Novel Stream Cipher Using SCAN and Variable Ordered Recursive CA Substitutions and Its DSP+FPGA Implementation
نویسندگان
چکیده
This paper presents a new stream cipher for data security, which is based on permutation of the data and replacement of the data values. Permutation is done by scan patterns generated by the SCAN approach. The replacement of data values using variable ordered recursive cellular automata (CA) substitutions. To achieve this aim, an encryption-specific SCAN technique was firstly developed, 2-D hybrid CA was next built, and then 1-ordered and 2-ordered generalized CA transforms were introduced to build variable ordered recursive CA substitutions. The proposed stream cipher satisfies the properties of confusion and diffusion because of characteristics of the SCAN and the CA substitutions are flexible. Moreover, the characteristics of the proposed stream cipher are loss-less, symmetric private key, very large number of security keys (number of possible security keys is more than 9568 10 ~ 14785 10 according to the size of the 2-D von Neumann CA), and key-dependent pixel value replacement. Experimental results obtained using some color images clearly demonstrate the strong performance of the proposed stream cipher. This paper also shows the DSP+FPGA implementation of the proposed stream cipher for the real-time image security.
منابع مشابه
Design and Implementation of Digital Demodulator for Frequency Modulated CW Radar (RESEARCH NOTE)
Radar Signal Processing has been an interesting area of research for realization of programmable digital signal processor using VLSI design techniques. Digital Signal Processing (DSP) algorithms have been an integral design methodology for implementation of high speed application specific real-time systems especially for high resolution radar. CORDIC algorithm, in recent times, is turned out to...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملHardware Implementation of Modified RC4 Stream Cipher Using FPGA
— In this project work, an efficient hardware Implementation of modified RC4 stream-cipher is proposed. In contrary to previous design, which requires four memories each of size 256 X 8, the proposed system can be implemented by using only two memories each of size 128 X 7. Due to the reduction in the memory size the strength of encryption can be increased. Design of RC4 stream cipher for data ...
متن کاملImplementation of a Stream Cipher Based on Bernoulli's Map
A stream cipher was implemented on a FPGA. The keystream, for some authors the most important element, was developed using an algorithm based on Bernoulli’s chaotic map. When dynamic systems are digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a mechanism was needed. The proposed mechanism gives a solution for degradation issue and its implementa...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JNW
دوره 5 شماره
صفحات -
تاریخ انتشار 2010