VLSI Design flow for Secure Integrated Circuits based on DES, TDES, AES and Blowfish Algorithms and their performance

  • Authors

    • Kumara Swamy Varkuti
    • Prabhu Benakop
    2018-04-12
    https://doi.org/10.14419/ijet.v7i2.16.11424
  • ICT, IS, WDDL, DES, TDES, AES, BF, IMBFA, HDL.
  • Information Communication Technology (ICT) and Information Security (IS) are playing vital role in the present day communications. Information is prone to side channel attacks at software level where as it is very difficult to hack the information at hardware level.  Security is the major concern in the paperless communication and cashless online transactions. This paper aims to implement the most secured Improved Modified Blowfish Algorithm (IMBFA) by incorporating cell substitution using Wave Dynamic Differential Logic (WDDL) and interconnect decomposition  in the VLSI Design flow to not to allow the hacker to estimate or predict the key. Proposed IMBFA which can result in high speed, high throughput and effective memory utilization compared to Data Encryption Standard (DES), Triple Data Encryption Standard (TDES), Advanced Encryption Standard (AES) and Blowfish (BF). In this research paper, IMBFA yielded minimum delay as 71.067 ns, frequency of the design as 14.07 MHz, memory utilization as 62.481MB and throughput is 900Mbps compared to AES, TDES and DES algorithms. It is simulated using ModelSim, Synthesized using Leonardo Spectrum and implemented using Verilog HDL.

     

  • References

    1. [1]. V.Kumara Swamy, Dr Prabhu G Benakop, “Predominance of Blowfish over Triple Data Encryption Standard Symmetric Key Algorithm for Secure Integrated Circuits using Verilog HDLâ€, International Journal of Network Security & Its Applications(IJNSA), ISSN:09758307, DOI:10.5121/ ijnsa.2017.9603, Vol.9, No.6, November 2017

      [2]. Prachi V. Bhalerao, Rahul D. Ghongade, Vishal B. Langote, “Hardware implementation of Cryptosystem by AES algorithm using FPGAâ€, International Journal of Computer Science and Mobile Computing, ISSN:2320-088X, Vol.6, Issue.5, Pg.84-89, May 2017.[3] Md. Alam Hossain, Md.Biddut Hossain, d. hafin Uddin, Shariar Md. Imtiaz, “Performance analysis of different cryptography algorithmsâ€, International Journal of Advanced Research in Computer Science and software Engineering, ISSN: 2277-128X, Vol.6, Issue.3, Pg.659-665, March 2016[5] Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman, "Enhancing Wi-Fi Security Using a Hybrid Algorithm of Blowfish and RC6",2016 International Conference on Networking Systems and Security (NSysS), 7-9 Jan, 2016.. [6] Viney Pal Bansal,Sandeep Singh, "A Hybrid Data Encryption Technique using RSA and Blowfish for Cloud Computing on FPGAs", 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), 21-22 Dec. 2015

      [7] Vaibhav Poonia, Dr.Narendra Singh Yadav, "Analysis of modified Blowfish Algorithm in different cases with various parameters", International Journal of Engineering Research and General Science, ISSN: 2091-2730, Volume 3, Issue 1, January-February, 2015.

      [8] Amaal A. Abd El-Sadek, Talaat A. El-Garf, Mohammed M.Fouad, "Speech Encryption Applying a Modified Blowfish Algorithm", October 2014.

      [9] V.Kumara Swamy, Dr Prabhu G Benakop, “High Throughput and High Speed Blowfish Algorithm for Secure Integrated Circuitsâ€, Annals computer science series, ISSN: 1583-7165(Print), ISSN: 2065-7471(Online), Vol. 12, Issue. 1, Pg.24-29, July 2014, Romania.

      [10] Kurniawan Nur Prasetyo, YudhaPurwanto, Denny Darlis, "An implementation of data encryption for internet of things using Blowfish algorithm based on FPGA", Vol 2, 2014.

      [11] V .Kumara Swamy, Dr Prabhu G Benakop,Performance Analysis of Secure Integrated Circuits using Blowfish Algorithm, Global Journal of Computer Science and Technology Network, Web & Security, Volume 13, Issue 17, Version 1.0,Page no.10-15, December 2013, Global Journals Inc (USA), ISSN: 0975-4172 (Online), ISSN: 0975-4350 (Print).

      [12] Monika Agrawal, Pradeep Mishra, “A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithmâ€, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-6, August 2012.

      [13]M.Chandra Mohan,V.Kumara Swamy, Dr. T.Srinivasulu,Design of High Speed AES Algorithm, International Conference on Electronics and Communication Engineering (ICECE-2012),GNIT, Hyderabad, Andhra Pradesh, India, 19-20,July 2012

      [14] Monika Agrawal, Pradeep Mishra, ‘A Comparative Survey on Symmetric Key Encryption Techniques’, International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397, Vol. 4, No. 05, pp.877, May 2012

      [15] Gurjeevan Singh, Ashwani Kr. Singla, K.S. Sandha, “Superiority of Blowfish Algorithm in Wireless Networksâ€, International Journal of Computer Applications, ISSN: 0975-8887, Vol.44, Issue.11, April 2012.

      [16] Walied W. Souror, Ali E. Taki el-deen, Rasheed Mokhtar-awady Ahmed, Adel Zaghlul Mahmoud - An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm, International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP) Vol. 2, No. 1, March 2012, ISSN: 2046-617X. [17] M. Anand Kumar, Dr. S. Karthikeyan, “Investigating the efficiency of Blowfish and Rejindael (AES) Algorithmsâ€, International Journal of Computer Network and Information Security, DOI:10.5815/ijcnis.2012.02.04, Pg.22-28, Feb.2012. [18] Gurjeevan Singh, Ashwani Kumar Singla, K. S. Sandha - Through Put Analysis of Various Encryption Algorithms, IJCST Vol.2, Issue3, September 2011. [19] O P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi, “Performance Analysis of Data Encryption Algorithmsâ€, IEEE Xplore, 978-1-4244-8679-3/11, July 2011, DOI: 10.1109/ICECTECH.2011.5942029

  • Downloads

  • How to Cite

    Swamy Varkuti, K., & Benakop, P. (2018). VLSI Design flow for Secure Integrated Circuits based on DES, TDES, AES and Blowfish Algorithms and their performance. International Journal of Engineering & Technology, 7(2.16), 94-97. https://doi.org/10.14419/ijet.v7i2.16.11424