Improving the Performance of the IDEA Cryptographic Algorithm Using FPGAs

نویسندگان

  • JOSE M. GRANADO
  • MIGUEL A. VEGA
  • JUAN M. SANCHEZ
  • JUAN A. GOMEZ
چکیده

Nowadays, the cryptography field is on the increase in the telecommunications world, because of this there is a constant need of more secure and efficient cryptographic algorithms. Thus, a lot of research is being done in order to try to improve the current algorithm performance. At present, one of the alternatives under research is the implementation of these algorithms in FPGAs (Field-Programmable Gate Arrays), which offer excellent features. In this work, we present a detailed research of the IDEA cryptographic algorithm implementation in Virtex FPGAs. Nine different hardware implementations are presented, which are compared with each other and with the algorithm software implementation. In addition, the conclusions of this detailed research and the possible future work lines are shown. In short, the implementation of the IDEA algorithm using FPGAs offers advantages over software implementation thanks to the use of the intrinsic parallelism (pipelining and replication), resulting in a performance that surpasses in 16 times the software version. Key-Words: Computer Security and Cryptography, IDEA Cryptographic Algorithm, FPGA (FieldProgrammable Gate Array), Performance, Experience using Handel-C

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

A Dynamically and Partially Reconfigurable Implementation of the IDEA Algorithm Using FPGAs and Handel-C

Nowadays, the information security has achieved a great importance, both when information is sent through a non-secure network (as the Internet) and when data are stored in massive storage devices. The cryptographic algorithms are used in order to guarantee the security of data sent or stored. A lot of research is being done in order to improve the performance of the current cryptographic algor...

متن کامل

Cryptobooster: a Reconngurable and Modular Cryptographic Coprocessor

The CryptoBooster is a modular and recon gurable cryptographic coprocessor that takes full advantage of current high-performance recon gurable circuits (FPGAs) and their partial recon gurability. The CryptoBooster works as a coprocessor with a host system in order to accelerate cryptographic operations. A series of cryptographic modules for di erent encryption algorithms are planned. The rst mo...

متن کامل

CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor

The CryptoBooster is a modular and reconfigurable cryptographic coprocessor that takes full advantage of current high-performance reconfigurable circuits (FPGAs) and their partial reconfigurability. The CryptoBooster works as a coprocessor with a host system in order to accelerate cryptographic operations. A series of cryptographic modules for different encryption algorithms are planned. The fi...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004