Professional Documents
Culture Documents
Encryption Implementation Based On Symmetric Algorithm Using A Key Rounds Upto Four Rounds
Encryption Implementation Based On Symmetric Algorithm Using A Key Rounds Upto Four Rounds
Murtada.M.Abdelwahab
Electronic Engineering Department –Faculty of Engineering &Technology
University of Gezira -Sudan
E-mail:mortadamohammad@yahoo.com
Abstract: The proposed implementation in this paper encryption standard DES and AES are based on the tradition
describes a new advance encryption architecture. The techniques[3].
implementation developed for the purpose of obtaining high
performance and achieving efficient utilization area of the II. METHODOLOGY
field programmable gate array (FPGA) resources.The The VLSI design flow consists of six steps as shown in
maximum clock frequency is 134.686 MHz and the number Fig.1. Digital designers must follow these steps in order to
of the uses slices is 394. The design consists of four
save time and obtained a high level of accuracy. These steps
encryption stages based on xor operand.The design used a
single mixcolumn stage in order to reduce the chip area which examine the design flow for any device, whether it is an
improves the throughput results. The design model is typically ASIC, an FPGA, or a CPLD[4].The VHDL and the
developed by a hardware description language and implemented model design on FPGA are completely done on
implemented on xilinix device class spartan3. Xilinx –project navigator,ISE 9.2i.
I. INTRODUCTION
The needs for a new encryption methods is increasing
everyday .Digital designers on all over the world are
competing to invent an optimized encryption algorithm. Any
encryption algorithm can be evaluated in terms of the
computations that it contains or it might be evaluated
according to the amount of logic that it needs and how fast it
can be. Although that most of standard algorithms are usually
specified by 16 rounds of encryption, but many of the
published papers presented a minimized number of rounds of
AES algorithm.The proposed implementation combined the Fig. 1 . Design steps
basic properties that required for all algorithms: securely
The inputs/outputs scheme for the implementation are shown
algorithm and fast speed. The described implementation is a
in Fig.2.
four rounds of advanced encryption algorithm (AES) which
contains single mixcolumns stage. The design categorized as
symmetric algorithm, it is based on XOR operand. This
compact AES algorithm used a key length of 128 bit. The key
is used in the four rounds with a different transposition in
each round. FPGAs consist of logic blocks. A connection
block connects the wire segments around a logic block to its
inputs and outputs [1]. FPGAs are optimized because it offers
short time-to be in markets where digital designers can easily
modify when they need to make changes[2].Basically almost
all popular modern encryption algorithms such as data Fig. 2. Inputs/outputs Scheme
Ci = Ai Ki (2)
K0 K14 K8 K1
RoundyKey-4 = K14 K8 K0 K1
K13 K9 K11 K7
K10 K15 K12 K6
28
Step-6 : Adding the last round key: each stage.The operation is continued to reach to the last step
where the plaintext result is founded.
C = (Round Key-4) C3
Step-7 : The final stage is mixcolomns stage in which a new III. RESULTS
arranging is performed for the output cipher bytes: Simulation is a basic method that digital designers use it to
verify the correctness of the outputs results for any VLSI
C2 C3 C0 C1 implementation. The following discussion explains the
obtained results of simulation which are done in order to
C6 C7 C4 C5 verify the correctness of both algorithms (encryption and
C= decryption).
C10 C11 C8 C9
A. Encryption results
C14 C15 C12 C13
The regarding data of simulation is shown in Fig .6. This
test aimed to verify the assurance and correctness of the
B. Decryption algorithm
encryption algorithm.
Since decryption is defined as a reverse mapping of
Selectkey = 1
encryption [5], this can be given in Eq.3:
D = CĺP (3)
Where D refers to the decryption function and P is the
plaintext. Decryption algorithm has similar steps as encryption
but in reverse path. This algorithm is specified as shown in
Fig.5. This algorithm consists of the following
transformations: Fig. 6. Encryption inputs
- Inverse SubBytes The output results of simulation are shown in Fig.7. The
- Reverse Add round key given results were verified and it founded correct and
- Reverse Mixcolumns compatible with the proposed algorithm.
29
CHECK_cipher_out decryption stage as shown in Fig.9. The results determined
("011111000110111001111100100001100010000100011100 that the implementation provides high level of correctness.
00001011111100101110110000111010110010100101011011
100010110010000010010101001110”) C. Utilization results
Table I figures the hardware utilization where the targeted
B. Decryption results devices is Spartan 3.The results demonstrate that the design
The experimental inputs values are given in Fig.8.This has an efficient results of using the logic resources of the
experiment is done for the purpose of checking the correctness FPGA. TableII provides the performance results when the
of decryption. design implemented on Spartan3 and vertex5.
(Selectkey=0)
TABLE I. Design summary
Target device Spartan3
Speed grade -5 -3
The result can be written in a binary as shown in the following Maximum Frequency 134.686 MHz 411.557MHz
form:
cipher_in: Minimum input arrival 4.528ns 1.114ns
"0111110001101110011111001000011000100001000111000 time before clock
00010111111001011101100001110101100101001010110111 Maximum output 7.471ns 3.130ns
00010110010000010010101001110" required time after clock
Maximum combinational 9.750ns 3.393ns
key1:
path delay
("101001010101001000110000110111101111100101010111
11011111101101011010010101010010001100001101111011 IV. RELATED WORKS
111001010101111101111110110101")
CHECK_data_out: A lot of FPGA implementations are published in the field
("101001011000001000111101101010110101011001110010 of symmetric encryption. Table III reported some examples of
00111001100000000001001101010010101011011111111101 these algorithms for the purpose of comparing the achieved
111000110011101111101001010100"); results of the proposed implementation with similar AES and
DES implementations. The comparisons are concluded in the
For the purpose of verifying the simulation results, the form of area consumption and the performance speed. Wong
operation is done by using the output cipher from encryption et al [8] presents a single round design of DES algorithm that
stage which shown in Fig.7 as an input cipher for the provides throughput of 26.7 Mbps.
30
Table III. Related works Computing and FPGAs,pp 433- 437,Cancun,
Design Device Area Performance Mexico,2008.
[3] W. Mawo” Modern Cryptography Theory and
Rouvroy et Virtex-II 163 208 Mbps Practice”. Packard Company, Prentice Hall PTR,
al [9] 2003.
Wong et Xcv4020E 438 slices 26.7 Mbps
[4] B. Ziedman, “An Introduction to FPGA Design”, In
al[8] proceeding of International Conference on Embedded
Systems,Europe classes 304,1999.
A. Dandalis Xc5vlx110T 5673 slices 353 Mbps
et al. [10] [5] S. Douglas, “Cryptography: Theory and Practice “
,CRC Press,1995.
Chodowiec XC2S30-5 222 slices 150 Mbps
[6] M .Clive ,” FPGA world class designs” , Newnes,
et al. [12]
(2011).
Khose et al XC6SLX16 554 slices 200 Mbps [7] (November ,2014) [Online].
[11] http://en.wikipedia.org/wiki/Transposition_cipher.
Yuan et al XC5VL50 769 slices 73.3 Mbps [8] K .Wong. M .Wark,E.D. A single- chip FPGA
[13] implementation of the Data Encryption Standard
Hoang et Altera APEX2 40960 slices 1188 Mbps (DES) algorithm. IEEE 1998, globecom
al[14] 0K-C communication,pp827-832,Sydney ,Austtralia,1998.
This design Spartan 3 394 slice 673.72Mbps [9] G. Rouvroy , F . X. Standaert, J. J.
Quisquater , J. D. Legat, “ Compact and efficient
encryption/decryption module for FPGA
Among the exists implementations Rouvroy et al [9] and implementation of the AES Rijndael very well suited
for small embedded applications”, Proceeding of
Chodowiec et al. [12] have the smallest architecture of AES
the international conference on Information
algorithm. The results show that the proposed implementation Technology: Coding and Computing 2004 (ITCC
offers good utilization results of the FPGA internal resources 2004), pp. 583 – 587,Vol. 2, USA, April 2004.
and high performance result in compared with the reported [10] A. Dandalis, V.K.Prasanna., J.D Rolim.” A
implementations. The implementation in [9] is a compact AES Comparative Study of Performance of AES Final
design achieved throughput of 208 Mbps. Chodowiec et al Candidates Using FPGAs”, Cryptographic Hardware
[12] presents a compact AES design, which achieved a data and Embedded Systems Workshop (CHES 2000),
Worcester, Massachusetts, 2000.
rate of 150Mbps and it has a ratio of performance/area of
[11] P. Khose.V. Raut. “Hardware implementation
0.748 Mbps/slice.Performance effects by the number of logics of AES encryption and decryption for low area &
and routing delay.The ratio of performance/area represents a power consumption” International Journal of
mirror of the hardware utilization. The proposed design has Research in Engineering and Technology ,(IJERT) ,
throughput result of 673.72Mbps and the ratio of Vol.03, No.05, pp 480- 484,2014.
throughput/area is 1.71 Mbps /slice. [12] P.Chodowiec, K. Gaj, “Very Compact FPGA
Implementation of the AES Algorithm”,
V. CONCLUSION Cryptographic Hardware and Embedded Systems
(CHES 2003), LNCS Vol. 2779, pp.319 – 333,
The proposed implementation is developed in order to provide Springer-Verlag, October 2003
high level of security with a less consumption of the device [13] Z. Yuan, Y. Wang, J. Li, R. Li and W. Zhao, “FPGA
resources. The results conclude that the four rounds of AES based optimization for masked AES
encryption with single mixcolumn stage reduce the hardware implementation”, Proceding of the IEEE 54th
utilization of the FPGA and improved the performance speed. International Midwest Symposium on Circuits and
The given simulation output results were completely correct Systems (MWSCAS), pp.1-4 ,Seoul,2011.
and prove that the implementation is reliable. The results [14] T.Hoang, V.L.Nguyen, “An efficient FPGA
conclude that the design has the best result of performance/ implementation of the Advanced Encryption
slice. Standard algorithm”, Proceeding of the IEEE
REFERENCES International Conference on Computing and
Communication Technologies RIVF , pp. 1-4 .Ho
[1] C .Deming, Jason, and C.Peichan, “ FPGA Design Chi Minh, 2012.
Automation”, now Publishers. Inc,2006.
[2] D..Meintanis and I..Papaaestathiou,” Power
consumption estimations vs measurements for
FPGA-based security cores”, in IEEE 2008,
International Conference on Reconfigurable
31