Symmetric Cryptography and Hardware Chip Implementation on FPGA

  • Priyanshi Vishnoi
  • S. L. Shimi
  • Adesh KumarEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 989)


Cryptography is the process of creating the data secretly to provide secure communication in the existence of third parties called adversaries. Cryptography changes data into a format that is not readable for an illegal user. The paper provides the hardware chip-based solution for cryptographic encryption and decryption using the XOR cipher technique. The chip design is done in Xilinx ISE 14.2 with the help of VHDL language and simulation is carried for 8-bit to 256-bit encryption/decryption in Modelsim 10.0 software. The FPGA parameters such as hardware and timing are also synthesized for SPARTAN 3E, 3s500efg320-5 device.


Cryptographic encryption and decryption FPGA synthesis XOR cipher technique VHDL language 


  1. 1.
    Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Boldyreva, A. et al.: Order-preserving symmetric encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Churchhouse, R., Churchhouse, R.F.: Codes and ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press (2002)Google Scholar
  4. 4.
    Chelton, William N., Benaissa, Mohammed: Fast elliptic curve cryptography on FPGA. IEEE Trans. Very Large Scale Integr. VLSI Syst. 16(2), 198–205 (2008)CrossRefGoogle Scholar
  5. 5.
    Kumar, Adesh, Kuchhal, Piyush, Singhal, Sonal: Secured Network on Chip (NoC) architecture and routing with modified TACIT cryptographic technique. Proc. Comput. Sci. 48, 158–165 (2015)CrossRefGoogle Scholar
  6. 6.
    Lindell, Y., Jonathan, K.: Introduction to Modern Cryptography. Chapman and Hall/CRC (2014)Google Scholar
  7. 7.
    Nag, A., et al.: Image encryption using affine transform and XOR operation. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE (2011)Google Scholar
  8. 8.
    Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)Google Scholar
  9. 9.
    Yalla, P., Jens-Peter K.: Lightweight cryptography for FPGAs. In: International Conference on Reconfigurable Computing and FPGAs, 2009. ReConFig’09. IEEE (2009)Google Scholar
  10. 10.
    Zodpe, H., Ashok, S.: An Efficient AES Implementation Using FPGA with Enhanced Security (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Electrical EngineeringNational Institute of Technical Teachers Training and Research (NITTTR)ChandigarhIndia
  2. 2.Department of Electrical and Electronics Engineering, School of EngineeringUniversity of Petroleum and Energy StudiesDehradunIndia

Personalised recommendations