Design and Implementation of Dynamic Key Based Stream Cipher for Cryptographic Processor

被引:0
作者
Pandian, K. K. Soundra [1 ]
Pal, Saptadeep [1 ]
Chandra, Kailash [1 ]
机构
[1] Indian Inst Technol Patna, Dept Elect Engn, Patna 800013, Bihar, India
来源
2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN) | 2015年
关键词
Hash Function; Key Generation; Hardware Security; RC4 Stream Cipher; HDL; FPGA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a new design for dynamic key based stream cipher is proposed for the hardware cryptographic applications such as data transmission and information security. Unlike the static key based existing stream ciphers, the novelty of this proposed stream cipher is based on dynamic key, generated by Toeplitz hash function which is used as a key for RC4 stream cipher. Further, this key is used to generate the dynamic hardware key for the cryptographic processor. The proposed design is implemented on targeting a commercially available xilinx spartan 3E xc3s500e-4fg320 FPGA device. This implementation of the proposed methodology accomplishes data throughput of 520 Mbps with the initial latency of 17 clock cycles, at a maximum clock frequency of 65 MHz with the total estimated power consumption of 131 mW. The excellence of the generated random hardware key values of our proposed method is validated using NIST statistical test suites. The proposed design in this paper is considerably improved in terms of frequency, throughput performance and area consumed compared to existing design.
引用
收藏
页数:6
相关论文
共 25 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], 1997, Handbook of Applied Cryptography
[3]  
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[4]   Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions [J].
Deepthi, P. P. ;
Sathidevi, P. S. .
COMPUTERS & SECURITY, 2009, 28 (3-4) :229-241
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]  
Geetha G., 2008, 2008 1st International Conference on Emerging Trends in Engineering and Technology (ICETET), P1250, DOI 10.1109/ICETET.2008.119
[7]  
Gligoroski D., 2009, P 1 INT WORKSH SEC C, V22, P1
[8]   High-Performance Hardware Implementation for RC4 Stream Cipher [J].
Gupta, Sourav Sen ;
Chattopadhyay, Anupam ;
Sinha, Koushik ;
Maitra, Subhamoy ;
Sinha, Bhabani P. .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (04) :730-743
[9]  
Hamalainen P., 2000, Signal Processing X Theories and Applications. Proceedings of EUSIPCO 2000. Tenth European Signal Processing Conference, P2289
[10]  
Hu Alan J., 1999, P CAN C EL COMP ENG