Design and FPGA Implementation of the SCAN Encryption Algorithm

نویسندگان

  • Christophoros Kachris
  • K. Kalaitzakis
چکیده

1 Acknowledgments I would like to acknowledge the guidance provided by my advisor, Prof. Dollas at every stage of work on this thesis. I also would like to thank Prof. D. Pneumatikatos and Prof. K. Kalaizakis for reviewing my thesis and participating in my thesis defense and the staff, the undergraduate and the postgraduate students of the Microprocessor and Hardware Laboratory. Introduction Encryption, the conversion of information into code, which is intelligible only for an authorized receiver, has intrigued men since ancient times. Historically, cryptographic techniques have been developed for diplomatic or military applications but today they can be found everywhere in private and public sectors where confidential information is crucial. The first system of military cryptography was the " skytale " , invented by the Spartans as early as the fifth century B.C [1]. The secret message was on the parchment down the length of the skytale. The parchment is then unwound and send on its way, where it can only be read if it is wrapped around a baton of the same thickness as the first. Cryptology, the science of code and cipher systems, start to develop not until the First World War. Until then few papers about cryptology have been published. The first notable paper about cryptography was Claude Shannon's paper " The Communication Theory of Secrecy Systems " , which appears in 1949 [2]. The revolution of telecommunication, which has produced a vast amount of transmitted confidential data, has initiated the flush of the cryptology. However, the science of cryptology differs from all the other sciences in a rather striking way: there is no public feedback about how cryptographic systems fail. Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how or if their systems fail is hard to get. The major users have traditionally been government agencies, which are very secretive about their mistakes. The National Security Agency (once called " No Such Agency ") spends thousands of millions dollars to cryptanalyze new algorithms and the publition of this achievement would meaning that this algorithm will stop being used. Cryptology also presents a difficulty not found in normal academic disciplines: the need for the proper interaction of cryptography and cryptanalysis. Exposing flaws in these designs is far harder than designing them in the 4 first place. The result is that the competitive process, which is one strong motivation …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Performance Analysis of Fixed, Reconfigurable, and Custom Architectures for the SCAN Image and Video Encryption Algorithm

This paper briefly presents a block cipher encryption architecture and a reconfigurable logic based hardware design for the SCAN encryption algorithm. Detailed performance results are presented for still images as well as video, and the reconfigurable architecture is compared to software-only implementations of the same algorithm as well as a preliminary ASIC design.

متن کامل

FPGA Implementation of RSA Encryption Algorithm for E-Passport Application

Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MH...

متن کامل

Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

متن کامل

A Compact FPGA Implementation of Triple-DES Encryption System with IP Core Generation and On-Chip Verification

This paper presents a fast and compact FPGA based implementation of the Data Encryption Standard (DES) and Triple Data Encryption Standard (TDES) algorithm, widely used in cryptography for securing the Internet traffic. The main objective of this paper is to provide the reader with a deep insight of the theory and design of a digital cryptographic circuit, which was implemented in a Vertex 5 se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005