An Evaluation Framework for Security Algorithms Performance Realization on FPGA

被引:0
作者
Guruprasad, S. P. [1 ]
Chandrasekar, B. S. [2 ]
机构
[1] Jain Univ, Dept ECE, Bangalore, Karnataka, India
[2] Jain Univ, CVLI, Bangalore, Karnataka, India
来源
2018 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC) | 2018年
关键词
AES; DES; LED; TDEA; FPGA; Security; S-Box; Encryption; Decryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security algorithms play a major role in most of the applications which include electronic gadgets, mobile banking, e-commerce, military, digital image processing, satellite & wireless communications, etc. The realization of the cryptography algorithm on FPGA is an open research problem to meet its benchmark to provide security essentials of confidentiality, integrity, and authentication in fast and accurate ways on future compact devices. This paper proposes an evaluation framework for realizing FPGA for cryptographic algorithms including DES, LED, TDES, AES-128, AES-192, and AES-256 with a symmetric key for both encipher and decipher. The framework is evaluated for its performance metrics of the area, operating frequency and power by hardware prototype architecture for these algorithms on Artix-7 FPGA device. The comparative analysis is presented for these metrics to get insights of its effectiveness on FPGA.
引用
收藏
页数:6
相关论文
共 11 条
[1]  
[Anonymous], 2001, FEDERAL INFORM PROCE, V197
[2]  
Barker WilliamC., 2008, RECOMMENDATION TRIPL
[3]  
Bosworth S, 2014, COMPUTER SECURITY HANDBOOK, 6TH EDITION, VOL 1, P1
[4]  
DATA ENCRYPTION STANDARD (DES), 1999, FIPS PUB
[5]  
Guo J, 2011, LECT NOTES COMPUT SC, V6917, P326, DOI 10.1007/978-3-642-23951-9_22
[6]  
Khose Pritamkumar N., 2015, PERV COMP ICPC 2015
[7]  
Neelam Rohit, 2016, ICT BUS IND GOV ICTB
[8]  
RajaRaja R., 2013, COMM SIGN PROC ICCSP
[9]  
Raza Mohammed Ahsan, 2014, EL COMP COMM TECHN I
[10]  
Srinivas NS Sai, 2016, EL EL OPT TECHN ICEE