Professional Documents
Culture Documents
Sudeepta - Panda 22 - 24 - 20
Sudeepta - Panda 22 - 24 - 20
Sudeepta - Panda 22 - 24 - 20
Under Supervision of
Mr. Nandakumar R - NIELIT, Calicut
Mr. Abhilash MT - DIAT, Pune
SUDEEPTA PANDA
Reg. No: 22-24-20
Presentation Outline 2
Introduction
Related Works
Problem Statement
Objective
Block Diagram
Algorithm And Methodology
Tools Ans Resources Required
Test Vectors
Simulation Results
Performance Matrices
Project Outcome
Future Scope
References
2 / 24
INTRODUCTION 3
► The need for secure lightweight ciphers is increasing day by day. In the era of
Internet of things, many constrained deployment should be securely connected
to the internet.
► The rise of the Internet-of-things applications has increased the demand for
low resource devices. To ensure security it is essential to protect the data
generated by these devices.
► Achieving high levels of security in limited resources contains hardware is a
challenge. While implementing a cipher on the hardware it is essential to
enhance throughput and minimize the area consumption while ensuring
security.
► In cryptography, symmetric ciphers are usually used to encrypt data between
two parties. Symmetric ciphers can either be block or stream ciphers.
► This project focuses on the implementation and validation of the Fruit-80
stream cipher on a FPGA platform and its characterization.
3 / 24
RELATED WORKS 4
4 / 24
PROBLEM STATEMENT 5
► IOT Devices are resource-constraints which require less processing power and
small area. They are connected to internet to transfer data, so security is also
a concern but conventional security algorithms is not well suited to meet the
resource constraints.
► So there is need to design lightweight IP core, for increased throughput as
well as, for minimal area(GE<2000).
5 / 24
OBJECTIVE 6
6 / 24
BLOCK DIAGRAM 7
g Function
► The variables of g function are kt and 16 bits of the NFSR.
► The feedback function of the NFSR is
n(t+37) = kt ⊕ lt ⊕ nt ⊕ n(t+10) ⊕ n(t+20) ⊕ n(t+12) . n(t+3) n(t+14)
. n(t+25) ⊕ n(t+5) . n(t+23). n(t+31) ⊕ n(t+8) . n(t+18) ⊕ n(t+28) .
n(t+30) . n(t+32) . n(t+34)
8 / 24
ALGORITHM AND METHODOLOGY(2/3) 9
f Function
► The feedback function of the LFSR is
l(t+43) = lt ⊕ l(t+8) ⊕ l(t+18) ⊕ l(t+23) ⊕ l(t+28) ⊕ l(t+37)
h Function
► This function produces a pre-output stream from the LFSR and NFSR states
as follows.
ht = kt* . (n(t+36) ⊕ l(t+19)) ⊕ l(t+6) . l(t+15) . l(t+1) . l(t+22) ⊕ n(t+35)
.l(t+27) ⊕ n(t+1) . n(t+24) ⊕ n(t+1) . n(t+33) . l(t+42)
Output Function
► The output stream is produced by 5 bits of the NFSR, 1 bit of the LFSR, and
the output of h function is
Zt = ht ⊕ nt ⊕ n(t+7) ⊕ n(t+19) ⊕ n(t+29) ⊕ n(t+36) ⊕ l(t+38)
9 / 24
ALGORITHM AND METHODOLOGY(3/3) 10
Initialization Of Cipher
► The IV bits are extended to the 80 bits by concatenating 10 bits to the first of
them. 1 bit one and 9 bit zeros are concatenated to the first of IV.
IV’=1000000000v0v1v2...v67v68v69
10 / 24
TOOLS AND RESOURCES REQUIRED 11
11 / 24
FLOW CHART 12
13 / 24
SIMULATION RESULTS(1/2) 14
Test Vector-1
14 / 24
SIMULATION RESULTS(2/2) 15
Test Vector-2
15 / 24
RTL SCHEMATIC 16
1.Latency
Latency is the time taken for the completion of an instruction. It is the amount of
time taken by the clock signal to travel from its source to destination.
Latency = 188cycles@100MHz (1)
2-Power
The static and dynamic power of an FPGA contributes to its total power
consumption.
1
fmax =
Time period − WNS
1 (2)
=
10ns − 7.333ns
= 374.95MHz
4. Throughput
Fruit-80 is lightweight and with a better initialization speed with a lower gate
equivalency.
20 / 24
FUTURE SCOPE 21
21 / 24
PROJECT SCHEDULE 22
22 / 24
REFERENCES 23
24 / 24