ASIC Implementation of Rabbit Stream Cipher Encryption for Data

被引:1
|
作者
Prathima, N. [1 ]
Chetan, S. [1 ]
Rehman, Syed M. [2 ]
机构
[1] Dr Ambedkar Inst Technol, ECE Dept, Bengaluru, India
[2] Sun Softron, Bengaluru, India
关键词
Audio; CADENCE; Image; Intellectual property; rabbit stream cipher; key length; verilog HDL; CRYPTOGRAPHY; CRYPTOSYSTEM;
D O I
10.1109/wiecon-ece48653.2019.9019903
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over a network to secure information and to remain confidential cryptography plays a very important role in today's life. Cryptography is an method of converting information to a non-understandable form and then being able to convert it to the understandable form by the recipient. High level of security can be used for computing small power using lightweight stream ciphers. The new pipelined approach is proposed for Stream encryption means each letter one by one followed by the changing the encryption key after each letter. Here the work presents the design, simulation, and synthesis. Further the design is developed using cadence EDA physical design tools for optimizations on constraints like area, delay and low power consumption. Validation of data transmission in secure form (i.e., audio, image and text) using rabbit stream cipher algorithm is done. The rabbit algorithm is implemented using Verilog HDL simulated using Modelsim 10.4a synthesis using Xilinx ISE Design Suit 14.2 and also CADENCE.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
    Potestad-Ordonez, Francisco Eugenio
    Valencia-Barrero, Manuel
    Baena-Oliva, Carmen
    Parra-Fernandez, Pilar
    Jimenez-Fernandez, Carlos Jesus
    SENSORS, 2020, 20 (23) : 1 - 19
  • [42] An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network
    Punam Kumari
    Bhaskar Mondal
    Wireless Personal Communications, 2023, 130 : 2261 - 2280
  • [43] Encryption of test data: which cipher is better?
    Da Silva, Mathieu
    Valea, Emanuele
    Flottes, Marie-Lise
    Dupuis, Sophie
    Di Natale, Giorgio
    Rouzeyre, Bruno
    2018 14TH CONFERENCE ON PHD RESEARCH IN MICROELECTRONICS AND ELECTRONICS (PRIME 2018), 2018, : 85 - 88
  • [44] ASIC hardware implementation of the IDEA NXT encryption algorithm
    Macchetti, Marco
    Chen, Wenyu
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 4843 - +
  • [45] CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
    Banerjee, Amit
    Hasan, Mahamudul
    Rahman, Md. Auhidur
    Chapagain, Rajesh
    IEEE ACCESS, 2017, 5 : 17678 - 17691
  • [46] Medical image encryption based on stream cipher algorithm and krill group
    Zhao, Chu
    Yin, Shoulin
    Li, Hang
    Sun, Yang
    International Journal of Network Security, 2020, 22 (02) : 314 - 320
  • [47] Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection
    Cheng, Huiju
    Heys, Howard M.
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2921 - 2924
  • [48] Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher
    Yamamoto, Dai
    Yajima, Jun
    Itoh, Kouichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 3 - 12
  • [49] High-speed implementation of ubiquitous stream cipher
    Lee, H
    Kim, H
    System Simulation and Scientific Computing, Vols 1 and 2, Proceedings, 2005, : 1624 - 1631
  • [50] An Image Compression Encryption Algorithm Based on Chaos and ZUC Stream Cipher
    Song, Xiaomeng
    Shi, Mengna
    Zhou, Yanqi
    Wang, Erfu
    ENTROPY, 2022, 24 (05)