Intelligent Communication, Control and Devices pp 945-955 | Cite as
Symmetric Cryptography and Hardware Chip Implementation on FPGA
Conference paper
First Online:
Abstract
Cryptography is the process of creating the data secretly to provide secure communication in the existence of third parties called adversaries. Cryptography changes data into a format that is not readable for an illegal user. The paper provides the hardware chip-based solution for cryptographic encryption and decryption using the XOR cipher technique. The chip design is done in Xilinx ISE 14.2 with the help of VHDL language and simulation is carried for 8-bit to 256-bit encryption/decryption in Modelsim 10.0 software. The FPGA parameters such as hardware and timing are also synthesized for SPARTAN 3E, 3s500efg320-5 device.
Keywords
Cryptographic encryption and decryption FPGA synthesis XOR cipher technique VHDL languageReferences
- 1.Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (2000)CrossRefGoogle Scholar
- 2.Boldyreva, A. et al.: Order-preserving symmetric encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (2009)CrossRefGoogle Scholar
- 3.Churchhouse, R., Churchhouse, R.F.: Codes and ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press (2002)Google Scholar
- 4.Chelton, William N., Benaissa, Mohammed: Fast elliptic curve cryptography on FPGA. IEEE Trans. Very Large Scale Integr. VLSI Syst. 16(2), 198–205 (2008)CrossRefGoogle Scholar
- 5.Kumar, Adesh, Kuchhal, Piyush, Singhal, Sonal: Secured Network on Chip (NoC) architecture and routing with modified TACIT cryptographic technique. Proc. Comput. Sci. 48, 158–165 (2015)CrossRefGoogle Scholar
- 6.Lindell, Y., Jonathan, K.: Introduction to Modern Cryptography. Chapman and Hall/CRC (2014)Google Scholar
- 7.Nag, A., et al.: Image encryption using affine transform and XOR operation. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE (2011)Google Scholar
- 8.Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)Google Scholar
- 9.Yalla, P., Jens-Peter K.: Lightweight cryptography for FPGAs. In: International Conference on Reconfigurable Computing and FPGAs, 2009. ReConFig’09. IEEE (2009)Google Scholar
- 10.Zodpe, H., Ashok, S.: An Efficient AES Implementation Using FPGA with Enhanced Security (2018)Google Scholar
Copyright information
© Springer Nature Singapore Pte Ltd. 2020