An area optimized implementation of cryptographic algorithm RC5

被引:0
|
作者
Liang, Jing [1 ]
Wang, Qin [1 ]
Qi, Yue [1 ]
Yu, Feng [1 ]
机构
[1] Univ Sci & Technol Beijing, Dept Comp Sci & Technol, Beijing 100083, Peoples R China
关键词
Data-dependant shift; RC5; Functional Unit;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a widely used symmetrical block cryptographic algorithm, RC5 has the characteristic of variable block length, variable round number and variable key length to satisfy the security need of different application environment. This paper presents an area efficient and reconfigurable hardware circuit. Using loop unrolling technology, the hardware circuit costs less resources by 74.7% compared to the conventional area optimized implementation of RC5 algorithm.
引用
收藏
页码:4585 / 4588
页数:4
相关论文
共 50 条
  • [21] Encryption quality analysis of the RC5 block cipher algorithm for digital images
    Ahmed, Hossam El-din H.
    Kalash, Hamdy M.
    Allah, Osama S. Farag
    OPTICAL ENGINEERING, 2006, 45 (10)
  • [22] Image Encryption Based on Multi-Level Keys on RC5 Algorithm
    Jamil A.S.
    Rahma A.M.S.
    International Journal of Interactive Mobile Technologies, 2022, 16 (17): : 101 - 115
  • [23] Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types
    Vihar, Jayvee Christopher N.
    Sison, Ariel M.
    Medina, Ruji P.
    2019 IEEE 9TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2019, : 201 - 204
  • [24] EVALUATION OF THE DRIVERS CAB IN THE RC5 ENGINE
    HEDBERG, G
    APPLIED ERGONOMICS, 1987, 18 (01) : 35 - 42
  • [25] Cracking RC5 with Java']Java applets
    Gladychev, P
    Patel, A
    O'Mahony, D
    CONCURRENCY-PRACTICE AND EXPERIENCE, 1998, 10 (11-13): : 1165 - 1171
  • [26] Optimized Implementation of the SM2 Algorithm on the GmSSL Cryptographic Library
    Qiao, Han
    Wang, An
    Wang, Bo
    Su, Chang-Shan
    Li, Gen
    Tang, Yu-Xing
    Zhu, Lie-Huang
    Jisuanji Xuebao/Chinese Journal of Computers, 2025, 48 (02): : 463 - 476
  • [27] Implementation Analysis of RC5 Algorithm on Preneel-Govaerts-Vandewalle (PGV) Hashing Schemes using Length Extension Attack
    Siswantyo, Sepha
    Susanti, Bety Hayat
    PROCEEDINGS OF THE 7TH SEAMS UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2015: ENHANCING THE ROLE OF MATHEMATICS IN INTERDISCIPLINARY RESEARCH, 2016, 1707
  • [28] New results in linear cryptanalysis of RC5
    Selçuk, AA
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 1 - 16
  • [29] Area Optimized Implementation of AES Algorithm on FPGA
    Deshpande, Hrushikesh S.
    Karande, Kailash J.
    Mulani, Aitaaf O.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 10 - 14
  • [30] RC5到RC6的演化设计
    张娅莉
    黄德成
    荆门职业技术学院学报, 2007, (12) : 27 - 30+34