An area optimized implementation of cryptographic algorithm RC5

被引:0
|
作者
Liang, Jing [1 ]
Wang, Qin [1 ]
Qi, Yue [1 ]
Yu, Feng [1 ]
机构
[1] Univ Sci & Technol Beijing, Dept Comp Sci & Technol, Beijing 100083, Peoples R China
来源
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8 | 2009年
关键词
Data-dependant shift; RC5; Functional Unit;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a widely used symmetrical block cryptographic algorithm, RC5 has the characteristic of variable block length, variable round number and variable key length to satisfy the security need of different application environment. This paper presents an area efficient and reconfigurable hardware circuit. Using loop unrolling technology, the hardware circuit costs less resources by 74.7% compared to the conventional area optimized implementation of RC5 algorithm.
引用
收藏
页码:4585 / 4588
页数:4
相关论文
共 50 条
  • [1] Area optimized architecture and VLSI implementation of RC5 encryption algorithm
    Sklavos, N
    Machas, C
    Koufopavlou, O
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 172 - 175
  • [2] FPGA Design & Implementation of optimized RC5 Block Cipher
    Acharya, Lomash Chandra
    Purohit, Jyoti Prakash
    Bairwa, Surendra Kumar
    Kumawat, Harish Chandra
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 360 - 365
  • [3] THE RC5 ENCRYPTION ALGORITHM
    RIVEST, RL
    DR DOBBS JOURNAL, 1995, 20 (01): : 146 - &
  • [4] Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm
    Bertoni, G
    Breveglieri, L
    Koren, I
    Maistri, P
    Piuri, V
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 423 - 432
  • [5] On differential and linear cryptanalysis of the RC5 encryption algorithm
    Kaliski, BS
    Yin, YL
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 171 - 184
  • [6] Implementation of the Enhanced RC5 (ERC5) Algorithm in an RFID-based Payment Scheme
    Villanueva, Excel B.
    Gerardo, Bobby D.
    Medina, Ruji P.
    2018 2ND INTERNATIONAL CONFERENCE ON BUSINESS AND INFORMATION MANAGEMENT (ICBIM 2018), 2018, : 6 - 10
  • [7] Performance evaluation of different hardware models of RC5 algorithm
    Elkeelany, Omar
    Nimmagadda, Suman
    PROCEEDINGS OF THE THIRTY-NINTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2007, : 124 - +
  • [8] A timing attack on RC5
    Handschuh, H
    Heys, HM
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 306 - 318
  • [9] Differential cryptanalysis of RC5
    Knudsen, LR
    Meier, W
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1997, 8 (05): : 445 - 454
  • [10] Improved cryptanalysis of RC5
    Biryukov, A
    Kushilevitz, E
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 85 - 99