VLSI Design of Secure Cryptographic Algorithm

نویسندگان

  • Firoz Ahmed Siddiqui
  • Ranjeet Kumar
چکیده

Light weight cryptography (LWC) is an emerging research area which has to deal with the trade-off among security, cost, and performance. In this paper we present the idea and list some types of LWC algorithms. Hummingbird is a novel ultra lightweight cryptographic algorithm targeted for resource constrained devices like RFID tags, smart cards and wireless sensor nodes. The hybrid model of Hummingbird is explained keeping the constraint devices in mind and thus resulting in an easier software implementation. The paper presents the algorithms for the encryption as well as decryption process and shows some simulation results performed on Xilinx.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Reusable Cryptographic Vlsi Core Based on the Safer K-128 Algorithm with 251.8 Mbit/s Throughput

A VLSI implementation of the symmetric block cipher SAFER K-128 (Secure And Fast Encryption Routine with a Key length of 128 bits) is presented. Possibilities for optimization of the VLSI architecture are explained. The optimizations are based on algorithm specific properties and lead to considerable hardware reduction. The result is a reusable cryptographic VLSI core that allows a data through...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

A High-Throughput Processor for Cryptographic Hash Functions

—This paper presents a high throughput ApplicationSpecific Instruction-set Processor (ASIP) for cryptographic hash functions. The processor is obtained via hardware/software codesign methodology and accelerates SHA (Secure Hash Algorithm) and MD5 hash functions. The proposed design occupies 0.28 mm (66 kgates) in 65 nm CMOS process including 4.5 KB single port memory and 52 kgates logic. The t...

متن کامل

Modeling Power Dynamics for an Embedded DSP Processor Core. An Empirical Model

A new model for dynamic current analysis and simulation is presented for power and energy analysis of a complex VLIW DSP processor core, targeting secure wireless communications. Unlike other research, an instruction level RC based model, whose input parameters can be extracted from the DSP core's assembly level program, is introduced for power simulation. Experimental results utilizing several...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013