SlideShare a Scribd company logo
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
Volume 5, Issue 1, Ver. II (Jan - Feb. 2015), PP 54-56
e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197
www.iosrjournals.org
DOI: 10.9790/4200-05125456 ww.iosrjournals.org 54 | Page
Compact High Speed Reconfigurable Hardware Implementation
of RC4 Stream Cipher
Priya Nagar1
, N.B.Hulle2
(Department of E&TC ,PG student G.H.Raisoni Institute of Engineering and Technology,Wagholi,Pune
University,Pune)
Abstract : RC4 Stream cipher is well known for its simplicity and ease to develop in software. But here, in the
proposed design we have heighlighted the modified hardware implémentation of RC4. As RC4 is the most
popular stream cipher. The proposed design performs reading and swapping simultaneously in one clock cycle.
The proposed design also highlights the adder part which enhances the architecture speed. As this design uses
fast Carry Look Ahead Adder as the adder logic. RC4 uses a variable length key from 1 to256 bytes to
initialize a256-byte array. The array is used for subsequent generation of pseudo-random bytes and then
generates a pseudorandom stream, which is XORed with the plaintext/cipher text to give the cipher
text/plaintext. The RC4 stream cipher works in two phases. The key setup phase and the pseudorandom key
stream generator phase. Both phases must be performed for every new key.
The RC4 algorithm will be implemented by FPGA using VHDL software platform.
Keywords: CLA, Clock, FPGA, KRAM, RC4,SRAM, Throughput
I. Introduction
Message secrecy is one of most important aspect of communication but especially in wireless
environment messages are highly insecure and encryption is must in such environment. The various encryption
algorithms are available but RC4 encryption algorithm is stream type and can be implemented in hardware and
software.The RC4 stream cipher is implemented in hardware by Sourav Sen Gupta1, Koushik Sinha2,
Subhamoy Maitra1, and Bhabani P. Sinha1 1 Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India
2 Honeywell Technology Solutions Lab, Bangalore 560 076, India and also by P. Kitsos, G. Kostopoulos, N.
Sklavos, and 0. Koufopavlou VLSI Design Laboratory, Electrical and Computer Engineering
Department,University of Patras, Patras, Greece. This hardware implementation is fast and reliable as compared
to software implementations and block ciphers algorithms. Here is the basic concept of RC4.RC4 is a stream
cipher and it can cipher individual units as they occur. It can cipher individual data elements immediately, as
they arrive. RC4 is a stream cipher signature, and can be identified by analysis of the design. So it takes less
time to generate the cipher text. RC4 algorithm uses stream cipher that is often used in application where
plaintext comes in quantities of unknown length. RC4 does not required block filling , so does not need block
padding, and does not need a padding removal structure. A particular RC4 algorithm key can be used only once.
As RC4 is an stream cipher which makes encryption faster than the other algorithms that uses block cipher. The
chance of losing the data in wireless transmission is very high, but RC4 algorithm can easily synchronize with
the transmission even if the data is lost. That is why RC4 is widely used in wireless networks. RC4 algorithm is
implemented in software, so the complexity is reduced & it is cheaper as the software can be easily changed
according to the requirements.
II. Methodology
Stream cipher as shown in Fig.1 , in which the first block indicates encryption phase and second block
indicates decryption phase. The transmitter encrypts plain text with key stream, which is generated by the key
stream generator with the private key i.e. distributed on secure channel. On the other hand, the receiver decrypts
the received cipher text with key stream which is generated by the key stream generator with the private key i.e.
also distributed on secure channel.
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
DOI: 10.9790/4200-05125456 ww.iosrjournals.org 55 | Page
Fig1. Block diagram of Stream Cipher
Fig.2 shows the block diagram of proposed modified RC4 algorithm which uses a variable key length from 1 to
256 bytes to initialize a 256 byte array. The array is used for subsequent generation of pseudo-random bytes and
then generates a pseudorandom stream, which is XORed with the plaintext / cipher text to give the cipher text /
plaintext.
Fig2. Block diagram of modified RC4
There are 256-byte arrays, S-Box and K-Box. The S-array is filled linearly such as S0=0, S1=1,
S2=2………..S256=256.
The K-array consists of the key, repeating as necessary times, in order to fill the array. The RC4 stream cipher
works in two phases. The key setup phase and pseudorandom key stream generator phase. Both phases must be
performed for every new key.
Key setup phase:
For i = 0 to 127
J = (j + S(i) + K(i) )
Swap S (i) and S (j).
Fig3(a). Key Setup Phase
RC4 uses two counters, i and j, which are initialized to zero. In the key setup phase the S-box is being modified
according to pseudo-code: nce the Key Setup is completed the second phase encrypts or decrypts a message.
The pseudorandom number generator (PRGN) phase is described by the following pseudo code:
Key stream generator phase:
i = i+1;
j = j+S (i)
Swap S (i) and S (j)
t = (S (i) +S (j))
K = S (t)
Fig3(b). Keystream generation Phase
The key stream K is XORed with the plaintext / cipher text to produce cipher text / plaintext.Recent
improvements make FPGAs increasingly suitable for cryptanalysis due to high density and high on chip
memory bandwidth. The proposed design is more effective as it uses less number of components than the
existing system[1]and [2]. This makes it more efficient and cheaper.
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
DOI: 10.9790/4200-05125456 ww.iosrjournals.org 56 | Page
In our proposed design swapping and reading is done simultaneously in a single clock cycle. While in
the existing design [1] swapping and reading are two separate tasks. The proposed design performs swapping
and reading simultaneously by using the two main concepts i.e. Loop Unrolling and hardware Pipelining while
the existing design [1] uses only the loop unrolling method. he already existing design [1] has used normal
adders while in the proposed design we have used fast Carry Look Ahead adders which not only optimizes the
area but also helps in increasing the encryption speed. Fast CLA is a new concept implemented in this paper.
Here Carry Look Ahead is implemented by using NAND gate instead of AND gate.
Fig4. Algorithm for RC4 Phases
III. Results
Device utilization summary:
Number of Slice Registers 4144 out of 207360 1%
Number of Slice LUTs 5689 out of 207360 2%
Number of fully used Bit Slices 2101 out of 7732 27%
Number of Bonded IOBs 143 out of 963 14%
Number of BUFG 2 out of 32 6%
Selected Device : 5vlx330tff1738-2 .
IV. Conclusions
In this paper hardware implementation of RC4 performing swapping and reading simultaneously in one
clock cycle is highlighted. The proposed design provides better result in terms of number of components used,
type of adder, methods of computation and number of clock cycle. The proposed design uses fewer components,
which is major advantage of this system. These ciphers were coded in VHDL language and synthesized in an
FPGA device.
References
[1]. One Byte per Clock: A Novel RC4 Hardware Sourav Sen Gupta1, Koushik Sinha2, Subhamoy Maitra1, and Bhabani P. Sinha1 1
Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India 2 Honeywell Technology Solutions Lab, Bangalore 560 076,
India.
[2]. P.kitsos, G. Kostopoulos, N. Sklavos and O.Koufopavlou “IEEE Std 802.11. IEEE Standard:Hardware implementation of the RC4
stream cipher”.
[3]. The Fastest Carry Lookahead Adder Yu-Ting Pai And Yu-Kumg Chen Department of Electronic Engineering Huafan University .
[4]. Design and analysis of 16-bit Full Adder using Spartan-3 FPGA Rongali Aneel Kumar, B.N. Srinivasa Rao, R. Prasad Rao Avanthi
Institute of Engineering and Technology, Visakhapatnam.
[5]. Fluhrer, I. Mantin, Shamir. "Weaknesses in the key scheduling algorithm of RC4 ". In Proc. 8ih Workshop on Selected Areas in
Cryptography, LNCS 2259. Springer-Verlag, 2001. pp. 231-237.
[6]. Comparison of the Hardware Implementation of Sdtream Ciphers: Michalis Galanis, Paris Kitsos, Giorgos Kostopoulos, Nicolas
Sklavos, and Costas Goutis Electrical and Computer Engineering Department, University of Patras, Greece.
[7]. Andrew S. Tanenbaum, “Computer Networks”, Fourth edition, Peaeson Education , 2005. pp. 292-302.
[8]. Douglas A. Pucknell, Kamran Eshraghian, “Basic VLSI design”, 3rd Edition, Prentice Hall of India, 2004. pp. 118-274.
[9]. Stephen Brown Zvonk Vransic, “Fundamentals of Digital Logic Design with VHDL”, Second editation, Tata Mcgraw Hill, 2005.
pp. 315-724.

More Related Content

PDF
Transfer of ut information from fpga through ethernet interface
PDF
IRJET- Secured LAN Network Topology of a Small Office with Redundancy
PPTX
High throughput implementations of cryptography algorithms on GPU and FPGA
PDF
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...
PDF
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
PDF
Introduction to OpenFlow
PDF
Design and Implementation of Phase Frequency Detector Using Different Logic G...
PDF
Introduction To Openflow
Transfer of ut information from fpga through ethernet interface
IRJET- Secured LAN Network Topology of a Small Office with Redundancy
High throughput implementations of cryptography algorithms on GPU and FPGA
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
Introduction to OpenFlow
Design and Implementation of Phase Frequency Detector Using Different Logic G...
Introduction To Openflow

What's hot (19)

DOC
Venkatesh_updated_Resume
PDF
Availability of US R&E network, viewpoint from IGP
PDF
Hari Krishna Vetsa Resume
DOC
Attachment 11 use of common analyzing and positioning tools
PDF
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
PPT
Sneak Peek into the Future with Prof. Indranil Sengupta, IIT Kharagpur
PDF
Mx2522172219
PDF
wd1-01-jaseel-madhusudan-pres-user
PPT
SSL basics and SSL packet analysis using wireshark
PPTX
Snug 2014 China
DOC
Mohammed Rashid CV
PPTX
Modern Software Architecture
PDF
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
PDF
Hardware trojan detection technique using side channel analysis for hardware ...
PPTX
Hardware Trojans By - Anupam Tiwari
PDF
Hardware Trojans
PDF
A Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
PPT
Open Programmability
PDF
IRJET- Design and Characteristics of LIZARD Stream Cipher IP Core
Venkatesh_updated_Resume
Availability of US R&E network, viewpoint from IGP
Hari Krishna Vetsa Resume
Attachment 11 use of common analyzing and positioning tools
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Sneak Peek into the Future with Prof. Indranil Sengupta, IIT Kharagpur
Mx2522172219
wd1-01-jaseel-madhusudan-pres-user
SSL basics and SSL packet analysis using wireshark
Snug 2014 China
Mohammed Rashid CV
Modern Software Architecture
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Hardware trojan detection technique using side channel analysis for hardware ...
Hardware Trojans By - Anupam Tiwari
Hardware Trojans
A Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
Open Programmability
IRJET- Design and Characteristics of LIZARD Stream Cipher IP Core
Ad

Similar to Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher (20)

PDF
An exhaustive review of the stream ciphers and their performance analysis
PDF
Mixed Scanning and DFT Techniques for Arithmetic Core
PDF
Parc4 i parallel implementation of
PDF
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
PDF
Design and implementation of 32 bit alu using verilog
PDF
Fpga implementation of 4 bit parallel cyclic redundancy code
PDF
Fpga based encryption design using vhdl
PDF
cd-2-Batch id-33
PDF
Dt32742746
DOC
PDF
Design and development of a 5-stage Pipelined RISC processor based on MIPS
DOCX
Punit_Shah_resume
DOCX
Punit_Shah_resume
DOCX
Punit_Shah_resume
PDF
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
PDF
Private Network Project for Colleges
PDF
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
PDF
JeanJacob
PDF
An effective RC4 Stream Cipher
PDF
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
An exhaustive review of the stream ciphers and their performance analysis
Mixed Scanning and DFT Techniques for Arithmetic Core
Parc4 i parallel implementation of
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
Design and implementation of 32 bit alu using verilog
Fpga implementation of 4 bit parallel cyclic redundancy code
Fpga based encryption design using vhdl
cd-2-Batch id-33
Dt32742746
Design and development of a 5-stage Pipelined RISC processor based on MIPS
Punit_Shah_resume
Punit_Shah_resume
Punit_Shah_resume
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
Private Network Project for Colleges
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
JeanJacob
An effective RC4 Stream Cipher
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
Ad

More from iosrjce (20)

PDF
An Examination of Effectuation Dimension as Financing Practice of Small and M...
PDF
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
PDF
Childhood Factors that influence success in later life
PDF
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
PDF
Customer’s Acceptance of Internet Banking in Dubai
PDF
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
PDF
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
PDF
Student`S Approach towards Social Network Sites
PDF
Broadcast Management in Nigeria: The systems approach as an imperative
PDF
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
PDF
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
PDF
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
PDF
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
PDF
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
PDF
Media Innovations and its Impact on Brand awareness & Consideration
PDF
Customer experience in supermarkets and hypermarkets – A comparative study
PDF
Social Media and Small Businesses: A Combinational Strategic Approach under t...
PDF
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
PDF
Implementation of Quality Management principles at Zimbabwe Open University (...
PDF
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Childhood Factors that influence success in later life
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Customer’s Acceptance of Internet Banking in Dubai
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Student`S Approach towards Social Network Sites
Broadcast Management in Nigeria: The systems approach as an imperative
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Media Innovations and its Impact on Brand awareness & Consideration
Customer experience in supermarkets and hypermarkets – A comparative study
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Implementation of Quality Management principles at Zimbabwe Open University (...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...

Recently uploaded (20)

PDF
Placing the Near-Earth Object Impact Probability in Context
PPTX
INTRODUCTION TO EVS | Concept of sustainability
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PDF
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
PDF
Sciences of Europe No 170 (2025)
PPTX
Introduction to Cardiovascular system_structure and functions-1
PPTX
Cell Membrane: Structure, Composition & Functions
PPTX
7. General Toxicologyfor clinical phrmacy.pptx
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PPTX
2. Earth - The Living Planet Module 2ELS
PPTX
Introduction to Fisheries Biotechnology_Lesson 1.pptx
DOCX
Viruses (History, structure and composition, classification, Bacteriophage Re...
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PPTX
Taita Taveta Laboratory Technician Workshop Presentation.pptx
PPTX
famous lake in india and its disturibution and importance
Placing the Near-Earth Object Impact Probability in Context
INTRODUCTION TO EVS | Concept of sustainability
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
Sciences of Europe No 170 (2025)
Introduction to Cardiovascular system_structure and functions-1
Cell Membrane: Structure, Composition & Functions
7. General Toxicologyfor clinical phrmacy.pptx
The KM-GBF monitoring framework – status & key messages.pptx
TOTAL hIP ARTHROPLASTY Presentation.pptx
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
2. Earth - The Living Planet Module 2ELS
Introduction to Fisheries Biotechnology_Lesson 1.pptx
Viruses (History, structure and composition, classification, Bacteriophage Re...
AlphaEarth Foundations and the Satellite Embedding dataset
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
Taita Taveta Laboratory Technician Workshop Presentation.pptx
famous lake in india and its disturibution and importance

Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher

  • 1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue 1, Ver. II (Jan - Feb. 2015), PP 54-56 e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197 www.iosrjournals.org DOI: 10.9790/4200-05125456 ww.iosrjournals.org 54 | Page Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher Priya Nagar1 , N.B.Hulle2 (Department of E&TC ,PG student G.H.Raisoni Institute of Engineering and Technology,Wagholi,Pune University,Pune) Abstract : RC4 Stream cipher is well known for its simplicity and ease to develop in software. But here, in the proposed design we have heighlighted the modified hardware implémentation of RC4. As RC4 is the most popular stream cipher. The proposed design performs reading and swapping simultaneously in one clock cycle. The proposed design also highlights the adder part which enhances the architecture speed. As this design uses fast Carry Look Ahead Adder as the adder logic. RC4 uses a variable length key from 1 to256 bytes to initialize a256-byte array. The array is used for subsequent generation of pseudo-random bytes and then generates a pseudorandom stream, which is XORed with the plaintext/cipher text to give the cipher text/plaintext. The RC4 stream cipher works in two phases. The key setup phase and the pseudorandom key stream generator phase. Both phases must be performed for every new key. The RC4 algorithm will be implemented by FPGA using VHDL software platform. Keywords: CLA, Clock, FPGA, KRAM, RC4,SRAM, Throughput I. Introduction Message secrecy is one of most important aspect of communication but especially in wireless environment messages are highly insecure and encryption is must in such environment. The various encryption algorithms are available but RC4 encryption algorithm is stream type and can be implemented in hardware and software.The RC4 stream cipher is implemented in hardware by Sourav Sen Gupta1, Koushik Sinha2, Subhamoy Maitra1, and Bhabani P. Sinha1 1 Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India 2 Honeywell Technology Solutions Lab, Bangalore 560 076, India and also by P. Kitsos, G. Kostopoulos, N. Sklavos, and 0. Koufopavlou VLSI Design Laboratory, Electrical and Computer Engineering Department,University of Patras, Patras, Greece. This hardware implementation is fast and reliable as compared to software implementations and block ciphers algorithms. Here is the basic concept of RC4.RC4 is a stream cipher and it can cipher individual units as they occur. It can cipher individual data elements immediately, as they arrive. RC4 is a stream cipher signature, and can be identified by analysis of the design. So it takes less time to generate the cipher text. RC4 algorithm uses stream cipher that is often used in application where plaintext comes in quantities of unknown length. RC4 does not required block filling , so does not need block padding, and does not need a padding removal structure. A particular RC4 algorithm key can be used only once. As RC4 is an stream cipher which makes encryption faster than the other algorithms that uses block cipher. The chance of losing the data in wireless transmission is very high, but RC4 algorithm can easily synchronize with the transmission even if the data is lost. That is why RC4 is widely used in wireless networks. RC4 algorithm is implemented in software, so the complexity is reduced & it is cheaper as the software can be easily changed according to the requirements. II. Methodology Stream cipher as shown in Fig.1 , in which the first block indicates encryption phase and second block indicates decryption phase. The transmitter encrypts plain text with key stream, which is generated by the key stream generator with the private key i.e. distributed on secure channel. On the other hand, the receiver decrypts the received cipher text with key stream which is generated by the key stream generator with the private key i.e. also distributed on secure channel.
  • 2. Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher DOI: 10.9790/4200-05125456 ww.iosrjournals.org 55 | Page Fig1. Block diagram of Stream Cipher Fig.2 shows the block diagram of proposed modified RC4 algorithm which uses a variable key length from 1 to 256 bytes to initialize a 256 byte array. The array is used for subsequent generation of pseudo-random bytes and then generates a pseudorandom stream, which is XORed with the plaintext / cipher text to give the cipher text / plaintext. Fig2. Block diagram of modified RC4 There are 256-byte arrays, S-Box and K-Box. The S-array is filled linearly such as S0=0, S1=1, S2=2………..S256=256. The K-array consists of the key, repeating as necessary times, in order to fill the array. The RC4 stream cipher works in two phases. The key setup phase and pseudorandom key stream generator phase. Both phases must be performed for every new key. Key setup phase: For i = 0 to 127 J = (j + S(i) + K(i) ) Swap S (i) and S (j). Fig3(a). Key Setup Phase RC4 uses two counters, i and j, which are initialized to zero. In the key setup phase the S-box is being modified according to pseudo-code: nce the Key Setup is completed the second phase encrypts or decrypts a message. The pseudorandom number generator (PRGN) phase is described by the following pseudo code: Key stream generator phase: i = i+1; j = j+S (i) Swap S (i) and S (j) t = (S (i) +S (j)) K = S (t) Fig3(b). Keystream generation Phase The key stream K is XORed with the plaintext / cipher text to produce cipher text / plaintext.Recent improvements make FPGAs increasingly suitable for cryptanalysis due to high density and high on chip memory bandwidth. The proposed design is more effective as it uses less number of components than the existing system[1]and [2]. This makes it more efficient and cheaper.
  • 3. Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher DOI: 10.9790/4200-05125456 ww.iosrjournals.org 56 | Page In our proposed design swapping and reading is done simultaneously in a single clock cycle. While in the existing design [1] swapping and reading are two separate tasks. The proposed design performs swapping and reading simultaneously by using the two main concepts i.e. Loop Unrolling and hardware Pipelining while the existing design [1] uses only the loop unrolling method. he already existing design [1] has used normal adders while in the proposed design we have used fast Carry Look Ahead adders which not only optimizes the area but also helps in increasing the encryption speed. Fast CLA is a new concept implemented in this paper. Here Carry Look Ahead is implemented by using NAND gate instead of AND gate. Fig4. Algorithm for RC4 Phases III. Results Device utilization summary: Number of Slice Registers 4144 out of 207360 1% Number of Slice LUTs 5689 out of 207360 2% Number of fully used Bit Slices 2101 out of 7732 27% Number of Bonded IOBs 143 out of 963 14% Number of BUFG 2 out of 32 6% Selected Device : 5vlx330tff1738-2 . IV. Conclusions In this paper hardware implementation of RC4 performing swapping and reading simultaneously in one clock cycle is highlighted. The proposed design provides better result in terms of number of components used, type of adder, methods of computation and number of clock cycle. The proposed design uses fewer components, which is major advantage of this system. These ciphers were coded in VHDL language and synthesized in an FPGA device. References [1]. One Byte per Clock: A Novel RC4 Hardware Sourav Sen Gupta1, Koushik Sinha2, Subhamoy Maitra1, and Bhabani P. Sinha1 1 Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India 2 Honeywell Technology Solutions Lab, Bangalore 560 076, India. [2]. P.kitsos, G. Kostopoulos, N. Sklavos and O.Koufopavlou “IEEE Std 802.11. IEEE Standard:Hardware implementation of the RC4 stream cipher”. [3]. The Fastest Carry Lookahead Adder Yu-Ting Pai And Yu-Kumg Chen Department of Electronic Engineering Huafan University . [4]. Design and analysis of 16-bit Full Adder using Spartan-3 FPGA Rongali Aneel Kumar, B.N. Srinivasa Rao, R. Prasad Rao Avanthi Institute of Engineering and Technology, Visakhapatnam. [5]. Fluhrer, I. Mantin, Shamir. "Weaknesses in the key scheduling algorithm of RC4 ". In Proc. 8ih Workshop on Selected Areas in Cryptography, LNCS 2259. Springer-Verlag, 2001. pp. 231-237. [6]. Comparison of the Hardware Implementation of Sdtream Ciphers: Michalis Galanis, Paris Kitsos, Giorgos Kostopoulos, Nicolas Sklavos, and Costas Goutis Electrical and Computer Engineering Department, University of Patras, Greece. [7]. Andrew S. Tanenbaum, “Computer Networks”, Fourth edition, Peaeson Education , 2005. pp. 292-302. [8]. Douglas A. Pucknell, Kamran Eshraghian, “Basic VLSI design”, 3rd Edition, Prentice Hall of India, 2004. pp. 118-274. [9]. Stephen Brown Zvonk Vransic, “Fundamentals of Digital Logic Design with VHDL”, Second editation, Tata Mcgraw Hill, 2005. pp. 315-724.