SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 1, Ver. II (Jan.-Feb. 2017), PP 54-59
www.iosrjournals.org
DOI: 10.9790/2834-1201025459 www.iosrjournals.org 54 | Page
A Survey on Various Lightweight Cryptographic Algorithms on
FPGA
Chaitra B1
, Kiran Kumar.V.1
, Shatharama Rai C2
1
(Electronics & Communication Engineering, Sahyadri College of Engineering& Management, India)
1
(Associate Professor Electronics & Communication Engineering, Sahyadri College of Engineering &
Management, India)
2
(Principal,, AJ Institute of Engineering &Technology, Mangaluru, India)
Abstract : In today’s rapid growing technology, digital data are exchanged very frequently in seamless
wireless networks. Some of the real time applications examples which are transmitted quickly are voice, video,
images and text but not limited to high sensitive information like transaction of creditcard, banking and
confidential security numbers/data. Thus protection of confidential data is required with high security to avoid
unauthorised access to Wireless networks. This can be done by a technique called ‘Cryptograhy’ and there are
two crytography techniques available (such as symmetrical & asymmetrical techniques). The focus in this paper
would be on Lightweight symmetric crytography. Lightweight cryptography is used for resource-limited devices
such as radio frequency identification (RFID) tags, contactless smart cards and wireless sensor network. In this
paper comparative study of selected lightweight symmetric block ciphers such as AES, PRESENT, TEA and
HUMMINGBIRD is presented.
Keywords: LFSR, Keys, Encryption
Introduction
Cryptography is an art of security technique where messages are encoded in a non-readable form. In
simple words, it is nothing but a technique used in the protection of data during the transmission from sender to
receiver and unauthorized access is denied. Therefore, security and confidentiality is very much required in this
aspect. The focus and discussion in this paper would be on various techniques of “Lightweight Cryptography
(LWC)” and analyzing which would be the best methodology. Lightweight Cryptography is one of the emerging
research areas in cryptography. This covers cryptographic algorithms intended for use in devices with low or
extremely low resources. Thus, it is used in RFID tags, contactless smart cards, sensors etc. Lightweight
cryptography does not determine strict criteria for classifying a cryptographic algorithm as lightweight, but the
common features of lightweight algorithms are extremely low requirements to essential resources of target
devices. Considering area and energy consumption are the important measures to evaluate the LWC properties.
Also, we highlight some constraints and recommendations of lightweight algorithms.
We will discuss some of the methodology of various Lightweight cryptographic algorithms below.
I. AES
AES is a better choice for many block ciphers. It can be used with the higher level of security
throughput with less area. AES was developed by two scientists Joan and Vincent Rijmen in 2000. It is a
symmetric block cipher with a block size of 128 bits and Key lengths can be 128 bits, 192 bits, or 256 bits called
AES-128, AES-192, and AES-256, respectively. AES-128 uses 10 rounds, AES-192 uses 12 rounds, and AES-
256 uses 14 rounds. AES is a symmetric block cipher it uses four steps of operation. The last round consists of
only 3 steps.
1.1 Sub Bytes
1.2 Shift Rows
1.3 Mix Columns
1.4 AddRoundKey
1.1 Sub byte: It is the byte substitution on the input data; each byte in the array is updated using an 8-bit
substitution box, called as Rijndael S-box. The S-box used is derived from the multiplicative inverse over gf
(2^8), known to have good non-linearity properties. The affine transformation is used to generate the Sub Box,
which is the lookup table from which the values are substituted. The procedure to be followed to substitute the
bytes in the matrix is:
1.1.1 Select any element says i, j which is in hexadecimal notation.
1.1.2 The S-box element in the i th row and j th column is to be selected and substituted in its place.
1.2 Shift rows: It involves rotating the rows of the input matrix circularly upwards.
A survey on various lightweight cryptographic algorithms on FPGA
DOI: 10.9790/2834-1201025459 www.iosrjournals.org 55 | Page
1.3 Mix column: Modulo Matrix Multiplication of the input matrix with the data matrix.
1.4 Add round key: This is a transformation bitwise XOR operation that combines the current state data block
and the round key.
Fig 1. AES Implementation
Key Generation Algorithm:
Each round key array is generated as the product of previous round key. In the sequence of 11 keys we need a
matrix of 4 rows and 44 columns.
1. Generating the columns C4m: On the hardware scale, it can be implemented by shift registers for Rotation
Word Transformation whereas the Substitution bytes’ transformation will be implemented by a ROM module
with the S-box as look up table and XOR gates for the addition
W (I) =W (I-4) XORW (I-1) I is not a multiple of 4
2. Generating the Columns C4m+1; 4m+2; 4m+3 this on the hardware scale can be implemented using XOR
gates alone and registers to store the values.
W (I) =W (i-4) XORT (W (I-1)) I is a multiple of 4.
II. Present
Every design of the lightweight cryptography must suit better security, efficiency and minimum cost.
PRESENT is such a hardware-computed ultra-lightweight block cipher designed to achieve less area and
power constraints. It is best suitable SPN (substitution permutation network) structure. It has a 64-bit block size
80 or 128-bit key size and performs 31 rounds. Each round consists 3 steps they are Add round key,
Substitution, and permutation.
2.1. In the first step XOR operation of plain text and key takes place.
2.2. The result is then Substituted Using S-box. The substitution layer consists of 16 S-Boxes that each has 4-bit
input and 4-bit output (4x4). The S-Box is given in hexadecimal notation shown in the Table 1.
2.3. The outcome is applied to Permutation Using P-layer. Bit iof STATE is moved to bit position P (i).
A survey on various lightweight cryptographic algorithms on FPGA
DOI: 10.9790/2834-1201025459 www.iosrjournals.org 56 | Page
The P box is shown in the Table 2.
Table 1: S box layer of PRESENT
X 0 1 2 3 4 5 6 7 8 9 A B C D E F
S[x] C 5 6 B 9 0 A D 3 E F 8 4 7 1 2
Table 2: Permutation layer of PRESENT
i P(i) i P(i) i P(i) i P(i) i P(i) i P(i) i P(i) i P(i)
0 0 8 2 16 4 24 6 32 8 40 10 48 12 56 14
1 16 9 18 17 20 25 22 33 24 41 26 49 28 57 30
2 32 10 34 18 36 26 38 34 40 42 42 50 44 58 46
3 48 11 50 19 52 27 54 35 56 43 58 51 60 59 62
4 1 12 3 20 5 28 7 36 9 44 11 52 13 60 15
5 17 13 19 21 21 29 23 37 25 45 27 53 29 61 31
6 33 14 35 22 37 30 39 38 41 46 43 54 45 62 49
7 49 15 51 23 53 31 55 39 57 47 59 55 61 63 63
Key schedule:
Present can take keys of either 80 or 128 bits they are referred as PRESENT-80 and PRESENT-128. In this
paper we focuson 80-bit keys are represented as k79, k78 . . . k0 and they are stored in key register K. At round
i the 64-bit round key Ki = k63k62 . . . k0 consists of the 64 leftmost bits of the current contents of register K.
Thus at round i we have Ki = k63k62 . . . k0 = k79k78 . . . k16 will be extracted then key register K = k79k78 . .
. k0 is updated as
1. Key register is rotated by 61 positions to the left. [K79k78 . . . k1k0] = [k18k17 . . . k20k19]
2. The left most four bits are passed through the present S-box [k79k78k77k76] = S [k79k78k77k76]
3. The round counter value is exclusive ORed with bits of K with least significant bit of round counter on the
right.
[k19k18k17k16k15] = [k19k18k17k16k15] round counter.
Fig 2. block diagram of present cipher
A survey on various lightweight cryptographic algorithms on FPGA
DOI: 10.9790/2834-1201025459 www.iosrjournals.org 57 | Page
III. TEA
Both security and simplicity of implementation is equally important and hence TEA is an excellent
choice in cryptography. The Tiny Encryption Algorithm is block cipher and it is simpler as a few lines of the
code. It is fast, secure and simple in description and implementation than IDEA even though it uses same
algebraic mixed group’s technique. As the confidentiality of the data is more important TEA is secure and needs
minimal storage space. Tea is highly resistant to differential cryptanalysis and achieves complete diffusion. The
cipher was developed by Wheeler and Needham in 1994.
The TEA takes 64 bit (block size) data bits using 128 bit keys with 32 rounds. This cipher starts with a
64 bit data block that is split up into two 32 bit blocks in which the block on the left side is called as L and the
block on the right side is called as R. These blocks are swapped per Round.
Key schedule:
128 bit key is split into four 32 bit sub key Ki where i= 0 to 3 and it uses delta, delta is defined as a constant,
2^32/ (golden ratio), which is 2654435769 as an integer. Multiples of delta are used in each round (mod
2^32).All addition operations are mod 2^32.
3.1. The one half P1 [i-1] say R goes through a left shift of 4 and then is added to K [0]
3.2. R is added to Delta
3.3. R goes through a right shift of 5 and then is added to K [1]
An XOR operation is then applied to the result of those three operations and finally, the result of
The XOR operation is added to L (P0 [i-1]).it produces the half of the block cipher for the next round. Similar
operations are performed for the next half round P0 [i-1] function.
Fig 3. TEA implementation
A survey on various lightweight cryptographic algorithms on FPGA
DOI: 10.9790/2834-1201025459 www.iosrjournals.org 58 | Page
IV. Hummingbird
It is important to realize that ultra-lightweight cryptographic algorithm Hummingbird, is designed for
resource-constrained devices. The design of the Hummingbird cryptographic algorithm is motivated by the well-
known Enigma machine taking into consideration of both security and efficiency. It is the combined block
cipher and stream cipher. It has 16 bit block size, 256 bit key size and 80 bit internal state.
The 16-bit plain text is PTi and the first internal state register RS1.First step in the encryption is mod
2^16 addition of plain text and the content of internal state register. It is encrypted by the first block cipher
EK1.That is achieved by Ex-OR operation of added result with key followed by the substitution and
permutation. The procedure of encryption is repeated 3 times and the output EK4 is corresponding cipher text
CTi.
The states of the four internal state registers will also be updated in an unpredictable way based on their
current states, the outputs of the first three blocks and the state of the LFSR.
Fig 4. hummingbird encryption process.
A survey on various lightweight cryptographic algorithms on FPGA
DOI: 10.9790/2834-1201025459 www.iosrjournals.org 59 | Page
Comparison:
Table 3. Comparison between Different Types of Lightweight Cryptographic Algorithms
Conclusion
In today’s wireless network world LWC plays an important role with resource constraint devices in
providing security. There are different methodologies of LWC where each methodology has its own properties
and compared in the table. Analyzing the comparison of algorithms- AES, PRESENT, TEA, HUMMINGBIRD,
it is shows that PRESENT has higher efficiency, less area and power consumption, thereby reducing cost. This
algorithm also provides adequate security and also to mention that PRESENT uses 31 rounds for 256 block
size.It is more applicable for as cryptographic algorithm for resource constrained devices.
Reference
[1]. “VLSI design of secure cryptographic algorithm”, Revini s. shende, Mrs. Anagha y. Deshpande, International Journal of
Engineering research & applications (IJERA) Vol. 3 March-April 2013.
[2]. “A Survey on Various Cryptography Analysis”by Mitali, Vijay Kumar and Arvind Sharma, Volume 3, Issue 4, July-August 2014.
[3]. “Encryption Using Different Techniques” by Dimple1 - Vol. 2, No.1, January-February-2013.
[4]. “Image Encryption using Different Techniques for High Security Transmission over a Network”, by Mohammad Sajid, Qamruddin
Khizrai, Prof. S.T. Bodkhe - Volume 2, Issue 4, June-July, 2014.
[5]. Amrutha k, Jayachandra Naidu V., “Advanced Encryption Standard Algorithm Implementation Using Verilog HDL” Vol. 04,
Article 06117; July 2013.
[6]. Sergey panasenko, Sergey smagin by” Lightweight cryptography: Underlying Principles & Approaches”, International Journal of
Computer Theory & Engineering, Vol. 3, No. 4 August 2011.
[7]. Kiran Kumar V.G., Sudesh Jeevan Mascarenhas, Sanath Kumar, Rakesh J Paris, “Design and Implementation of Tiny Encryption
Algorithm” Vol. 5, Issue 2, June 2015.
[8]. A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An
Ultra-Lightweight Block Cipher”.
[9]. Mohamad Sbeiti, Michael Silbermann, Axel Poschmann, Christof Paar., “Design Space Exploration of Present Implementation For
FPGA”.
[10]. Thomas Eisenbarth, Christof Paar and Axel Poschmann, Sandeep Kumar, Leif Uhsadel “A Survey of Lightweight-Cryptography
Implementations”.
[11]. “Design and simulation of AES algorithm- Encryption using VHDL” Mital Maheta, 2014 IJEDR Volume 2, Issue1, 2014.
[12]. “Study of Hummingbird Cryptographic Algorithms based on FPGA implementation”, by Reena Bhatiya, IJCSIT, International
Journal of computer Science & Information Technologies, Vol. 5(3),2014.
0
500
1000
1500
Cipher Key Size FPGA Device Throughput Slices(GEs) Efficiency
PRESENT - 80 80 Spartan3XC35400 516 176 2.93
PRESENT - 128 128 Spartan3XC35400 508 202 2.51
TEA 128 Spartan3XC35200 19.52 1140 0.017
AES 256 Spartan-II XC2S30-6 166 522 0.32
HUMMINGBIRD 256 Spartan3XC3S200-5 160.4 273 0.59

More Related Content

PDF
Implementation of Various Cryptosystem Using Chaos
PDF
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Design of area optimized aes encryption core using pipelining technology
PDF
Lecture 01 dld 2018
PPT
Digital Logic Design
PPTX
Digital electronics nandhini kusuma
PDF
Logic Design
Implementation of Various Cryptosystem Using Chaos
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
International Journal of Engineering Research and Development (IJERD)
Design of area optimized aes encryption core using pipelining technology
Lecture 01 dld 2018
Digital Logic Design
Digital electronics nandhini kusuma
Logic Design

What's hot (20)

PPTX
VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption
PDF
Synthesized report on the comparison of lut and splitting method for decrypti...
PDF
Design and Implementation A different Architectures of mixcolumn in FPGA
PPTX
DLD Presentation By Team Reboot,Rafin Rayan,EUB
PPTX
dld 01-introduction
PDF
Design And Implementation Of Tiny Encryption Algorithm
PPTX
Two fish & Rijndael (AES) Encryption Algorithm
PDF
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
PDF
Chapter 2 ee202 boolean part a
PDF
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCET
PDF
IRJET - Multi-Key Privacy in Cloud Computing
PDF
An Efficient Design for Data Encryption and Decryption using Reconfigurable R...
PDF
SHA 1 Algorithm
PPT
Digital logic design part1
PDF
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
PPT
Logic design and switching theory
PPTX
Twofish algo
PPTX
Parallel adders
PPTX
Computer Arithmetic
PDF
40120130406011 2-3
VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption
Synthesized report on the comparison of lut and splitting method for decrypti...
Design and Implementation A different Architectures of mixcolumn in FPGA
DLD Presentation By Team Reboot,Rafin Rayan,EUB
dld 01-introduction
Design And Implementation Of Tiny Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Chapter 2 ee202 boolean part a
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCET
IRJET - Multi-Key Privacy in Cloud Computing
An Efficient Design for Data Encryption and Decryption using Reconfigurable R...
SHA 1 Algorithm
Digital logic design part1
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
Logic design and switching theory
Twofish algo
Parallel adders
Computer Arithmetic
40120130406011 2-3
Ad

Similar to A Survey on Various Lightweight Cryptographic Algorithms on FPGA (20)

PDF
Chapter 3-block-cipher-des1
PDF
icwet1097
PDF
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
PDF
Performance Analysis of New Light Weight Cryptographic Algorithms
PPTX
Stream Ciphers and Block Ciphers in Security.pptx
PDF
chap3.pdf
PDF
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
PDF
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
PDF
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
PDF
IP Core Design of Hight Lightweight Cipher and its Implementation
PDF
PDF
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
PDF
Hardware implementation of aes encryption and decryption for low area & power...
PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
PDF
Hardware implementation of the serpent block cipher using fpga technology
PPTX
Cryptographic algorithms
PPTX
Cryptographic algorithms
PDF
Js2517181724
PDF
Js2517181724
PDF
G029037043
Chapter 3-block-cipher-des1
icwet1097
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
Performance Analysis of New Light Weight Cryptographic Algorithms
Stream Ciphers and Block Ciphers in Security.pptx
chap3.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP Core Design of Hight Lightweight Cipher and its Implementation
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Hardware implementation of aes encryption and decryption for low area & power...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Hardware implementation of the serpent block cipher using fpga technology
Cryptographic algorithms
Cryptographic algorithms
Js2517181724
Js2517181724
G029037043
Ad

More from IOSRJECE (20)

PDF
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
PDF
Multi Slot Uwb Antennas to Minimize the Interferences from Wlan & X-Band Appl...
PDF
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...
PDF
Vehicle security system using ARM controller
PDF
Performance evaluation of full adder
PDF
Wireless/Wired Automatic Switched Plasma Tweeter & Speaker System
PDF
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash Adc
PDF
Performance Analysis of Low Loss Gas Filled Hollow Core Photonic Crystal Fibe...
PDF
Design of Counter Using SRAM
PDF
Detection of Type-B Artifacts in VEPs using Median Deviation Algorithm
PDF
Design High Performance Combinational Circuits Using Output Prediction Logic-...
PDF
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
PDF
VANET based Intelligent TransportationSystem using Li-Fi technology
PDF
An Even Data-Distribution Protocolfor Highly Dynamic VANET
PDF
Performance Investigation and Enhancement of Fiber Bragg Gratingfor Efficient...
PDF
Surface Plasmon Modes of Dielectric-Metal-Dielectric Waveguides and Applications
PDF
Performance Analysis of Optical Amplifiers (EDFA and SOA)
PDF
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
PDF
Study of RF-MEMS Capacitive Shunt Switch for Microwave Backhaul Applications
PDF
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Multi Slot Uwb Antennas to Minimize the Interferences from Wlan & X-Band Appl...
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...
Vehicle security system using ARM controller
Performance evaluation of full adder
Wireless/Wired Automatic Switched Plasma Tweeter & Speaker System
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash Adc
Performance Analysis of Low Loss Gas Filled Hollow Core Photonic Crystal Fibe...
Design of Counter Using SRAM
Detection of Type-B Artifacts in VEPs using Median Deviation Algorithm
Design High Performance Combinational Circuits Using Output Prediction Logic-...
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
VANET based Intelligent TransportationSystem using Li-Fi technology
An Even Data-Distribution Protocolfor Highly Dynamic VANET
Performance Investigation and Enhancement of Fiber Bragg Gratingfor Efficient...
Surface Plasmon Modes of Dielectric-Metal-Dielectric Waveguides and Applications
Performance Analysis of Optical Amplifiers (EDFA and SOA)
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
Study of RF-MEMS Capacitive Shunt Switch for Microwave Backhaul Applications
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Digital Logic Computer Design lecture notes
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
composite construction of structures.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Lecture Notes Electrical Wiring System Components
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
bas. eng. economics group 4 presentation 1.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Digital Logic Computer Design lecture notes
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
composite construction of structures.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
additive manufacturing of ss316l using mig welding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
OOP with Java - Java Introduction (Basics)

A Survey on Various Lightweight Cryptographic Algorithms on FPGA

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 1, Ver. II (Jan.-Feb. 2017), PP 54-59 www.iosrjournals.org DOI: 10.9790/2834-1201025459 www.iosrjournals.org 54 | Page A Survey on Various Lightweight Cryptographic Algorithms on FPGA Chaitra B1 , Kiran Kumar.V.1 , Shatharama Rai C2 1 (Electronics & Communication Engineering, Sahyadri College of Engineering& Management, India) 1 (Associate Professor Electronics & Communication Engineering, Sahyadri College of Engineering & Management, India) 2 (Principal,, AJ Institute of Engineering &Technology, Mangaluru, India) Abstract : In today’s rapid growing technology, digital data are exchanged very frequently in seamless wireless networks. Some of the real time applications examples which are transmitted quickly are voice, video, images and text but not limited to high sensitive information like transaction of creditcard, banking and confidential security numbers/data. Thus protection of confidential data is required with high security to avoid unauthorised access to Wireless networks. This can be done by a technique called ‘Cryptograhy’ and there are two crytography techniques available (such as symmetrical & asymmetrical techniques). The focus in this paper would be on Lightweight symmetric crytography. Lightweight cryptography is used for resource-limited devices such as radio frequency identification (RFID) tags, contactless smart cards and wireless sensor network. In this paper comparative study of selected lightweight symmetric block ciphers such as AES, PRESENT, TEA and HUMMINGBIRD is presented. Keywords: LFSR, Keys, Encryption Introduction Cryptography is an art of security technique where messages are encoded in a non-readable form. In simple words, it is nothing but a technique used in the protection of data during the transmission from sender to receiver and unauthorized access is denied. Therefore, security and confidentiality is very much required in this aspect. The focus and discussion in this paper would be on various techniques of “Lightweight Cryptography (LWC)” and analyzing which would be the best methodology. Lightweight Cryptography is one of the emerging research areas in cryptography. This covers cryptographic algorithms intended for use in devices with low or extremely low resources. Thus, it is used in RFID tags, contactless smart cards, sensors etc. Lightweight cryptography does not determine strict criteria for classifying a cryptographic algorithm as lightweight, but the common features of lightweight algorithms are extremely low requirements to essential resources of target devices. Considering area and energy consumption are the important measures to evaluate the LWC properties. Also, we highlight some constraints and recommendations of lightweight algorithms. We will discuss some of the methodology of various Lightweight cryptographic algorithms below. I. AES AES is a better choice for many block ciphers. It can be used with the higher level of security throughput with less area. AES was developed by two scientists Joan and Vincent Rijmen in 2000. It is a symmetric block cipher with a block size of 128 bits and Key lengths can be 128 bits, 192 bits, or 256 bits called AES-128, AES-192, and AES-256, respectively. AES-128 uses 10 rounds, AES-192 uses 12 rounds, and AES- 256 uses 14 rounds. AES is a symmetric block cipher it uses four steps of operation. The last round consists of only 3 steps. 1.1 Sub Bytes 1.2 Shift Rows 1.3 Mix Columns 1.4 AddRoundKey 1.1 Sub byte: It is the byte substitution on the input data; each byte in the array is updated using an 8-bit substitution box, called as Rijndael S-box. The S-box used is derived from the multiplicative inverse over gf (2^8), known to have good non-linearity properties. The affine transformation is used to generate the Sub Box, which is the lookup table from which the values are substituted. The procedure to be followed to substitute the bytes in the matrix is: 1.1.1 Select any element says i, j which is in hexadecimal notation. 1.1.2 The S-box element in the i th row and j th column is to be selected and substituted in its place. 1.2 Shift rows: It involves rotating the rows of the input matrix circularly upwards.
  • 2. A survey on various lightweight cryptographic algorithms on FPGA DOI: 10.9790/2834-1201025459 www.iosrjournals.org 55 | Page 1.3 Mix column: Modulo Matrix Multiplication of the input matrix with the data matrix. 1.4 Add round key: This is a transformation bitwise XOR operation that combines the current state data block and the round key. Fig 1. AES Implementation Key Generation Algorithm: Each round key array is generated as the product of previous round key. In the sequence of 11 keys we need a matrix of 4 rows and 44 columns. 1. Generating the columns C4m: On the hardware scale, it can be implemented by shift registers for Rotation Word Transformation whereas the Substitution bytes’ transformation will be implemented by a ROM module with the S-box as look up table and XOR gates for the addition W (I) =W (I-4) XORW (I-1) I is not a multiple of 4 2. Generating the Columns C4m+1; 4m+2; 4m+3 this on the hardware scale can be implemented using XOR gates alone and registers to store the values. W (I) =W (i-4) XORT (W (I-1)) I is a multiple of 4. II. Present Every design of the lightweight cryptography must suit better security, efficiency and minimum cost. PRESENT is such a hardware-computed ultra-lightweight block cipher designed to achieve less area and power constraints. It is best suitable SPN (substitution permutation network) structure. It has a 64-bit block size 80 or 128-bit key size and performs 31 rounds. Each round consists 3 steps they are Add round key, Substitution, and permutation. 2.1. In the first step XOR operation of plain text and key takes place. 2.2. The result is then Substituted Using S-box. The substitution layer consists of 16 S-Boxes that each has 4-bit input and 4-bit output (4x4). The S-Box is given in hexadecimal notation shown in the Table 1. 2.3. The outcome is applied to Permutation Using P-layer. Bit iof STATE is moved to bit position P (i).
  • 3. A survey on various lightweight cryptographic algorithms on FPGA DOI: 10.9790/2834-1201025459 www.iosrjournals.org 56 | Page The P box is shown in the Table 2. Table 1: S box layer of PRESENT X 0 1 2 3 4 5 6 7 8 9 A B C D E F S[x] C 5 6 B 9 0 A D 3 E F 8 4 7 1 2 Table 2: Permutation layer of PRESENT i P(i) i P(i) i P(i) i P(i) i P(i) i P(i) i P(i) i P(i) 0 0 8 2 16 4 24 6 32 8 40 10 48 12 56 14 1 16 9 18 17 20 25 22 33 24 41 26 49 28 57 30 2 32 10 34 18 36 26 38 34 40 42 42 50 44 58 46 3 48 11 50 19 52 27 54 35 56 43 58 51 60 59 62 4 1 12 3 20 5 28 7 36 9 44 11 52 13 60 15 5 17 13 19 21 21 29 23 37 25 45 27 53 29 61 31 6 33 14 35 22 37 30 39 38 41 46 43 54 45 62 49 7 49 15 51 23 53 31 55 39 57 47 59 55 61 63 63 Key schedule: Present can take keys of either 80 or 128 bits they are referred as PRESENT-80 and PRESENT-128. In this paper we focuson 80-bit keys are represented as k79, k78 . . . k0 and they are stored in key register K. At round i the 64-bit round key Ki = k63k62 . . . k0 consists of the 64 leftmost bits of the current contents of register K. Thus at round i we have Ki = k63k62 . . . k0 = k79k78 . . . k16 will be extracted then key register K = k79k78 . . . k0 is updated as 1. Key register is rotated by 61 positions to the left. [K79k78 . . . k1k0] = [k18k17 . . . k20k19] 2. The left most four bits are passed through the present S-box [k79k78k77k76] = S [k79k78k77k76] 3. The round counter value is exclusive ORed with bits of K with least significant bit of round counter on the right. [k19k18k17k16k15] = [k19k18k17k16k15] round counter. Fig 2. block diagram of present cipher
  • 4. A survey on various lightweight cryptographic algorithms on FPGA DOI: 10.9790/2834-1201025459 www.iosrjournals.org 57 | Page III. TEA Both security and simplicity of implementation is equally important and hence TEA is an excellent choice in cryptography. The Tiny Encryption Algorithm is block cipher and it is simpler as a few lines of the code. It is fast, secure and simple in description and implementation than IDEA even though it uses same algebraic mixed group’s technique. As the confidentiality of the data is more important TEA is secure and needs minimal storage space. Tea is highly resistant to differential cryptanalysis and achieves complete diffusion. The cipher was developed by Wheeler and Needham in 1994. The TEA takes 64 bit (block size) data bits using 128 bit keys with 32 rounds. This cipher starts with a 64 bit data block that is split up into two 32 bit blocks in which the block on the left side is called as L and the block on the right side is called as R. These blocks are swapped per Round. Key schedule: 128 bit key is split into four 32 bit sub key Ki where i= 0 to 3 and it uses delta, delta is defined as a constant, 2^32/ (golden ratio), which is 2654435769 as an integer. Multiples of delta are used in each round (mod 2^32).All addition operations are mod 2^32. 3.1. The one half P1 [i-1] say R goes through a left shift of 4 and then is added to K [0] 3.2. R is added to Delta 3.3. R goes through a right shift of 5 and then is added to K [1] An XOR operation is then applied to the result of those three operations and finally, the result of The XOR operation is added to L (P0 [i-1]).it produces the half of the block cipher for the next round. Similar operations are performed for the next half round P0 [i-1] function. Fig 3. TEA implementation
  • 5. A survey on various lightweight cryptographic algorithms on FPGA DOI: 10.9790/2834-1201025459 www.iosrjournals.org 58 | Page IV. Hummingbird It is important to realize that ultra-lightweight cryptographic algorithm Hummingbird, is designed for resource-constrained devices. The design of the Hummingbird cryptographic algorithm is motivated by the well- known Enigma machine taking into consideration of both security and efficiency. It is the combined block cipher and stream cipher. It has 16 bit block size, 256 bit key size and 80 bit internal state. The 16-bit plain text is PTi and the first internal state register RS1.First step in the encryption is mod 2^16 addition of plain text and the content of internal state register. It is encrypted by the first block cipher EK1.That is achieved by Ex-OR operation of added result with key followed by the substitution and permutation. The procedure of encryption is repeated 3 times and the output EK4 is corresponding cipher text CTi. The states of the four internal state registers will also be updated in an unpredictable way based on their current states, the outputs of the first three blocks and the state of the LFSR. Fig 4. hummingbird encryption process.
  • 6. A survey on various lightweight cryptographic algorithms on FPGA DOI: 10.9790/2834-1201025459 www.iosrjournals.org 59 | Page Comparison: Table 3. Comparison between Different Types of Lightweight Cryptographic Algorithms Conclusion In today’s wireless network world LWC plays an important role with resource constraint devices in providing security. There are different methodologies of LWC where each methodology has its own properties and compared in the table. Analyzing the comparison of algorithms- AES, PRESENT, TEA, HUMMINGBIRD, it is shows that PRESENT has higher efficiency, less area and power consumption, thereby reducing cost. This algorithm also provides adequate security and also to mention that PRESENT uses 31 rounds for 256 block size.It is more applicable for as cryptographic algorithm for resource constrained devices. Reference [1]. “VLSI design of secure cryptographic algorithm”, Revini s. shende, Mrs. Anagha y. Deshpande, International Journal of Engineering research & applications (IJERA) Vol. 3 March-April 2013. [2]. “A Survey on Various Cryptography Analysis”by Mitali, Vijay Kumar and Arvind Sharma, Volume 3, Issue 4, July-August 2014. [3]. “Encryption Using Different Techniques” by Dimple1 - Vol. 2, No.1, January-February-2013. [4]. “Image Encryption using Different Techniques for High Security Transmission over a Network”, by Mohammad Sajid, Qamruddin Khizrai, Prof. S.T. Bodkhe - Volume 2, Issue 4, June-July, 2014. [5]. Amrutha k, Jayachandra Naidu V., “Advanced Encryption Standard Algorithm Implementation Using Verilog HDL” Vol. 04, Article 06117; July 2013. [6]. Sergey panasenko, Sergey smagin by” Lightweight cryptography: Underlying Principles & Approaches”, International Journal of Computer Theory & Engineering, Vol. 3, No. 4 August 2011. [7]. Kiran Kumar V.G., Sudesh Jeevan Mascarenhas, Sanath Kumar, Rakesh J Paris, “Design and Implementation of Tiny Encryption Algorithm” Vol. 5, Issue 2, June 2015. [8]. A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher”. [9]. Mohamad Sbeiti, Michael Silbermann, Axel Poschmann, Christof Paar., “Design Space Exploration of Present Implementation For FPGA”. [10]. Thomas Eisenbarth, Christof Paar and Axel Poschmann, Sandeep Kumar, Leif Uhsadel “A Survey of Lightweight-Cryptography Implementations”. [11]. “Design and simulation of AES algorithm- Encryption using VHDL” Mital Maheta, 2014 IJEDR Volume 2, Issue1, 2014. [12]. “Study of Hummingbird Cryptographic Algorithms based on FPGA implementation”, by Reena Bhatiya, IJCSIT, International Journal of computer Science & Information Technologies, Vol. 5(3),2014. 0 500 1000 1500 Cipher Key Size FPGA Device Throughput Slices(GEs) Efficiency PRESENT - 80 80 Spartan3XC35400 516 176 2.93 PRESENT - 128 128 Spartan3XC35400 508 202 2.51 TEA 128 Spartan3XC35200 19.52 1140 0.017 AES 256 Spartan-II XC2S30-6 166 522 0.32 HUMMINGBIRD 256 Spartan3XC3S200-5 160.4 273 0.59