ASIC Implementation of Rabbit Stream Cipher Encryption for Data

被引:1
|
作者
Prathima, N. [1 ]
Chetan, S. [1 ]
Rehman, Syed M. [2 ]
机构
[1] Dr Ambedkar Inst Technol, ECE Dept, Bengaluru, India
[2] Sun Softron, Bengaluru, India
关键词
Audio; CADENCE; Image; Intellectual property; rabbit stream cipher; key length; verilog HDL; CRYPTOGRAPHY; CRYPTOSYSTEM;
D O I
10.1109/wiecon-ece48653.2019.9019903
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over a network to secure information and to remain confidential cryptography plays a very important role in today's life. Cryptography is an method of converting information to a non-understandable form and then being able to convert it to the understandable form by the recipient. High level of security can be used for computing small power using lightweight stream ciphers. The new pipelined approach is proposed for Stream encryption means each letter one by one followed by the changing the encryption key after each letter. Here the work presents the design, simulation, and synthesis. Further the design is developed using cadence EDA physical design tools for optimizations on constraints like area, delay and low power consumption. Validation of data transmission in secure form (i.e., audio, image and text) using rabbit stream cipher algorithm is done. The rabbit algorithm is implemented using Verilog HDL simulated using Modelsim 10.4a synthesis using Xilinx ISE Design Suit 14.2 and also CADENCE.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] The rabbit stream cipher
    Boesgaard, Martin
    Vesterager, Mette
    Zenner, Erik
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008, 4986 LNCS : 69 - 83
  • [2] The design and implementation of a block cipher ASIC
    Jiang, AP
    Sheng, SM
    Fu, YL
    Liu, Y
    Ji, LJ
    [J]. 2001 4TH INTERNATIONAL CONFERENCE ON ASIC PROCEEDINGS, 2001, : 344 - 347
  • [3] The research of the new stream cipher encryption
    Zhuang, Peidong
    Wang, Zhigang
    Ding, Qun
    [J]. Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2009, 30 (SUPPL.): : 323 - 331
  • [4] Stream cipher encryption of random access files
    Golic, JD
    [J]. INFORMATION PROCESSING LETTERS, 1999, 69 (03) : 145 - 148
  • [5] MANAGE 1: New stream cipher for data encryption in CDMA wireless networks
    Hamdy, Nabil
    El Megeed, Tarek Abd
    Hamad, Ahmed
    Kamal, Marian
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2006, : 189 - +
  • [6] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Wang, Xingyuan
    Wang, Xiaojuan
    Zhao, Jianfeng
    Zhang, Zhenfeng
    [J]. NONLINEAR DYNAMICS, 2011, 63 (04) : 587 - 597
  • [7] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Xingyuan Wang
    Xiaojuan Wang
    Jianfeng Zhao
    Zhenfeng Zhang
    [J]. Nonlinear Dynamics, 2011, 63 : 587 - 597
  • [8] THE SECURITY ANALYSIS ON THE RABBIT STREAM CIPHER
    Chain, Kai
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2024, 16 (02): : 91 - 102
  • [9] Hardware Framework for the Rabbit Stream Cipher
    Stefan, Deian
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 230 - 247
  • [10] ENCRYPTION WITH DES AND ITS IMPLEMENTATION IN AN ASIC
    不详
    [J]. ELECTRONIC ENGINEERING, 1991, 63 (769): : 49 - &