CFP last date
20 January 2025
Reseach Article

VLSI Implementation of Scalable Encryption Algorithm for Different Text and Processor Size

by T. Kalpana, K. Srinivas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 1
Year of Publication: 2012
Authors: T. Kalpana, K. Srinivas
10.5120/6224-8189

T. Kalpana, K. Srinivas . VLSI Implementation of Scalable Encryption Algorithm for Different Text and Processor Size. International Journal of Computer Applications. 44, 1 ( April 2012), 1-6. DOI=10.5120/6224-8189

@article{ 10.5120/6224-8189,
author = { T. Kalpana, K. Srinivas },
title = { VLSI Implementation of Scalable Encryption Algorithm for Different Text and Processor Size },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 1 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number1/6224-8189/ },
doi = { 10.5120/6224-8189 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:36:25.128825+05:30
%A T. Kalpana
%A K. Srinivas
%T VLSI Implementation of Scalable Encryption Algorithm for Different Text and Processor Size
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 1
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Efficiency of present symmetric encryption algorithms mainly depends on implementation cost and resulting performances. Present symmetric encryption, like the Advanced Encryption Standard (AES) rather focus on finding a good tradeoff between cost, security and performances. Some present symmetric encryption algorithms are targeted for software implementations and shows significant efficiency improvements on these platforms compared to other algorithms. From these algorithms, consider a general context where we have very limited processing resources (e. g. a small processor). It yields design criteria such as: low memory requirements, small code size, limited instruction set, i. e. Scalable Encryption Algorithm (SEA). For this purpose, loop architecture of the block cipher is presented. The total modules of SEA written in VHDL coding, the simulation and synthesis results are verified by the Virtex-4 of Xilinx 9. 1i. This paper also carefully describes the implementation details and corresponding area requirements.

References
  1. Rao, K. D. ; Gangadhar, C. VLSI realization of a secure cryptosystem for image encryption and decryption Communications and Signal Processing (ICCSP), 2011 IEEE International Conference 2011 , Page(s): 543 - 547
  2. Dam J. Elbirt, "ReconFig. urable Computing for Symmetric-Key Algorithms".
  3. D. J. Wheeler, R. Needham, TEA, a Tiny Encryption Algorithm, in the proceedings of FSE 1994, Lecture Notes in Computer Science, volume 1008, pp 363-366, Leuven, Belgium, December 1994, Springer-Verlag.
  4. G. Yuval, Reinventing the Travois: Encryption/MAC in 30 ROM Bytes, in the proceedings of FSE 1997, Lecture Notes in Computer Science, volume 1267, pp 205-209, Haifa, Israel,January 1997, Springer-Verlag.
  5. A. Menezes, P. van, "Handbook of Applied Cryptography".
  6. Hongyong Jia; Yue Chen; Xiuqing Mao; Ruiyu Douv Efficient and scalable multicast key management using attribute based encryptionv Information Theory and Information Security (ICITIS), 2010 IEEE International Conference 2010 , Page(s): 426 - 429
  7. B. Schneier, "Applied Cryptography" John Wiley & Sons Inc. , New York, New York, USA, 2nd edition, 1996.
  8. R. Doud. Hardware Crypto Solutions Boost VPN. Electronic Engineering Times, (1056):57{64, April 12 1999.
  9. H. Feistel. Cryptography and Computer Privacy. Scientific American, 228(5):15-23, May 1973.
  10. F. -X. Standaert, G. Piret, N. Gershenfeld, and J. -J. Quisquater,"Sea: A scalable encryption algorithm for small embedded applications," in Proc. CARDIS, 2006, pp. 222–236.
  11. F. -X. Standaert, G. Piret, G. Rouvroy, J. -J. Quisquater, J. -D. Legat, ICEBERG an Involutional Cipher Efficient for Block Encryption in ReconFig. urable Hardware, in the proceedings of FSE 2004, Lecture Notes in Computer Science, vol 3017, pp 279-299, New Delhi, India, February 2004, Springer-Verlag.
  12. E. Biham, New types of cryptanalytic attacks using related keys,Journal of Cryptology, vol 7, num 4, pp 229-246, Fall 1994, Springer Verlag
  13. Jiang Bian; Seker, R. ; Topaloglu, U. ; Bayrak, C. A scalable Role-based Group Key Agreement and Role Identification mechanism Systems Conference (SysCon), 2011 IEEE International 2011 , Page(s): 278 - 281
Index Terms

Computer Science
Information Sciences

Keywords

Block Cipher Sea