SlideShare a Scribd company logo
29th International Conference on VLSI Design
&
15th International Conference on Embedded
Systems
About Us
• Design Contest Challenge D3
– Efficient Accelerator for Authenticated Encryption
• Title of the Project: HarSam
• Authors:
» Samnit Dua
• Final Year Student, B.Tech- E.C.E
• G B Pant Government Engineering College, GGSIPU,
Delhi
» Hardik Manocha
• Final Year Student, B.Tech-E.C.E
• G B Pant Government Engineering College, GGSIPU,
Delhi
Authenticated Encryption- AE
• What it is:
– A simple process to authenticate the confidential data of a
process, object, human or about anything; to increase the
security associated with the data.
– It describes that the person transmitting the data is the Actual
person who has to send the data.
– On the receiving end, data comes from where it is intended to
come from.
– MUCH SECURE scheme than the scheme of Encrypting (AES)
and then Authenticating the message(MAC).
– Easier for developers to incorporate Authentication in their
designs.
AE continued..
•Authentication is much needed to secure the encrypted data.
• Systems involving Encryption without Authentication: XML Encryption, WEP
etc.
• Above mentioned Systems were susceptible to attacks and therefore less
reliable.
• Then came the need for Authenticity to be associated with Encryption so that
attackers had to work upon a stronger string of data.
• Two ways to apply authenticity:
• Encrypt the data and then apply MAC (Message Authentication Code). Two different
processes and therefore complex.
• Encrypt and Authenticate using a single procedure.
• Second method to obtain Authenticated Encryption is much better and widely used by
developers.
TIAOXIN-346
• Name of a design which provides the feature of Authenticated
Encryption.
• Designed by Ivica Nikolic of Nanyang Technological University,
Singapore.
• TIAOXIN-346 is one of the Entries of CAESAR, a worldwide
competition related to Encryption.
• HarSam, our project is the Hardware Implementation of TIAOXIN-
346.
Screenshot representing CAESAR Entries
TIAOXIN-346 Encryption
Inputs:
• Key, K of 128 bits
• Public Message Number- Nonce, IV of 128 bits
• Plaintext, M of 256 bits
• Associated Data, AD of 256 bits
Outputs:
• Ciphertext , C of 256 bits
• Tag of 128 bits
Tiaoxin - 346 (K; IV; M;D) = (C; Tag)
Notations and Operations Used
• Word- sequence of 16 bytes.
• Z0- is a constant word with value “428a2f98d728ae227137449123ef65cd”.
• Z1- is a constant word with value “b5c0fbcfec4d3b2fe9b5dba58189dbbc”.
• Ts- state composed of s word. For instance, T3 has 3 words, T4 has 4 words and
T6 has 6 words.
• X Y { bitwise addition (XOR) of the words X and Y}.
• X & Y { bitwise conjunction (AND) of the words X and Y}.
• AES(X; SK) – X is the word and SK is the sub key. AES is one round single of AES.
AES(X; SK) = MixColumns(ShiftRows(SubBytes(X))) + SK
• R(Ts;M) - a round transformation of a state with s words.
R: Ts X M -> Ts new
Further R(Ts;M) uses AES(X;SK) either in keyless mode or keyed mode.
UPDATE Function
Update : T3 X T4 X T6 X M0 X M1 X M2 -> T3 X T4 X T6.
T3 new = R(T3,M0); T3=T3 new
T4 new = R(T4,M1); T4=T4 new
T6 new = R(T6,M2); T6=T6 new
Keyed Mode of AES round uses Z0 as Sub Key
AES Operations
• STATE Matrix:
Input Data block viewed as 4-by-4 table of bytes.
• Filling Up of STATE Matrix:
1 byte
AES Operations continued..
SubBytes: Byte Substitution Operation
• A simple substitution of each byte
• Uses one S-box of 16x16 bytes containing a permutation of all 256 8-bit
values
• Each byte of state is replaced by byte indexed by row (left 4-bits) &
column (right 4-bits)
– E.g. byte {75} is replaced by byte in row 7 column 5
– which has value {5B}
SubBytes Table
Implement by Table Lookup
Sample SubByte Transformation
• Shifting, which permutes the bytes.
• A circular byte shift in each
– 1st row is unchanged
– 2nd row does 1 byte circular shift to left
– 3rd row does 2 bytes circular shift to left
– 4th row does 3 bytes circular shift to left
ShiftRow Operation
Sample ShiftRow Operation
MixColumn Operation
• Each column is processed separately.
• Each byte is replaced by a value dependent on all
4 bytes in the column
Sample MIxColumn Operation
TIAOXIN-346 Encryption Processing
• TIAOXIN-346 Encryption Algorithm works in 4 stages and are as following
• Initialization
• Processing Associated Data
• Encryption
• Tag Production
• Above mentioned processes are executed in the same order as they are written.
Initialization --> Processing Associated Data --> Encryption --> Tag Production
INITIALIZATION
• In this stage, three states T3, T4 and T6 are loaded with the Inputs
K and IV.
• After fill up process, States T3, T4 and T6 are updated 15 times
using UPDATE function.
PROCESSING ASSOCIATED DATA
•The associated data AD is divided into blocks of 32 bytes each. If the last block of
AD is incomplete (the length of the block is less than 32 bytes), padding with
zeroes is done.
AD = AD1; . . . ;ADd
|ADi| = 256 and ADlength = |AD|
The length of the AD is encoded as 16-byte big endian word and stored
in ADlength.
For our design, we have d=1 because AD is of 256 bits in size.
ENCRYPTION
•The message M is divided into blocks of 32 bytes each. If the last block of M is
incomplete (the length of the block is less than 32 bytes), padding with zeroes is
done.
M = M1; . . . ; Md
|Mi| = 256 and Mlength = |M|
The length of the M is encoded as 16-byte big endian word and stored
in Mlength.
In our design, we have m=1 because of 256 bit length of M.
C would be equal to M in terms of length.
ENCRYPTION continued..
• In case padding with zeroes is done in last block of M, then last
block of C generated in the Encryption stage would undergo
Truncation.
• Suppose last block of M contains ‘b’ bytes then, last block of C
would be truncated after ‘b’ bytes. Therefore “32-b” bytes would
be removed from the last block of C.
• Complete Ciphertext is explained by the following equation:
C = C1|| C2 || . . . || Cm
|| is the Concatenation Operator here
Tag Production
This is the Final stage of the complete Encryption Algorithm.
In this step, words holding the length of AD and M are processed.
Firstly, UPDATE function uses ADlength and Mlength
Further, 20 rounds of UPDATE function are used with Z0 and Z1 and Tag is
generated by the XOR operation of all words of T3, T4 and T6
TIAOXIN-346 Decryption
• Inputs:
• Key, K of 128 bits
• Public Message Number- Nonce, IV of 128 bits
• Ciphertext, C of 256 bits
• Associated Data, AD of 256 bits
• Tag of 128 bits
• Outputs:
• Plaintext, M of 256 bits
• Fail, single bit in size
Tiaoxin - 346 (K; IV; C;AD,Tag) = (M; Fail)
TIAOXIN-346 Decryption Processing
•TIAOXIN-346 Encryption Algorithm works in 4 stages and are as following
• Initialization
• Processing Associated Data
• Decryption
• Tag Production
• Above mentioned processes are executed in the same order as they are
written.
Initialization --> Processing Associated Data --> Decryption --> Tag Production
• Initialization, Processing Associated Data and Finalization stages are exactly
similar to Encryption steps.
• Only the Decryption stage is altered.
DECRYPTION
Assuming C has m blocks of 32 bytes
C = C1|| C2 || . . . || Cm
In our design, m=1 and therefore above statements are executed only once.
Padding with zeroes is done similarly as done in Encryption.
If the Tag produced in Decryption is similar to the Input Tag, then only M is generated
at the Output and Fail is made to Logic low. Else Fail is made to Logic High and M
generated in Decryption Stage is not available at the Output port.
SIMULATION- ENCRYPTION
• Inputs
•Key, K = 91cc70a38f1cf31c3a3a39c748e8ee3a
• Nonce, IV = b7ddefbdfad7df7b7dbee3e5f5f5fbe6
• Message,
M=b7ddf2398e1471e39e6387474738e91d1dc74fbdfad7df7b7dbee3e5f5f5fb6
• Associate Data, AD=
91cc70a38f1cf31c3a3a39c748edbeef7defd6befbdbedf71f2fafafdf30ee3a
• Outputs
C= d4a1b9fb02fa511cdf7f8cfbb90e22438702502bada2b70436ca6fc14c5d6224
Tag= bf979c14211c4930064abc4f50c2d0d0
SIMULATION- DECRYPTION
• Inputs
•Key, K = 91cc70a38f1cf31c3a3a39c748e8ee3a
• Nonce, IV = b7ddefbdfad7df7b7dbee3e5f5f5fbe6
• Ciphertext, C=
d4a1b9fb02fa511cdf7f8cfbb90e22438702502bada2b70436ca6fc14c5d6224
• Associate Data, AD=
91cc70a38f1cf31c3a3a39c748edbeef7defd6befbdbedf71f2fafafdf30ee3a
• Tag= Tag= bf979c14211c4930064abc4f50c2d0d0
• Outputs
• M= b7ddf2398e1471e39e6387474738e91d1dc74fbdfad7df7b7dbee3e5f5f5fb6
• Fail= 0
SYNTHESIZE- ENCRYPTION
SYNTHESIZE- DECRYPTION
COMPARISON
TIAOXIN-346 v/s HarSam
Modified Version of HarSam
As the comparison summarizes, our design is much
slower than the TIAOXIN-346.
But we have achieved Hardware Implementation.
In order to match the Timing characteristics of
TIAOXIN-346, we have modified our design and built a
newer design.
We have successfully Simulated the design but we
were not able to Synthesize the design due to lack of
our System resources.
SIMULATION- ENCRYPTION
MODIFIED DESIGN
SIMULATION- DECRYPTION MODIFIED DESIGN
FUTURE WORKS
• Try to achieve Hardware Implementation of Our
Modified design.
• Further work on to decrease Timing features so as
to take our design to be involved in some
applications.
Thank You

More Related Content

What's hot

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
IOSR Journals
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codes
IAEME Publication
 
Cryptography
CryptographyCryptography
Cryptography
Hardik Sondagar
 
B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...
B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...
B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...
Rai University
 
Digital logic design part1
Digital logic design part1Digital logic design part1
Digital logic design part1
Vaagdevi College of Engineering
 
Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...
Rai University
 
Unit 2 CNS -- RC% algorithm
Unit 2 CNS -- RC% algorithmUnit 2 CNS -- RC% algorithm
15CS32 ADE Module 3
15CS32 ADE Module 315CS32 ADE Module 3
15CS32 ADE Module 3
RLJIT
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
Sanjeev Patel
 
Bch codes
Bch codesBch codes
Bch codes
Gaurav Thakur
 
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
IJMTST Journal
 
Implementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay CodeImplementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay Code
IRJET Journal
 
Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text message
eSAT Journals
 
Decimal adder
Decimal adderDecimal adder
Decimal adder
Syed Saeed
 
Maximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithmMaximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithm
bajrang bansal
 
Modified Golomb Code For Integer Representation
Modified Golomb Code For Integer RepresentationModified Golomb Code For Integer Representation
Modified Golomb Code For Integer Representation
IJSRD
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
AakankshaR
 

What's hot (19)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codes
 
Cryptography
CryptographyCryptography
Cryptography
 
B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...
B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...
B.sc cs-ii-u-1.9 digital logic circuits, digital component floting and fixed ...
 
Digital logic design part1
Digital logic design part1Digital logic design part1
Digital logic design part1
 
Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.9 digital logic circuits, digital component floting and fixed...
 
Unit 2 CNS -- RC% algorithm
Unit 2 CNS -- RC% algorithmUnit 2 CNS -- RC% algorithm
Unit 2 CNS -- RC% algorithm
 
15CS32 ADE Module 3
15CS32 ADE Module 315CS32 ADE Module 3
15CS32 ADE Module 3
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Bch codes
Bch codesBch codes
Bch codes
 
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
 
Implementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay CodeImplementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay Code
 
Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text message
 
Decimal adder
Decimal adderDecimal adder
Decimal adder
 
Maximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithmMaximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithm
 
Modified Golomb Code For Integer Representation
Modified Golomb Code For Integer RepresentationModified Golomb Code For Integer Representation
Modified Golomb Code For Integer Representation
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 

Viewers also liked

RABI SHANKAR PAL_New
RABI SHANKAR PAL_NewRABI SHANKAR PAL_New
RABI SHANKAR PAL_New
rabi pal
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
ICIECA 2014 Paper 20
ICIECA 2014 Paper 20ICIECA 2014 Paper 20
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
Muhammad Saif Ul Islam
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 

Viewers also liked (10)

RABI SHANKAR PAL_New
RABI SHANKAR PAL_NewRABI SHANKAR PAL_New
RABI SHANKAR PAL_New
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
ICIECA 2014 Paper 20
ICIECA 2014 Paper 20ICIECA 2014 Paper 20
ICIECA 2014 Paper 20
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 

Similar to VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption

Authenticated Encryption Decryption Scheme
Authenticated Encryption Decryption SchemeAuthenticated Encryption Decryption Scheme
Authenticated Encryption Decryption Scheme
Hardik Manocha
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Ferdin Joe John Joseph PhD
 
introduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.pptintroduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.ppt
madlord2
 
Linear Block code.pdf
Linear Block code.pdfLinear Block code.pdf
Linear Block code.pdf
SuryaRamVM
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction system
Rekha dudiya
 
AES Presentation.pptx
AES Presentation.pptxAES Presentation.pptx
AES Presentation.pptx
hammadhassan9507
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Madhumita Tamhane
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
HodaAhmedBekhitAhmed
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
Dr. Sanjay M. Gulhane
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
ShimoFcis
 
Transform coding
Transform codingTransform coding
Transform coding
Nancy K
 
Lcdf4 chap 03_p2
Lcdf4 chap 03_p2Lcdf4 chap 03_p2
Lcdf4 chap 03_p2
ozgur_can
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipher
Udit Mishra
 
Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014
Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014
Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014
Julien Le Dem
 
Efficient Data Storage for Analytics with Apache Parquet 2.0
Efficient Data Storage for Analytics with Apache Parquet 2.0Efficient Data Storage for Analytics with Apache Parquet 2.0
Efficient Data Storage for Analytics with Apache Parquet 2.0
Cloudera, Inc.
 
IDEA.ppt
IDEA.pptIDEA.ppt
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
SagarDR5
 
C++ Notes PPT.ppt
C++ Notes PPT.pptC++ Notes PPT.ppt
C++ Notes PPT.ppt
Alpha474815
 

Similar to VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption (20)

Authenticated Encryption Decryption Scheme
Authenticated Encryption Decryption SchemeAuthenticated Encryption Decryption Scheme
Authenticated Encryption Decryption Scheme
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
introduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.pptintroduction to MD5 Massage Digest Algorithm.ppt
introduction to MD5 Massage Digest Algorithm.ppt
 
Linear Block code.pdf
Linear Block code.pdfLinear Block code.pdf
Linear Block code.pdf
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction system
 
AES Presentation.pptx
AES Presentation.pptxAES Presentation.pptx
AES Presentation.pptx
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
 
Transform coding
Transform codingTransform coding
Transform coding
 
Lcdf4 chap 03_p2
Lcdf4 chap 03_p2Lcdf4 chap 03_p2
Lcdf4 chap 03_p2
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipher
 
Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014
Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014
Efficient Data Storage for Analytics with Parquet 2.0 - Hadoop Summit 2014
 
Efficient Data Storage for Analytics with Apache Parquet 2.0
Efficient Data Storage for Analytics with Apache Parquet 2.0Efficient Data Storage for Analytics with Apache Parquet 2.0
Efficient Data Storage for Analytics with Apache Parquet 2.0
 
IDEA.ppt
IDEA.pptIDEA.ppt
IDEA.ppt
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
C++ Notes PPT.ppt
C++ Notes PPT.pptC++ Notes PPT.ppt
C++ Notes PPT.ppt
 

More from Hardik Manocha

Solar Energy assisted E-Rickshaw
Solar Energy assisted E-RickshawSolar Energy assisted E-Rickshaw
Solar Energy assisted E-Rickshaw
Hardik Manocha
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
Hardik Manocha
 
Hybrid Communication Protocol- UART & SPI
Hybrid Communication Protocol- UART & SPIHybrid Communication Protocol- UART & SPI
Hybrid Communication Protocol- UART & SPI
Hardik Manocha
 
8 bit Microprocessor with Single Vectored Interrupt
8 bit Microprocessor with Single Vectored Interrupt8 bit Microprocessor with Single Vectored Interrupt
8 bit Microprocessor with Single Vectored Interrupt
Hardik Manocha
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Hardik Manocha
 

More from Hardik Manocha (7)

Solar Energy assisted E-Rickshaw
Solar Energy assisted E-RickshawSolar Energy assisted E-Rickshaw
Solar Energy assisted E-Rickshaw
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
Hybrid Communication Protocol- UART & SPI
Hybrid Communication Protocol- UART & SPIHybrid Communication Protocol- UART & SPI
Hybrid Communication Protocol- UART & SPI
 
8 bit Microprocessor with Single Vectored Interrupt
8 bit Microprocessor with Single Vectored Interrupt8 bit Microprocessor with Single Vectored Interrupt
8 bit Microprocessor with Single Vectored Interrupt
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 

Recently uploaded

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 

Recently uploaded (20)

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 

VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption

  • 1. 29th International Conference on VLSI Design & 15th International Conference on Embedded Systems
  • 2. About Us • Design Contest Challenge D3 – Efficient Accelerator for Authenticated Encryption • Title of the Project: HarSam • Authors: » Samnit Dua • Final Year Student, B.Tech- E.C.E • G B Pant Government Engineering College, GGSIPU, Delhi » Hardik Manocha • Final Year Student, B.Tech-E.C.E • G B Pant Government Engineering College, GGSIPU, Delhi
  • 3. Authenticated Encryption- AE • What it is: – A simple process to authenticate the confidential data of a process, object, human or about anything; to increase the security associated with the data. – It describes that the person transmitting the data is the Actual person who has to send the data. – On the receiving end, data comes from where it is intended to come from. – MUCH SECURE scheme than the scheme of Encrypting (AES) and then Authenticating the message(MAC). – Easier for developers to incorporate Authentication in their designs.
  • 4. AE continued.. •Authentication is much needed to secure the encrypted data. • Systems involving Encryption without Authentication: XML Encryption, WEP etc. • Above mentioned Systems were susceptible to attacks and therefore less reliable. • Then came the need for Authenticity to be associated with Encryption so that attackers had to work upon a stronger string of data. • Two ways to apply authenticity: • Encrypt the data and then apply MAC (Message Authentication Code). Two different processes and therefore complex. • Encrypt and Authenticate using a single procedure. • Second method to obtain Authenticated Encryption is much better and widely used by developers.
  • 5. TIAOXIN-346 • Name of a design which provides the feature of Authenticated Encryption. • Designed by Ivica Nikolic of Nanyang Technological University, Singapore. • TIAOXIN-346 is one of the Entries of CAESAR, a worldwide competition related to Encryption. • HarSam, our project is the Hardware Implementation of TIAOXIN- 346.
  • 7. TIAOXIN-346 Encryption Inputs: • Key, K of 128 bits • Public Message Number- Nonce, IV of 128 bits • Plaintext, M of 256 bits • Associated Data, AD of 256 bits Outputs: • Ciphertext , C of 256 bits • Tag of 128 bits Tiaoxin - 346 (K; IV; M;D) = (C; Tag)
  • 8. Notations and Operations Used • Word- sequence of 16 bytes. • Z0- is a constant word with value “428a2f98d728ae227137449123ef65cd”. • Z1- is a constant word with value “b5c0fbcfec4d3b2fe9b5dba58189dbbc”. • Ts- state composed of s word. For instance, T3 has 3 words, T4 has 4 words and T6 has 6 words. • X Y { bitwise addition (XOR) of the words X and Y}. • X & Y { bitwise conjunction (AND) of the words X and Y}. • AES(X; SK) – X is the word and SK is the sub key. AES is one round single of AES. AES(X; SK) = MixColumns(ShiftRows(SubBytes(X))) + SK • R(Ts;M) - a round transformation of a state with s words. R: Ts X M -> Ts new Further R(Ts;M) uses AES(X;SK) either in keyless mode or keyed mode.
  • 9. UPDATE Function Update : T3 X T4 X T6 X M0 X M1 X M2 -> T3 X T4 X T6. T3 new = R(T3,M0); T3=T3 new T4 new = R(T4,M1); T4=T4 new T6 new = R(T6,M2); T6=T6 new Keyed Mode of AES round uses Z0 as Sub Key
  • 10. AES Operations • STATE Matrix: Input Data block viewed as 4-by-4 table of bytes. • Filling Up of STATE Matrix: 1 byte
  • 12. SubBytes: Byte Substitution Operation • A simple substitution of each byte • Uses one S-box of 16x16 bytes containing a permutation of all 256 8-bit values • Each byte of state is replaced by byte indexed by row (left 4-bits) & column (right 4-bits) – E.g. byte {75} is replaced by byte in row 7 column 5 – which has value {5B}
  • 15. • Shifting, which permutes the bytes. • A circular byte shift in each – 1st row is unchanged – 2nd row does 1 byte circular shift to left – 3rd row does 2 bytes circular shift to left – 4th row does 3 bytes circular shift to left ShiftRow Operation
  • 17. MixColumn Operation • Each column is processed separately. • Each byte is replaced by a value dependent on all 4 bytes in the column
  • 19. TIAOXIN-346 Encryption Processing • TIAOXIN-346 Encryption Algorithm works in 4 stages and are as following • Initialization • Processing Associated Data • Encryption • Tag Production • Above mentioned processes are executed in the same order as they are written. Initialization --> Processing Associated Data --> Encryption --> Tag Production
  • 20. INITIALIZATION • In this stage, three states T3, T4 and T6 are loaded with the Inputs K and IV. • After fill up process, States T3, T4 and T6 are updated 15 times using UPDATE function.
  • 21. PROCESSING ASSOCIATED DATA •The associated data AD is divided into blocks of 32 bytes each. If the last block of AD is incomplete (the length of the block is less than 32 bytes), padding with zeroes is done. AD = AD1; . . . ;ADd |ADi| = 256 and ADlength = |AD| The length of the AD is encoded as 16-byte big endian word and stored in ADlength. For our design, we have d=1 because AD is of 256 bits in size.
  • 22. ENCRYPTION •The message M is divided into blocks of 32 bytes each. If the last block of M is incomplete (the length of the block is less than 32 bytes), padding with zeroes is done. M = M1; . . . ; Md |Mi| = 256 and Mlength = |M| The length of the M is encoded as 16-byte big endian word and stored in Mlength. In our design, we have m=1 because of 256 bit length of M. C would be equal to M in terms of length.
  • 23. ENCRYPTION continued.. • In case padding with zeroes is done in last block of M, then last block of C generated in the Encryption stage would undergo Truncation. • Suppose last block of M contains ‘b’ bytes then, last block of C would be truncated after ‘b’ bytes. Therefore “32-b” bytes would be removed from the last block of C. • Complete Ciphertext is explained by the following equation: C = C1|| C2 || . . . || Cm || is the Concatenation Operator here
  • 24. Tag Production This is the Final stage of the complete Encryption Algorithm. In this step, words holding the length of AD and M are processed. Firstly, UPDATE function uses ADlength and Mlength Further, 20 rounds of UPDATE function are used with Z0 and Z1 and Tag is generated by the XOR operation of all words of T3, T4 and T6
  • 25. TIAOXIN-346 Decryption • Inputs: • Key, K of 128 bits • Public Message Number- Nonce, IV of 128 bits • Ciphertext, C of 256 bits • Associated Data, AD of 256 bits • Tag of 128 bits • Outputs: • Plaintext, M of 256 bits • Fail, single bit in size Tiaoxin - 346 (K; IV; C;AD,Tag) = (M; Fail)
  • 26. TIAOXIN-346 Decryption Processing •TIAOXIN-346 Encryption Algorithm works in 4 stages and are as following • Initialization • Processing Associated Data • Decryption • Tag Production • Above mentioned processes are executed in the same order as they are written. Initialization --> Processing Associated Data --> Decryption --> Tag Production • Initialization, Processing Associated Data and Finalization stages are exactly similar to Encryption steps. • Only the Decryption stage is altered.
  • 27. DECRYPTION Assuming C has m blocks of 32 bytes C = C1|| C2 || . . . || Cm In our design, m=1 and therefore above statements are executed only once. Padding with zeroes is done similarly as done in Encryption. If the Tag produced in Decryption is similar to the Input Tag, then only M is generated at the Output and Fail is made to Logic low. Else Fail is made to Logic High and M generated in Decryption Stage is not available at the Output port.
  • 28. SIMULATION- ENCRYPTION • Inputs •Key, K = 91cc70a38f1cf31c3a3a39c748e8ee3a • Nonce, IV = b7ddefbdfad7df7b7dbee3e5f5f5fbe6 • Message, M=b7ddf2398e1471e39e6387474738e91d1dc74fbdfad7df7b7dbee3e5f5f5fb6 • Associate Data, AD= 91cc70a38f1cf31c3a3a39c748edbeef7defd6befbdbedf71f2fafafdf30ee3a • Outputs C= d4a1b9fb02fa511cdf7f8cfbb90e22438702502bada2b70436ca6fc14c5d6224 Tag= bf979c14211c4930064abc4f50c2d0d0
  • 29.
  • 30. SIMULATION- DECRYPTION • Inputs •Key, K = 91cc70a38f1cf31c3a3a39c748e8ee3a • Nonce, IV = b7ddefbdfad7df7b7dbee3e5f5f5fbe6 • Ciphertext, C= d4a1b9fb02fa511cdf7f8cfbb90e22438702502bada2b70436ca6fc14c5d6224 • Associate Data, AD= 91cc70a38f1cf31c3a3a39c748edbeef7defd6befbdbedf71f2fafafdf30ee3a • Tag= Tag= bf979c14211c4930064abc4f50c2d0d0 • Outputs • M= b7ddf2398e1471e39e6387474738e91d1dc74fbdfad7df7b7dbee3e5f5f5fb6 • Fail= 0
  • 31.
  • 35. Modified Version of HarSam As the comparison summarizes, our design is much slower than the TIAOXIN-346. But we have achieved Hardware Implementation. In order to match the Timing characteristics of TIAOXIN-346, we have modified our design and built a newer design. We have successfully Simulated the design but we were not able to Synthesize the design due to lack of our System resources.
  • 38. FUTURE WORKS • Try to achieve Hardware Implementation of Our Modified design. • Further work on to decrease Timing features so as to take our design to be involved in some applications.