An ASIC implementation of low power and high throughput blowfish crypto algorithm

被引:17
|
作者
Kumar, P. Karthigai [1 ]
Baskaran, K. [2 ]
机构
[1] Karunya Univ, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[2] Govt Coll Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
ASIC; Blowfish; Cryptography; Encryption; Low power; Throughput; ENCRYPTION;
D O I
10.1016/j.mejo.2010.04.004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information security has always been important in all aspects of life. It can be all the more important as technology continues to control various operations in our day to day life. Cryptography provides a layer of security in cases, where the medium of transmission is susceptible to interception, by translating a message into a form that cannot be read by an unauthorized third party. Several software implementations of blowfish crypto algorithms are described in the literature, but few attempts have been made to describe hardware implementations. The ultimate objective of the research presented in this paper is to develop low-power, high-throughput, real-time, reliable and secure crypto algorithm, which can be achieved through hardware implementations. The blowfish crypto algorithm is prototyped in 130 nm custom integrated circuit. (C) 2010 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:347 / 355
页数:9
相关论文
共 50 条
  • [41] A Low-Power 65-nm ASIC Implementation of Background Subtraction
    Zitouni, M. Sami
    Saleh, Hani
    Bhaskar, Harish
    Salahat, Ehab
    Ismail, Mohammed
    2014 10TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2014, : 71 - 74
  • [42] ASIC process options deliver low power or high performance
    Bursky, D
    ELECTRONIC DESIGN, 2000, 48 (18) : 60 - 60
  • [43] A new ASIC implementation of an advanced encryption standard (AES) crypto-hardware accelerator
    Ahmad, Nabihah
    Hasan, S. M. Rezaul
    MICROELECTRONICS JOURNAL, 2021, 117
  • [44] Efficient PRNG Design and Implementation for Various High Throughput Cryptographic and Low Power Security Applications
    Paul, Bikram
    Trivedi, Gaurav
    Jan, Pidanic
    Nemec, Zdenek
    2019 29TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2019, : 99 - 104
  • [45] VLSI Implementation of Low Power High Throughput Low Density Parity Check Code Decoder for Optical Communication
    Vaidyanathan, Kaushik
    Radhakrishnan, Anusha
    Kumar, Valli Sounthariya
    Kannan, M.
    2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 403 - +
  • [46] A low-power and high-throughput implementation of the SHA-1 hash function
    Michail, H
    Kakarountas, AP
    Koufopavlou, O
    Goutis, CE
    2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 4086 - 4089
  • [47] A high-throughput, low power architecture and its VLSI implementation for DFT/IDFT computation
    Hsiao, SF
    Shiue, WR
    ICASSP '99: 1999 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, PROCEEDINGS VOLS I-VI, 1999, : 1929 - 1932
  • [48] FPGA implementation of low power and high speed image edge detection algorithm
    Menaka, R.
    Janarthanan, R.
    Deeba, K.
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 75
  • [49] RETRACTED: Implementation of enhanced blowfish algorithm in cloud environment (Retracted Article)
    Gangireddy, Venkata Koti Reddy
    Kannan, Srihari
    Subburathinam, Karthik
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (03) : 3999 - 4005
  • [50] Hardware Implementation of the IDEA NXT Crypto-Algorithm
    Bozesan, Andreea
    Opritoiu, Flavius
    Vladutiu, Mircea
    2013 IEEE 19TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME), 2013, : 35 - 38