10/21/20 1 Lecture 8B RTL Design Methodology Transition from The

Total Page:16

File Type:pdf, Size:1020Kb

10/21/20 1 Lecture 8B RTL Design Methodology Transition from The 10/21/20 Lecture 8B RTL Design Methodology Class Exercise 3 CIPHER Transition from the Pseudocode & Interface to a Corresponding Block Diagram 1 2 RC6 NIST Report: Security Security Margin RC6 (Rivest Cipher 6) - symmetric key block cipher Designers: Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin MARS High Serpent Twofish One of five finalists of the contest for the Advanced Encryption Standard (AES) 1997-2000 Rijndael Adequate RC6 Candidate algorithm in the following other contests: NESSIE – for European standards (2000-2003) CRYPTREC – for Japanese standards (2000-2003) Simple Complex 3 Complexity 4 3 4 Security: Theoretical attacks better NIST Report: Software Efficiency than exhaustive key search Encryption and Decryption Speed Serpent 9 23 32 32-bit 64-bit DSPs processors processors Twofish 6 10 16 RC6 Rijndael Rijndael high Twofish Twofish Mars 11 5 16 without 16 mixing rounds Rijndael Mars Mars Mars RC6 RC6 Rijndael 7 3 10 medium Twofish RC6 15 5 20 low Serpent Serpent Serpent 0 5 10 15 20 25 30 35 # of rounds in the attack/total # of rounds 6 5 6 1 10/21/20 Efficiency in hardware: FPGA Virtex 1000: Speed Pseudocode Throughput [Mbit/s] Split input I into four words, I3, I2, I1, I0, of the size of w bits each 500 431 444 George Mason University A = I3; B = I2; C = I1; D=I0 450 414 University of Southern California B = B + S[0] 400 353 Worcester Polytechnic Institute D = D + S[1] 350 for i = 1 to r do 294 { 300 T = (B*(2B + 1)) <<< k 250 U = (D*(2D + 1)) <<< k A = ((A ⊕ T) <<< U) + S[2i] 177 200 173 C = ((C ⊕ U) <<< T) + S[2i + 1] 149 143 (A, B, C, D) = (B, C, D, A) 150 104 112 102 88 } 100 62 61 A = A + S[2r + 2] 50 C = C + S[2r + 3] O = (A, B, C, D) 0 Serpent Rijndael Twofish Serpent RC6 Mars 8 I8 I1 7 7 8 Notation Operations w: word size, e.g., w=32 (constant) k: log2(w) (constant) ⊕ : XOR A, B, C, D, U, T: w-bit variables + : addition modulo 2w I3, I2, I1, I0: Four w-bit words of the input I – : subtraction modulo 2w r: number of rounds (constant) * : multiplication modulo 2w O: output of the size of 4w bits X <<< Y : rotation of X to the left by the number of positions S[j] : 2r+4 round keys stored in two RAMs. given in Y Each key is a w-bit word. X >>> Y : rotation of X to the right by the number of positions The first RAM stores values of S[j=2i], i.e., only round keys given in Y with even indices. The second memory stores values of (A, B, C, D) : Concatenation of A, B, C, and D. S[j=2i+1], i.e., only round keys with odd indices. 9 10 9 10 Modular Arithmetic Circuit Interface clk reset 4w 4w I O write_I CIPHER DONE w Sj Write_Sj j m 11 + 4 mod 12 = 3 11 12 11 12 2 10/21/20 Interface Table Protocol (1) An external circuit first loads all round keys S[0], S[1], S[2], …, S[2r+2], [2r+3] to the two internal memories of the CIPHER unit. The first memory stores values of S[j=2i], i.e., only round keys with even indices. The second memory stores values of S[j=2i+1], i.e. only round keys with odd indices. Loading round keys is performed using inputs: Sj, j, write_Sj, clk. Then, the external circuits, loads an input block I to the CIPHER unit, using inputs: I, write_I, clk. Note: m is a size of index j. It is a minimum integer, such that 2m -1 ³ 2r+3. After the input block I is loaded to the CIPHER unit, the encryption starts automatically. 13 14 13 14 Protocol (2) Assumptions When the encryption is completed, signal DONE becomes active, and the output O changes to the new value of the ciphertext. • 2r+4 clock cycles are used to load round keys to internal The output O keeps the last value of the ciphertext at the output, RAMs until the next encryption is completed. Before the first encryption • one round of the main for loop of the pseudocode executes is completed, this output should be equal to zero. in one clock cycle • you can access only one position of each internal memory of round keys per clock cycle As a result, the encryption of a single input block I should last r+2 clock cycles. 15 16 15 16 Addition mod 2w XOR CIPHER: Building Blocks 18 17 18 3 10/21/20 Multiplication mod 2w Variable Rotation X<<<Y 20 19 19 20 Memories of Round Keys – Contents CIPHER Solutions 22 21 22 Datapath – Memories of Round Keys Datapath – Loop Counter ==r 23 24 23 24 4 10/21/20 Pseudocode Pseudocode Split input I into four words, I3, I2, I1, I0, of the size of w bits each Split input I into four words, I3, I2, I1, I0, of the size of w bits each A = I3; B = I2; C = I1; D=I0 A = I3; B = I2; C = I1; D=I0 B = B + S[0] B = B + S[0] D = D + S[1] D = D + S[1] for i = 1 to r do for i = 1 to r do { { T = (B*(2B + 1)) <<< k T = (B*(2B + 1)) <<< k U = (D*(2D + 1)) <<< k U = (D*(2D + 1)) <<< k A = ((A ⊕ T) <<< U) + S[2i] A’ = ((A ⊕ T) <<< U) + S[2i] C = ((C ⊕ U) <<< T) + S[2i + 1] C’ = ((C ⊕ U) <<< T) + S[2i + 1] (A, B, C, D) = (B, C, D, A) (A, B, C, D) = (B, C’, D, A’) } } A = A + S[2r + 2] A = A + S[2r + 2] C = C + S[2r + 3] C = C + S[2r + 3] O = (A, B, C, D) O = (A, B, C, D) 25 26 25 26 Datapath – Initialization & Main Loop Datapath – Finalization 27 28 27 28 Interface with the Division into Timing Analysis – Key Setup & Encryption the Datapath and Controller Notation: TCLK – clock period in ns NM – number of encrypted message blocks I TKeySetup[cycles] = 2r+4 TKeySetup[ns] = (2r+4)∙TCLK TEncryption(NM)[cycles] = (r+2) ∙NM TEncryption(NM)[ns] = (r+2) ∙NM∙TCLK 29 30 29 30 5 10/21/20 Timing Analysis - Throughput Timing Analysis – Critical Path Notation: TCLK-min = dR + dlogic-max + tsetup TCLK – clock period in ns NM – number of encrypted message blocks I Critical Path – a path from an output of a register w – word size to an input of a register with the maximum value of the delay 4 ∙ w ∙NM 4 ∙ w (denoted as dlogic-max) ThrEncryption(NM)[Gbit/s] = = (r+2) ∙NM∙TCLK (r+2) ∙TCLK dR – delay of a register t – setup time of a register r & w constants, determined by the security analysis setup of the cipher For the security equivalent to AES-128, r=20 & w=32 TCLK dependent on w, returned by the FPGA tools 32 based on the static timing analysis of the critical path 31 31 32 Setup & Hold Time of a Register Datapath – Critical Path tsetup dR dlogic-max Setup time - the amount of time the data at the synchronous input must be stable before the next active edge of the clock Hold time - the amount of time the data at the synchronous input must be stable after the last active edge of the clock 33 Critical Path marked in red 34 33 34 6.
Recommended publications
  • Broad View of Cryptographic Hash Functions
    IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 www.IJCSI.org 239 Broad View of Cryptographic Hash Functions 1 2 Mohammad A. AlAhmad , Imad Fakhri Alshaikhli 1 Department of Computer Science, International Islamic University of Malaysia, 53100 Jalan Gombak Kuala Lumpur, Malaysia, 2 Department of Computer Science, International Islamic University of Malaysia, 53100 Jalan Gombak Kuala Lumpur, Malaysia Abstract Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. Keywords-cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3. Figure 1. Classification of cryptographic hash function 1. INTRODUCTION CRHF usually deals with longer length hash values. An A cryptographic hash function H is an algorithm that takes an unkeyed hash function is a function for a fixed positive integer n * arbitrary length of message as an input {0, 1} and produce a which has, as a minimum, the following two properties: n fixed length of an output called message digest {0, 1} 1) Compression: h maps an input x of arbitrary finite bit (sometimes called an imprint, digital fingerprint, hash code, hash length, to an output h(x) of fixed bit length n.
    [Show full text]
  • Improved RC6 Algorithm Using Two Types of Chaos Maps
    International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-1, October 2019 Improved RC6 Algorithm using Two Types of Chaos Maps Ziyad Tariq Mustafa Al-Ta'i , Ebtisam Jumaa, Abstract— RC6 (Rivest cipher 6) is keyblock chipher which RC5 intended to be appropriate for both software and consider symmetric imitative from RC5. It was intended to hardware application. The properties of the algorithm encounter the needs competition of the Advanced Encryption parameterized, with a flexible block size, number of rounds Standard (AES) . The aim of this work is to add new security is variable, and key length is also variable. This offers the layer to RC6 (Rivest Cipher 6) algorithm, because there is some chance that the characteristics of performance and the insufficiency in the Key Scheduling Algorithm (KSA) of RC6. This paper presents improved RC6 (IRC6) key generation based security level be flexible [3]. on two types of chaotic maps (Chebyshev,2d logistic) to generate RC6 algorithm was designed by Ron Rivest, Matt [4] N key to N users. The results prove that the average secrecy of Robshaw, Ray Sidney and Yiqun Lisa Yin . The algorithm IRC6 is better than of traditional RC6, in which: for 32 bits’ key was also acquiesced to the NESSIE and CRYPTREC length, and 256 bits’ plaintext size, the average secrecy of IRC6 is projects, it is a proprietary algorithm, patented by RSA (0.536 - 3.907) while for RC6 is (0.254 constant). security, RC6 is consequent from RC5. The difference between RC6 and RC5 is that the former integer Keywords— Average secrecy, key scheduling algorithm, multiplication inclusion and instead of two w-bit, it uses chaotic maps, RC6 Algorithm.
    [Show full text]
  • Notices of the American Mathematical Society (ISSN 0002- Call for Nominations for AMS Exemplary Program Prize
    American Mathematical Society Notable textbooks from the AMS Graduate and undergraduate level publications suitable fo r use as textbooks and supplementary course reading. A Companion to Analysis A Second First and First Second Course in Analysis T. W. Korner, University of Cambridge, • '"l!.li43#i.JitJij England Basic Set Theory "This is a remarkable book. It provides deep A. Shen, Independent University of and invaluable insight in to many parts of Moscow, Moscow, Russia, and analysis, presented by an accompli shed N. K. Vereshchagin, Moscow State analyst. Korner covers all of the important Lomonosov University, Moscow, R ussia aspects of an advanced calculus course along with a discussion of other interesting topics." " ... the book is perfectly tailored to general -Professor Paul Sally, University of Chicago relativity .. There is also a fair number of good exercises." Graduate Studies in Mathematics, Volume 62; 2004; 590 pages; Hardcover; ISBN 0-8218-3447-9; -Professor Roman Smirnov, Dalhousie University List US$79; All AJviS members US$63; Student Mathematical Library, Volume 17; 2002; Order code GSM/62 116 pages; Sofi:cover; ISBN 0-82 18-2731-6; Li st US$22; All AlviS members US$18; Order code STML/17 • lili!.JUM4-1"4'1 Set Theory and Metric Spaces • ij;#i.Jit-iii Irving Kaplansky, Mathematical Analysis Sciences R esearch Institute, Berkeley, CA Second Edition "Kaplansky has a well -deserved reputation Elliott H . Lleb M ichael Loss Elliott H. Lieb, Princeton University, for his expository talents. The selection of Princeton, NJ, and Michael Loss, Georgia topics is excellent." I nstitute of Technology, Atlanta, GA -Professor Lance Small, UC San Diego AMS Chelsea Publishing, 1972; "I liked the book very much.
    [Show full text]
  • Attacks on and Advances in Secure Hash Algorithms
    IAENG International Journal of Computer Science, 43:3, IJCS_43_3_08 ______________________________________________________________________________________ Attacks on and Advances in Secure Hash Algorithms Neha Kishore, Member IAENG, and Bhanu Kapoor service but is a collection of various services. These services Abstract— In today’s information-based society, encryption include: authentication, access control, data confidentiality, along with the techniques for authentication and integrity are non-repudiation, and data integrity[1]. A system has to key to the security of information. Cryptographic hashing ensure one or more of these depending upon the security algorithms, such as the Secure Hashing Algorithms (SHA), are an integral part of the solution to the information security requirements for a particular system. For example, in problem. This paper presents the state of art hashing addition to the encryption of the data, we may also need algorithms including the security challenges for these hashing authentication and data integrity checks for most of the algorithms. It also covers the latest research on parallel situations in the dynamic context [2]. The development of implementations of these cryptographic algorithms. We present cryptographic hashing algorithms, to ensure authentication an analysis of serial and parallel implementations of these and data integrity services as part of ensuring information algorithms, both in hardware and in software, including an analysis of the performance and the level of protection offered security, has been an active area of research. against attacks on the algorithms. For ensuring data integrity, SHA-1[1] and MD5[1] are the most common hashing algorithms being used in various Index Terms—Cryptographic Hash Function, Parallel types of applications.
    [Show full text]
  • Algorithms, Key Size and Parameters Report – 2014
    Algorithms, key size and parameters report – 2014 November, 2014 European Union Agency for Network and Information Security www.enisa.europa.eu Algorithms, key size and parameters report – 2014 November, 2014 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Authors Contributors to this report: This work was commissioned by ENISA under contract ENISA D-COD-14-TO9 (under F-COD-13-C23) to the consortium formed by K.U.Leuven (BE) and University of Bristol (UK). Contributors: Nigel P. Smart (University of Bristol), Vincent Rijmen (KU Leuven), Benedikt Gierlichs (KU Leuven), Kenneth G. Paterson (Royal Holloway, University of London), Martijn Stam (University of Bristol), Bogdan Warinschi (University of Bristol), Gaven Watson (University of Bristol). Editor: Nigel P. Smart (University of Bristol). ENISA Project Manager: Rodica Tirtea. Agreements of Acknowledgements We would like to extend our gratitude to: External Reviewers: Michel Abdalla (ENS Paris), Kenneth G. Paterson (Royal Holloway, University of London), Ahmad-Reza Sadeghi (T.U.
    [Show full text]
  • Optimized Hardware Implementation of RC6 Algorithm on FPGA for Cloud Security
    International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 2, Issue 5, May 2015) Optimized hardware implementation of RC6 Algorithm on FPGA for Cloud Security Smitha Rose Varghese Nafeesath T P Dr.Jose Alex Mathew Electronics and communication Associate Prof. Director, ECE, PACE PACE, Mangalore, India Electronics and communication Mangalore, India. [email protected] PACE, Mangalore, India [email protected] [email protected] Abstract - RC6 is one of the finalists for AES. It is considered to performance, and a versatility of design that makes the cipher be in par with various other algorithms like Twofish, Rijndael, highly adaptable to future demands. It also says the three most etc.,. In this research work, investigation is done to implement important attributes of the final AES are security, secure data transfer of 192 bits using RC6 algorithm and on performance, and versatility. With RC6 we achieve all three improving the hardware performance of the RC6 algorithm by goals. RC6 is so simple that the full details of the cipher can identifying various operations that are present and those which can be optimized further. It is implemented on FPGA so as to get be recalled at will. Through simplicity we have developed a the hardware proof and also, its performance on FPGA is also truly versatile cipher. We have also developed a cipher that discussed. offers exceptional performance, and gives the best all-round suitability in Java with all the implications this holds for future applications. Most importantly, though, existing analysis on I. INTRODUCTION RC6 is not only by far the most extensive of any of the In cryptography, RC6 is a symmetric key block finalists, it is also the most accurate and the most detailed.
    [Show full text]
  • Lecture 8B RTL Design Methodology Transition from the Pseudocode
    Lecture 8B RTL Design Methodology Transition from the Pseudocode & Interface to a Corresponding Block Diagram Class Exercise 3 CIPHER RC6 RC6 (Rivest Cipher 6) - symmetric key block cipher Designers: Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin One of five finalists of the contest for the Advanced Encryption Standard (AES) 1997-2000 Candidate algorithm in the following other contests: NESSIE – for European standards (2000-2003) CRYPTREC – for Japanese standards (2000-2003) 3 NIST Report: Security Security Margin High Serpent MARS Twofish Rijndael Adequate RC6 Simple Complex Complexity 4 Security: Theoretical attacks better than exhaustive key search Serpent 9 23 32 Twofish 6 10 16 Mars 11 5 16 without 16 mixing rounds Rijndael 7 3 10 RC6 15 5 20 0 5 10 15 20 25 30 35 # of rounds in the attack/total # of rounds NIST Report: Software Efficiency Encryption and Decryption Speed 32-bit 64-bit DSPs processors processors RC6 Rijndael Rijndael high Twofish Twofish Rijndael Mars Mars Mars medium Twofish RC6 RC6 low Serpent Serpent Serpent 6 Efficiency in hardware: FPGA Virtex 1000: Speed Throughput [Mbit/s] 500 431 444 George Mason University 450 414 University of Southern California 400 353 Worcester Polytechnic Institute 350 294 300 250 177 200 173 149 143 150 104 112 102 88 100 62 61 50 0 Serpent Rijndael Twofish Serpent RC6 Mars I8 I1 7 Pseudocode Split input I into four words, I3, I2, I1, I0, of the size of w bits each A = I3; B = I2; C = I1; D=I0 B = B + S[0] D = D + S[1] for i = 1 to r do { T = (B*(2B + 1)) <<< k U = (D*(2D + 1)) <<< k A = ((A ⊕ T) <<< U) + S[2i] C = ((C ⊕ U) <<< T) + S[2i + 1] (A, B, C, D) = (B, C, D, A) } A = A + S[2r + 2] C = C + S[2r + 3] O = (A, B, C, D) 8 Notation w: word size, e.g., w=32 (constant) k: log2(w) (constant) A, B, C, D, U, T: w-bit variables I3, I2, I1, I0: Four w-bit words of the input I r: number of rounds (constant) O: output of the size of 4w bits S[j] : 2r+4 round keys stored in two RAMs.
    [Show full text]
  • Symmetric Algorithm Survey: a Comparative Analysis
    International Journal of Computer Applications (0975 – 8887) Volume 61– No.20, January 2013 Symmetric Algorithm Survey: A Comparative Analysis Mansoor Ebrahim Shujaat Khan Umer Bin Khalid IQRA University IQRA University IQRA University Main Campus Main Campus Main Campus Defense View, Karachi Defense View, Karachi Defense View, Karachi ABSTRACT 1. INTRODUCTION Information Security has become an important issue in modern Cryptography a Modern encryption technology, comprising of world as the popularity and infiltration of internet commerce different mathematical processes involving the application of and communication technologies has emerged, making them a formulas (or algorithms) was conventionally designed to secure prospective medium to the security threats. To surmount these discretion of military and diplomatic communications. With the security threats modern data communications uses cryptography Rapid growth of information technology and science of an effective, efficient and essential component for secure encryption, an innovative area for cryptographic products has transmission of information by implementing security parameter stimulated. Cryptography [1] is defined as “the subdivision of counting Confidentiality, Authentication, accountability, and cryptology in which encryption /decryption algorithms are accuracy. To achieve data security different cryptographic designed, to guarantee the security and authentication of data”. algorithms (Symmetric & Asymmetric) are used that jumbles Cryptography can be classified as Symmetric
    [Show full text]
  • Chapter 1 Introduction to Cryptography
    introduction to cryptography chapter 1 introduction to cryptography 1.1 basic terminology Cryptography is the art of making and keeping messages secret. In practical terms, this involves the conversion of a plaintext message into a cryptic one, called cyphertext. The process of conversion, or encoding of the clear text is called encryption. The process of converting the cyphertext to the original content of the message, the plaintext, is called decryption. Both processes make use (in one way or another) of an encryption procedure, called encryption (decryption) algorithm. While most of these algorithms are public, the secrecy is guaranteed by the usage of an encryption (decryption) key, which is, in most cases, known only by the legitimate entities at the both ends of the communication channel. Cryptology is a branch of mathematics and describes the mathematical foundation of cryptographic methods, while cryptanalysis is the art of breaking ciphers. 1.2 cryptography Cryptography provides the following services: • authentication • integrity • non-repudiation • secrecy Let’s have a more detailed look at these services. Authentication allows the recipient of the message to validate the identity of the sender. It prevents an unauthorized entity to masquerade itself as a legitimate sender of the message. Integrity guarantees that the message sent has not been modified or altered along the communication channel. This is usually accomplished by attaching to the message itself a digest (compressed version) of fixed length of the message, digest which allows verify if the original message was (intentionally or not) altered. Non-repudiation with proof of origin assures the receiver of the identity of the sender, while non- repudiation with proof of delivery ensures the sender that the message was delivered.
    [Show full text]
  • Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
    NISTIR 7620 Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition Andrew Regenscheid Ray Perlner Shu-jen Chang John Kelsey Mridul Nandi Souradyuti Paul NISTIR 7620 Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition Andrew Regenscheid Ray Perlner Shu-jen Chang John Kelsey Mridul Nandi Souradyuti Paul Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 September 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Deputy Director NISTIR 7620: Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition Abstract The National Institute of Standards and Technology is in the process of selecting a new cryptographic hash algorithm through a public competition. The new hash algorithm will be referred to as “SHA-3” and will complement the SHA-2 hash algorithms currently specified in FIPS 180-3, Secure Hash Standard. In October, 2008, 64 candidate algorithms were submitted to NIST for consideration. Among these, 51 met the minimum acceptance criteria and were accepted as First-Round Candidates on Dec. 10, 2008, marking the beginning of the First Round of the SHA-3 cryptographic hash algorithm competition. This report describes the evaluation criteria and selection process, based on public feedback and internal review of the first-round candidates, and summarizes the 14 candidate algorithms announced on July 24, 2009 for moving forward to the second round of the competition. The 14 Second-Round Candidates are BLAKE, BLUE MIDNIGHT WISH, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein.
    [Show full text]
  • Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security
    International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 4, Special Issue May 2015 Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security Shailja Kumari,Jyoti Chawla Department Of Computer Science And Applications Chaudhary Devi Lal University,Sirsa ABSTRACT: If the confidentiality of the information is of very high value, it should be protected. If you want to stop the unauthorized disclosure or alteration of the information, secure it. Cryptography is an area of computer science which is developed to provide security for the senders and receivers to transmit and receive confidential data through an insecure channel by a means of process called Encryption/ Decryption. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper presents a comparative analysis on different parameters of encryption algorithms(AES,RC6,IDEA,BLOWFISH) such as Architecture, Flexibility, Reliability, Security and Limitation for information security that are essential for secure communication. General Terms: Algorithms, Encryption, Public Key, Private Key, Architecture, Flexibility, Overview, Limitations, Security. Index Terms—Cryptography, International Data Encryption Standard, Advance Encryption Standard, RC6 , Blowfish. 1. INTRODUCTION Cryptography is basically the process of hiding information. Our ATM cards, computer passwords and transferring data from one place to another are done with cryptography. Data cryptography mainly is the scrambling of the content of data, such as text, image, audio, video and so forth to make the data unreadable, invisible or unintelligible during transmission or storage called Encryption.
    [Show full text]
  • Symmetric Key Cryptography: Current Trends
    Preeti Singh et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December- 2014, pg. 410-415 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 3, Issue. 12, December 2014, pg.410 – 415 RESEARCH ARTICLE Symmetric Key Cryptography: Current Trends Preeti Singh1, Praveen Shende2 ¹M. Tech. Scholar, CSE Department, Chhatrapati Shivaji Institute of Technology, Durg, India ²Asst. Professor, CSE Department, Chhatrapati Shivaji Institute of Technology, Durg, India 1 [email protected]; 2 [email protected] Abstract— The present day & age is the time when Information has become the most powerful commodity & communication online or through wireless networks has become an integral part of our lives. The data being transmitted is prone to various passive and active attacks. Thus, information security is in all likelihood the most formidable part of correspondence today. The solution to this problem is the use of cryptography techniques. Cryptography is the art and science of secret writing that changes the message from its typical structure into a garbled structure. The point of this paper is to portray an expansive review of Encryption & Decryption & provide an involved review of the various Symmetric Key Cryptography algorithms. Keywords— Cryptography, Encryption, Decryption, Survey, Symmetric Key I. INTRODUCTION Cryptography is the study of information hiding and retrieval. Cryptography is derived from the Greek words: kryptós, "hidden", and gráphein, "to write" - or "hidden writing". It is the art of protecting the information by transforming it into an unintelligible format in which a message can be hidden from reader and only the intended recipient will be able to convert it into original message.
    [Show full text]