ASIC Implementation of Rabbit Stream Cipher Encryption for Data

被引:1
|
作者
Prathima, N. [1 ]
Chetan, S. [1 ]
Rehman, Syed M. [2 ]
机构
[1] Dr Ambedkar Inst Technol, ECE Dept, Bengaluru, India
[2] Sun Softron, Bengaluru, India
关键词
Audio; CADENCE; Image; Intellectual property; rabbit stream cipher; key length; verilog HDL; CRYPTOGRAPHY; CRYPTOSYSTEM;
D O I
10.1109/wiecon-ece48653.2019.9019903
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over a network to secure information and to remain confidential cryptography plays a very important role in today's life. Cryptography is an method of converting information to a non-understandable form and then being able to convert it to the understandable form by the recipient. High level of security can be used for computing small power using lightweight stream ciphers. The new pipelined approach is proposed for Stream encryption means each letter one by one followed by the changing the encryption key after each letter. Here the work presents the design, simulation, and synthesis. Further the design is developed using cadence EDA physical design tools for optimizations on constraints like area, delay and low power consumption. Validation of data transmission in secure form (i.e., audio, image and text) using rabbit stream cipher algorithm is done. The rabbit algorithm is implemented using Verilog HDL simulated using Modelsim 10.4a synthesis using Xilinx ISE Design Suit 14.2 and also CADENCE.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] An Approach Using Stream Cipher Algorithm for Image Encryption and Decryption
    Aissa, Belmeguenai
    Nadir, Derouiche
    Ammar, Medoued
    201415th International Conference on Sciences & Techniques of Automatic Control & Computer Engineering (STA'2014), 2014, : 498 - 503
  • [32] Electronic chart encryption method based on chaotic stream cipher
    Zhao, Yu-Xin
    Li, Gang
    Li, Lei
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2007, 28 (01): : 60 - 64
  • [33] Robust Image Encryption Method with Cipher Stream Chaining Process
    Tep, Sovan
    Anantavrasilp, Isara
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 283 - 288
  • [34] LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm
    El Hennawy, Hadia M. S.
    Omar, Alaa E. A.
    Kholaif, Salah M. A.
    AIN SHAMS ENGINEERING JOURNAL, 2015, 6 (01) : 57 - 65
  • [35] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Wong, Kenneth Koon-Ho
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 961 - 966
  • [36] A novel approach based on stream cipher for selective speech encryption
    Belmeguenai A.
    Ahmida Z.
    Ouchtati S.
    Djemii R.
    International Journal of Speech Technology, 2017, 20 (3) : 685 - 698
  • [37] Design and Simulation of Authenticated Encryption AENOTP Stream Cipher Algorithm
    Hussein, Mohamed Nabil
    Megahed, Mohamed Helmy
    Azeem, Mohamed Hassan Abdel
    2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 393 - 398
  • [38] Rabbit: A new high-performance stream cipher
    Boesgaard, M
    Vesterager, M
    Pedersen, T
    Christiansen, J
    Scavenius, O
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 307 - 329
  • [39] DESIGN AND IMPLEMENTATION OF A KEY GENERATOR-BASED STREAM CIPHER FOR SECURING TEXT DATA
    Ali, Basheer H.
    Zaite, Mohammed J.
    Al-Hashimi, Abdullah S.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (06): : 3372 - 3386
  • [40] An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network
    Kumari, Punam
    Mondal, Bhaskar
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (03) : 2261 - 2280