Vectoring-Mode Reconfigurable CORDIC
Implementation of Rotation and Vectoring-Mode Reconfigurable CORDIC
 
Multi Processor Architecture for image processing
Multi Processor Architecture for image processingMulti Processor Architecture for image processing
Multi Processor Architecture for image processing
 
Low complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acsLow complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acs
 
imagefiltervhdl.pptx
imagefiltervhdl.pptximagefiltervhdl.pptx
imagefiltervhdl.pptx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
 
186 devlin p-poster(2)
186 devlin p-poster(2)186 devlin p-poster(2)
186 devlin p-poster(2)
 
F1074145
F1074145F1074145
F1074145
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Embedded processor system for controllable period-width multichannel pulse wi...
Embedded processor system for controllable period-width multichannel pulse wi...Embedded processor system for controllable period-width multichannel pulse wi...
Embedded processor system for controllable period-width multichannel pulse wi...
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Implementation of Low Power and High Speed encryption Using Crypto-Hardware

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025 ISSN: 2249-6645 Implementation of Low Power and High Speed encryption Using Crypto-Hardware G.VijayaBharathi, K.VasuBabu, M.tech, Asst.Prof, VVIT, Nambur, Guntur. ABSTRACT: Cryptographic algorithms such as International Data Encryption Algorithm (IDEA) have found various applications in secure transmission of the data in networked instrumentation and distributed measurement systems. Modulo 2n +1 multiplier and squarer play a pivotal role in the implementation of such crypto-algorithms. In this work, an efficient hardware design of the IDEA (International Data Encryption Algorithm) using novel modulo 2n + 1 multiplier and squarer as the basic modules is proposed for faster, smaller and low-power IDEA hardware circuits. Novel hardware implementation of the modulo 2n + 1 multiplier is shown by using the efficient compressors and sparse tree based inverted end around carry adders is given. The novel modules are applied on IDEA algorithm and the resulting implementation is compared both qualitatively and quantitatively with the IDEA implementation using the existing multiplier/squarer implementations. Experimental measurement results show that the proposed design is faster and smaller and also consume less power than similar hardware implementations making it a viable option for efficient hardware designs.Yet,despiteitssophistication,manyfutureattemptsat crackingDESshowedsignificant signsofsuccess.Forexample, thedistributive computing approachofspreadingcracking computationpoweroverthe Internet earnedRockeVerserandMichael Sandersthe prize ofthe1997DESChallenge.DESChallenge II wasalso crackedthefollowingyear.WiththeinventionoftheElectronic FrontierFoundationDESCracker, itwasshownthat a 56-bit keyprotectionisinsufficient againstexhaustivesearchemployedwithtoday'stechnology.Therefore,there wasanurgentcallforastrongersecret-keyencryptionalgorithm.IDEAwasone ofthe algorithmstoanswerthatcall. Key words —modulo 2n + 1 multiplier; International Data Encryption Algorithm (IDEA); Sparse-tree adder; Power/area/speed measurement; I. INTRODUCTION Thedemand for highsecurityincommunicationschannels,networkedInstrumentationanddistributedmeasurement systemsisevergrowing rapidly.Theconfidentiality andsecurityrequirementsarebecomingmoreandmoreimportant to protectthedata transmittedandreceived. Thisleadsto the need for efficient design of cryptographic algorithms whichofferdataintegrity, authentication, non-repudiationand confidentialityof the encrypteddataacrossthe communication channels.Variouscryptographic algorithmshavebeenstudied andimplemented toensuresecurityofthesesystems.Inthis paper,modulo2n+1multiplier hasbeenmuchfocusasithas found itsimportant roleinIDEAalgorithm. Forexample,the threemajoroperationsthatdecidetheoverallperformanceand delayoftheIDEA [1,4,15]aremodulo2 16 addition,bitwise XOR and modulo216+1multiplicationand the GF(2n) Montgomerymultiplicationandmodularexponentiationcan beimplementedusingrepeatedmultiplication andsquaringof thevectors.Amongtheseoperations, improvingthedelayandpowerefficiencyofthemodulo2n +1multiplicationoperation leadstosignificant increaseintheperformanceoftheentirecryptographiccipher. Numeroushardware implementationsofthe IDEAalgorithmareproposedintheliteratureusingdifferentmodulo 216+1multiplierarchitectures.TheIDEAalgorithmhasbeen implementedinsoftware[3]onIntelPentiumII445MHzwith encryptionrateof23.53Mb/Sec.Later,IDEAwasrealized on hardwarechipbyCurigeret al [1]withencryptionratesup to 177Mb/sec.Byusingabit-serialimplementation [4],which enablestheIDEAtobefully,pipelinedtheencryption rates reached500Mb/sec with125MHzclockrate.Theefficiency oftheIDEAciphercanstillbeimprovedifefficient basic modules suchasmodulomultipliers and addersareused. Theefficient implementationofthemodulo2n+1multiplier basedonnovelcompressorsandsparsetreebasedinverted end around carry adders is presentedin [7]. Even though thearchitecture ofthemodulomultiplierisveryefficiently proposedin[6],thehardwareimplementationandoptimization areconsiderablyimprovedin[7].Thisisresulted byreplacing thefulladder arrayswiththenovelcompressors andthefinal stageadderwiththesparsetreebasedinvertedendaround carryadder. Thepaperisorganizedasfollows;Section II-A introducesmultiplexer-basedcompressors. InSectionII-B,thehardware implementationofmodulo2n+1multiplierisgiven.Section IIIdiscussestheproposedimplementationoftheIDEAcipher whichusesmodulo216 +1multiplier.Acomparisonofourimplementationtoa recentlyproposedimplementationismade inSectionIV.OurconclusionsaredrawninsectionV. II. PRELIMINARIES AND REVIEW Novelmultiplexor(MUX)basedcompressorsand2n +1 multiplierdesignhavebeenreported reviewedinthissectionasfollows: A. Compressors 1) MUXvs.XOR: ExistingCMOSdesignsof2-1MUX and2-inputXORareshowninFig.1.According to[8], the ofMUXperformsbetterintermsofpoweranddelaycomparedtoXOR.Suppose,XandY www.ijmer.com in[7]andarebriefly CMOSimplementation are 3020 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025 ISSN: 2249-6645 inputstotheXORgate,theoutputisXY+XY.Thesame XORcanbeimplementedusingMUXwithinputsX,Xand selectbitY.Theefficientimplementationofcompressors[9] isachievedbyusingbothoutputanditscomplement ofthese gates.Thisalsoreducesthetotalnumberofgarbageoutputs. 2) DescriptionofCompressors: A(p,2)compressorwith pinputsX1,X2 governedbytheequation: ...Xp andtwooutputbitsSumandCarry alongwithcarryinputbitsandcarryoutputbitsis Blockdiagramofa5:2compressorisshowninFig.2.Efficient designoftheexistingXOR-based 5:2compressor [10,11], whichtakes5inputs and2carryinputs, isshowninFig.3(a). Thecriticalpathdelayofthisexistingcompressoris4∆-XOR (delaydenotedby∆). Thenewlydesignedcompressorsusemultiplexersinplace ofXORgates,resultinginhighspeedarithmetic. Also,as showninFig.3(a)inalltheexistingCMOSimplementations oftheXORandMUX gatesboththeoutput anditscomplementareavailablebutthedesignsofcompressors availablein literaturedonotusetheseoutputsefficiently. IntheCMOS implementation of the MUX if both the selectbit and its complementaregeneratedinthepreviousstage thenitsoutput isgeneratedwithmuchless delaybecausetheswitchingofthe transistorisalreadycompleted. Andalsoifboththeselectbit anditscomplementaregeneratedinthepreviousstagethentheadditionalstage oftheinverteriseliminatedwhichreducesthe overalldelayinthecriticalpath. ThenewMUX-based design of5:2compressors[9] isshownin Fig.3(b),the delayof which is∆XOR+3∆-MUX CGEN blockusedinFig.3(b) canbe obtainedfromtheequationCout1=(x1+x2)·x3+x1·x2andtheCMOSimplementationisgiveninFig.4. www.ijmer.com 3021 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025 ISSN: 2249-6645 B.Hardware Implementation of the mod 2n+1 Multi plier/Squarer The hardwareimplementationofthe modulomultiplier consistsofthreemodules.Firstmoduleistogeneratepartial products,second module is to reduce the partial products to two final operands and the last module is to add the Sum and Carry operands from partial products reduction to get the final result. www.ijmer.com 1) Partial products generation:The n × n partial products matrix is obtained from the n + 1-bitinput vectors. This partialproduct matrix is generated after repositioning the bits of the initial partial product matrix based on several observations presented in [6]. The final partial products matrix after applying all the observations is shown in Fig. 5. The partialproductbits can becomputedfrom AND,OR andNOT gates. The most complexfunctionof partialproduct generationmoduleispn−1,n−1Vqn−2,wherepi,j=aibjandqi=pn,iVpi,n 2) Partialproductsreduction:Thisisthemostimportant modulewhichlargelydeterminesthecriticalpathdelayand theoverallperformance ofthemultiplier.Hencethismodule needsto be designedso as to get minimumdelayandconsume lesspower. Theimplementations fromtheliterature[5,6,13]usefull adders(FA)andhalfadders(HA)toconstructthismodule. Theseriesoffulladdersinanycolumncanbereplacedby thenovelcompressorsthattakethesamenumberofinputs.In theproposedimplementationuseofsuggestedcompressorsis done which not only reduces the delay and power consumptionbut also the area of the circuit. For a modulo 2 16 + 1multiplier in IDEA cipher the Carry Save Adder (CSA) arrayimplementation using Full Adders requires fifteen full addersin series in any column, these fifteen full adders can bereplaced by two 7:2 compressors, one 5:2 compressor and two3:2 compressors. Correction factor computation is an important step while generating the partial products matrix. The full adder implementation [6] and the compressor based implementations [7]result in the same value. Because of the space constraints, computation of the correction factor COR for full adder implementation [6] is not given in this paper. COR computation for compressor implementation involves computingonly COR2, because COR1 is obtained based on repositioning of the partial productterm, which issame for both implementations. The correctionfactor COR2 computation for FA implementation which has n-1 stages of additions is shown in [6]. And the COR2 computation for the proposed multiplier implementation using the compressors also yields the same result. Since, any (p, 2) compressor can be primarily designed using p- 2 FAs which give p - 2 carry outs with 2nweight. Hence, the overall correction factor COR computation for CSA array FA implementation and compressor implementation yield the same result i.e., 3 as shown in [5]. 3) Final Stage addition:The partial product reduction module gives one n-bit carry vector and one n-bit sum vector which need to be added in the final stage addition module. Very efficient parallel prefix adders are designed to do this operation [2]. Suppose S and C are sum and carry vectors produced after the partial product reduction section. As it is shown in the work of Zimmerman [2] that www.ijmer.com 3022 | Page
  • 4. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025 ISSN: 2249-6645 Equation (1) can be implemented using an invertedEnd-Around-Carry adder [2, 5, 6]. Even though the propagation delay of this adder is in the order of log2n, it has a drawback of high interconnect complexity and high fan-out. This can be overcome by sparse tree adder [12, 16] based on the prefix network logic. The sparse tree adder generates the carry for every four bits instead of generating it at every stage and using a carry select block for selecting the final carry after the prefix network. This sparse tree adder was proven to be much more efficient in terms of both delay and power when compared with the existing prefix tree based adders [14]. Hence this sparse tree can be used to design Inverted-End-Around-Carry adder. The newly designed Inverted-End-Around-Carry adder using sparse tree adder structure is shown in Fig. 6. This InvertedEAC adder is used in the final stage addition of the modulo 2n+1 multiplier. Theproposed implementation of the modulo 216 + 1 multiplier for IDEA cipher is shown in Fig. 7 and R16R15 : : :R2R1R0 represents the final product of the modulo 216 + 1 multiplier. III. NOVEL IMPLEMENTATION OF IDEA CIRCUIT USINGTHE PROPOSED MODULO 2N+ 1 MULTIPLIER/SQUARER The modulo 2n + 1 computation is an integral part of the International Data Encryption Algorithm (IDEA) where n =16 [1, 4, 15]. Three major operations that decide the overall delay and performance of IDEA cipher are: 1) Modulo 216 addition; 2) Bitwise-XOR; 3)Modulo 216 + 1 multiplication/squaring. As the first two operations take less time and are easy to implement, the delay and power efficiency of the entire IDEA cipher depends significantly on the modulo 216 + 1 multiplication/squaring operation. Hence, the IDEA cipher is implemented using the proposed modulo multiplier and compared with the existing implementations. www.ijmer.com 3023 | Page
  • 5. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025 ISSN: 2249-6645 Toencrypt adatablockusingIDEAcipher,thedatashould be processed through three modulo multiplication operationsin a single round and the manipulated data again shouldPass through seven such rounds iteratively and a final outputtransformation to produce the final encrypted output. TheIDEA cipher takes 64-bit input data and produces a 64-bitcipher text with a 128-bit key. The encryption and decryptionalgorithms in IDEA are almost identical except they utilizetwo different sets of sub key generated by the same key with different processes. The IDEA encryption and decryptionprocesses consist of eight rounds of data manipulation usingsubkeys and a final output transformation stage. In this cipher,all the operations are carried out on 16-bit sub-blocks. In theencryption process, the input data block of 64-bits is dividedinto 4 sub blocks of 16-bits each (X1;X2;X3;X4). 52 sub-keys for the encryption process are generated from the original128-bit key by shifting a part of it. Out of the 52 subkeys, sixdifferent subkeys (i.e., Z1(r);Z2(r);Z3(r);Z4 (r);Z5(r) and Z6(r) ,where r is the roundnumber) are used for each round and theremaining 4 subkeys are used in the final output transformationstage. The 16-bit outputs at each round are represented asY 1(r); Y 2(r); Y 3(r); Y 4(r)and W1; W2; W3; W4 are the outputs of the final output stage transformation. The 52 subkeys used for the decryption process are obtained using a different algorithm[17]. As shown in Fig. 8, the critical path consists ofthreemodulo 216 + 1 multiplication operations, two modulo 216addition operations and two 16-bit XOR operations in eachround. In the final output transformation stage, critical path consists of a single modulo 216 + 1 multiplication operation.The throughput of the IDEA cipher can be improved, if thedelay of the modulo 216+1 multiplication operation is reduced in the pipelined implementation of the IDEA cipher. Fig. 8shows the data path of encryption process of the IDEA cipherand datapath of a single round with 4 pipeline stages with the proposed modulo multiplier. IV. EXPERIMENTAL SIMULATIONAND RESULTS The proposed design of the IDEA cipher with four pipelinestages using novel modulo 2n+1 multipliers is used to analyse and compare with the well-known IDEA cipher implementations. The use of the novel modulo multiplier improves thethroughput and performance of the IDEA cipher significantly. A. Simulation environment All the simulations have been carried out using MentorGraphics ASIC (Application-Specific IC) design suite. Theproposed IDEA cipher design is specified using Verilog HDLand the multiplier descriptions are mapped on a 0.18 _mCMOS standard cell library usingLeonardo Spectrum synthesis tool from Mentor Graphics. The design is optimized forhigh speed performance. Netlists generated from synthesis toolare passed on to standard route and place tool; the layouts areiteratively generated to get the circuits with minimum area.The calculation of power and delay are carried out using theEldosimulation tool. The proposed experimental simulationhas been performed at 1.8V with all inputs fed at a frequency of 25MHz. B. Simulation results The IDEA cipher is implemented using both the proposedmultiplier and the multipliers presented in [6]. Various performancemeasurements includingencryptionrate,delayand areafortheIDEAcipherusingboththeproposedmultiplier and theexisting multiplierareparametricallyobtainedand listed inTableI. As expected, theproposedIDEA circuit implementationachievessignificantimprovementsintermsof throughput(i.e.,encryption rate),latency(i.e.,criticalpath delay)andarea(i.e.,circuitarea). www.ijmer.com 3024 | Page
  • 6. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3020-3025 ISSN: 2249-6645 V. CONCLUSION A hardware implementation of the IDEA cipher using novelmodulo 2n+1multipliers ispresented in this paper. It isshown that the proposed modulo 2n+1 multiplier improvestheperformance of the variouscryptographic algorithms used insecure communication systems of networked instrumentationand distributed measurement systems. Efficient compressorsandsparsetreebasedinvertedendaroundcarryaddersare usedtoreducethedelayandcomplexity ofthemultiplier. Simulations areperformedontheknownimplementation and theproposedimplementation.Thepresentedimplementation isproven toperform betterthantheexistingoneinvarious aspects,(i.e., throughputandcriticalpathdelay). REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] R. Zimmermann, A. Curiger, H. Bonnenberg, H. Kaeslin, N. Felber andW. Fichtner, A 177 Mb/s VLSI implementation of the international dataencryption algorithm, IEEE J. Solid-State Circuits, 1994, 29, (3), pp.303-307 R. Zimmerman, Efficient VLSI implementation of modulo (2 n _ 1)addition and multiplication, IEEE trans. Comput., 2002, 51, pp. 1389-1399. O. Cheung, K. Tsoi, P. Leong and M. Leong, Tradeoffs in parallel andserial implementations of the international data encryption algorithmIDEA, Lecture Notes in Computer Science, vol. 2162, pp. 333-340,2001. M. Leong, O. Cheung, K. Tsoi, and P. Leong, A bit-serial implementation of the international data encryption algorithm IDEA, 2000 IEEESymposium on Field-Programmable Custom Computing Machines, pp.122-131, 2000. C. Efstathiou, H. Vergos, S. Dimitrakopoulos and D. Nikolos, Efficientdiminished-1 modulo 2n+ 1 multipliers, IEEE Trans. Comput., 2005,54, pp. 491-496. H. Vergos and C. Efstathiou, Design of efficient modulo 2n+ 1multipliers, IETComput. Digit. Tech., 2007, 1, (1), pp. 49-57. R. Modugu, N. Park and M. Choi, A Fast Low-Power Modulo2n+ 1 Multiplier Design, 2009 IEEE International Instrumentationand Measurement Technology Conference, pp.951-956, May 2009. R. Zimmermann and W. Fichtner., Low-power logic styles: CMOSversus pass-transistor logic, IEEE J. Solid- State Circuits, vol. 32, pp.1079-1090, July 1997. S. Veeramachaneni, L. Avinash, M. Rajashekhar and M. Srinivas,Efficient Modulo (2k _1) Binary to Residue Converters Systemon-Chip for Real-Time Applications, The 6th International Workshop onDec. 2006 pp.195 - 200. C. Chang, J. Gu and M. Zhang, Ultra low-voltage lowpower CMOS4-2 and 5-2 compressors for fast arithmetic circuits, IEEE J. Circuitsand Systems I, Vol. 51, No. 10, pp. 1985- 1997, 2004 M. Rouholamini, O. Kavehie, A. Mirbaha, S. Jasbi and K. Navi, ANew Design for 7:2 Compressors, Computer Systems and Applications,2007. AICCSA ’07. IEEE/ACS International Conference on 13-16 May2007 Page(s):474 - 478. S. Mathew, M. Anders, R. Krishnamurthy and S. Borkar, A 4-GHz130-nm address generation unit with 32-bit sparse-tree adder core,IEEE Journal of Solid-State Circuits, Volume 38, Issue 5, May 2003Page(s):689 - 695. Zhongde Wang, Graham A. Jullien, William C. Miller., An efficient treearchitecture for modulo 2n +1 multiplication, VLSI Signal Processing14(3): 241-248 (1996). P. Kogge and H. S. Stone., A parallel algorithm for the efficient solutionof a general class of recurrence equations, IEEE Trans. Comput., vol.C-22, pp. 786-793, Aug 1973. A. Curigeret. al., VINCI: VLSI Implementation of the New Secret-keyBlock Cipher IDEA, Proc. of the Custom Integrated CircuitsConference, San Diego, USA, May 1993 Yan Sun, DongyuZheng, Minxuan Zhang, and Shaoqing Li HighPerformance Low-Power Sparse-Tree Binary Adders, 8th InternationalConference on Solid state and Integrated Circuit Technology, ICSICT2006. Yi-Jung Chen, Dyi-Rong Duh, Yunghsian Sam Han: Improved Modulo(2 n+1) Multiplier for IDEA, J. Inf. Sci. Eng. 23(3):911923(2007) www.ijmer.com 3025 | Page