ASIC Implementation of Rabbit Stream Cipher Encryption for Data

被引:1
|
作者
Prathima, N. [1 ]
Chetan, S. [1 ]
Rehman, Syed M. [2 ]
机构
[1] Dr Ambedkar Inst Technol, ECE Dept, Bengaluru, India
[2] Sun Softron, Bengaluru, India
关键词
Audio; CADENCE; Image; Intellectual property; rabbit stream cipher; key length; verilog HDL; CRYPTOGRAPHY; CRYPTOSYSTEM;
D O I
10.1109/wiecon-ece48653.2019.9019903
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over a network to secure information and to remain confidential cryptography plays a very important role in today's life. Cryptography is an method of converting information to a non-understandable form and then being able to convert it to the understandable form by the recipient. High level of security can be used for computing small power using lightweight stream ciphers. The new pipelined approach is proposed for Stream encryption means each letter one by one followed by the changing the encryption key after each letter. Here the work presents the design, simulation, and synthesis. Further the design is developed using cadence EDA physical design tools for optimizations on constraints like area, delay and low power consumption. Validation of data transmission in secure form (i.e., audio, image and text) using rabbit stream cipher algorithm is done. The rabbit algorithm is implemented using Verilog HDL simulated using Modelsim 10.4a synthesis using Xilinx ISE Design Suit 14.2 and also CADENCE.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] An Improved Hardware Implementation of the Grain Stream Cipher
    Mansouri, Shohreh Sharif
    Dubrova, Elena
    13TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN: ARCHITECTURES, METHODS AND TOOLS, 2010, : 433 - 440
  • [22] Efficient Implementation for QUAD Stream Cipher with GPUs
    Tanaka, Satoshi
    Nishide, Takashi
    Sakurai, Kouichi
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 897 - 911
  • [23] Low Power Implementation of Trivium Stream Cipher
    Mora-Gutierrez, J. M.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2013, 7606 : 113 - 120
  • [24] Compact Architecture for ASIC and FPGA Implementation of the KASUMI Block Cipher
    Yamamoto, Dai
    Itoh, Kouichi
    Yajima, Jun
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (12): : 2628 - 2638
  • [25] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
    Salam, Md Iftekhar
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 15 - 26
  • [26] Implementation of WG Stream Cipher with Involution Function
    Ashan, V. C.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 790 - 795
  • [27] Efficient Software Implementation of ZUC Stream Cipher
    Yu, Kuai
    Gu, Naijie
    Su, Junjie
    Bai, Qilin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING (ICVISP 2018), 2018,
  • [28] White-box Implementation of Stream Cipher
    Fukushima, Kazuhide
    Hidano, Seira
    Kiyomoto, Shinsaku
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
  • [29] Implementation and Comparative Analysis of AES as a Stream Cipher
    Zhou, Bin
    Peng, Yingning
    Gaj, Kris
    Zhou, Zhonghai
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 396 - +
  • [30] Highly reliable synchronous stream cipher system for link encryption
    Lee, H
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 269 - 278