SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May2019 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1848
Design and Implementation of 256-bits Cryptography Algorithm used
in the Data Security with Resistance to Brute-Force and Timing Attacks
Written in VHDL code using Xilinx ISE 9.2i Software
Anwesha Das1,Paresh Kumar Pasayat2
1PG student, Dept. of ETC Engineering, IGIT, Odisha, India
2Assistant Professor, Dept. of ETC Engineering, IGIT, Odisha, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – The proposed paper aims to create a virtualmodel
for a new cryptography algorithmwhichis implementedusing
the modified version of the Data Encryption Standard (DES)
and Hamming(448,256) code techniques. The originalversion
of DES operates on 64-bits data with 56-bits cipher key to
produce 64-bits encrypted data. Whereas the proposed work
deals with the encryption of 256-bits original data using 224-
bits cipher key to produce 256-bits middletext and this 256-
bits middletext is given to the Hamming(448,256) code
encryption block to generate 448-bits desired encrypted data.
The 256-bits original data has been recovered by decrypting
448-bits encrypted data using the reverse order operations
with respect to the encryption process. As the key length is
224-bits and the time required for the encryption is in the
range of nanosecond (ns), the data security algorithm is
resistant towards the brute-force attackandthetimingattack
respectively. The proposed work can be implemented in the
banking sector, telecommunication sector and military sector
etc.
Key Words: DES, Cipher Key, Middletext, Brute-force,
Timing attack.
1. INTRODUCTION
Cryptography is the process of hiding the content ofthe
message by the process of encryption with or without the
use of chip code. In this technique, the original message is
converted into a message of unreadable format so that the
attacker cannot access the original message easily. In the
proposed work, the 256-bits original data is converted into
448-bits encoded data using modified DES and the
Hamming(448,256) code encryption techniques. The
proposed algorithm is different from the existing algorithm
in terms of number of data bits and design styles with logic
in addition to the achievement of robustness andnewnessof
the algorithm.
1.1 Diagrammatic Representation of the proposedwork
The project describes the flow chart for the proposed
project work. Each number in the model signifies the no. of
bits of the input and output of each unit. The diagrammatic
representation of the proposed work is given as follows:
Fig 1: 256-bits Modified DES Encryption Process
HAMMING
(7,4)
CODE
UNIT_2
HAMMING
(7,4)
CODE
UNIT_64
256-BITS
INPUT
DATA(M)
BIT
SEPERATOR
UNIT_1
HAMMING
(7,4)
CODE
UNIT_1
BIT
SEPERATOR
UNIT_2
BIT
SEPERATOR
UNIT_64
BIT
APPEND
UNIT
448-BITS
ENCRYPTED
DATA(E)
D(0)-D(3)
D(4)-D(7)
D(252)-D(255)
H(0)-H(6)
H(7)-H(13)
H(441)-H(447)
.
.
.
.
.
Fig 2: Hamming (448,256) code Encryption Process
2. LOGIC USED IN THE PROPOSED DESIGN
The logic used in the proposed design has been described in
different steps as follow:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May2019 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1849
2.1 MODIFIED DES ENCIPHERMENT ALGORITHM:
Step 1: First, 256-bits Original data also known as plaintext
is fed to the input of the initial permutation unit which
transposes the data randomly to generate 256-bit output.
Step 2: The outputs of initial permutation unit is given tothe
first rounds which produces 256-bit output using a 192-bit
round key generated from a round key generator with 224-
bit cipher key as input.
Step 3: The outputs of first rounds is again given to the
second round which produces 256-bits output using a 192-
bit round key generated from a round key generator with
224-bit cipher key as input.
Step 4: Similarly, step 3 is repeated till the completion of 16-
nos. of round.
Step 5: The output of round-16 is given to the final
permutation which doesthe randomtranspositionofthe bits
to produce 256-bits output and this output is the desired
256-bits encrypted data.
2.2 ROUND KEY GENERATION ALGORITHM:
The sixteen nos. of 192-bits round keys are generated
from a single 224-bits cipher key by performing the
transposition and append operations on the cipher key.
2.3 HAMMING ENCIPHERMENT ALGORITHM:
Step 1: First, 256-bits data is divided into 64 nos. of data
each consisting of 4-bits.
Step 2: The Hamming (7,4) code encoding technique is
applied to 4-bits data of all the 64 blocks. For each 4-bits
data, the encoding unit generates 7-bits encoded data. The
logic for implementing the Hammingcodetechniqueisgiven
as follows:
Suppose, the 4-bit data (P) to be encoded is P3P2P1P0
and the 7-bits Hamming code (H) generated from each
Hamming encoding unit is H6H5H4H3H2H1H0.
Here, the value for each bit of H is given as follows:
H6 = P3 xor P2 xor P0
H5 = P3 xor P1 xor P0
H4 = P2 xor P1 xor P0
H3 = P3
H2 = P2
H1 = P1
H0 = P0
Step 3
After that, the 7-bits Hamming codes corresponding to
each 4-bits data are appended to form the desired 448-bits
encoded data.
2.4 DECIPHERMENT ALGORITHM:
The algorithm for the decryption process can be written in
the reverse order of the encryption algorithm.
3. SIMULATION RESULT AND DISCUSSION
The VHDL code of the proposed work has been simulated
using Xilinx ISE 9.2i software and the desired simulation
results have been obtained.
The simulation result of the modified DES encryption
process is given as follows:
Fig 3: Simulation result of the 256-bits modified DES
encryption process
The simulation result of the Hamming code encryption
process is given as follows:
Fig 4: Simulation result of the Hamming (448,256) code
encryption process
The simulation result of the Hamming code decryption
process is given as follows:
Fig 5: Simulation result of the Hamming (448,256) code
decryption process
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May2019 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1850
The simulation result of the modified DES decryption
process is given as follows:
Fig 6: Simulation result of the 256-bits modified DES
decryption process
4. CONCLUSION
It is concluded that the proposedwork isbestsuitedin the
field of data security to provide protection to the 256-bits
original data from unauthorized access by the attackers
available in the network. It is resistant to the brute-force
attack, timing attack which makes the algorithm more
robust. The VHDL code of the proposed design is compiled
and simulated using Xilinx ISE 9.2i software. The maximum
combinational path delay required to convert 256-bits
plaintext into 448-bits ciphertext is 19.231ns.
REFERENCES
[1] Dr. Sandeep Tayal, Dr. Nipin Gupta, Dr. Pankaj Gupta,
Deepak Goyal, Monika Goyal, “A Review paper on Network
Security and Cryptography”, Advances in Computational
Sciences and Technology, Volume 10, Number 5,pp. 763-
770,2017.
[2] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar,
“An efficient VLSI architecture for data encryption standard
and its FPGA implementation”,VLSISATA,IEEEInternational
Conference,pp.1-5,2016.
[3] W.Stallings,“Cryptography and Network Security”, 2nd
Edition, Prentice Hall.
[4] Douglas L. Perry. “VHDL Programming by Examples”,
TMH.
[5] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData
Encryption Standard using time variable permutations”,
International Conference on Microelectronics
(ICM),IEEE,pp.126-129,2015.
[6] Ramadhan J. Mstafa; Khaled M. Elleithy, “A highly secure
video steganography using Hamming code (7, 4)”, Systems,
Applications and Technology Conference (LISAT), IEEE
Conference,pp.1-6,2014.
[7] Ravikumar M.Raypure, Prof. Vinay Keswani,
“Implementation For Data Hiding Using Visual
Cryptography”, IRJET, Volume: 04, Issue: 07, 2017.
.

More Related Content

PDF
hardware implementation of aes encryption and decryption for low area & low p...
PDF
Hardware implementation of aes encryption and decryption for low area & power...
PDF
G05124550
PDF
An Efficient VLSI Architecture for AES and It's FPGA Implementation
PDF
Fpga based encryption design using vhdl
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Implementation of aes and blowfish algorithm
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
hardware implementation of aes encryption and decryption for low area & low p...
Hardware implementation of aes encryption and decryption for low area & power...
G05124550
An Efficient VLSI Architecture for AES and It's FPGA Implementation
Fpga based encryption design using vhdl
International Journal of Engineering Research and Development (IJERD)
Implementation of aes and blowfish algorithm
New Technique Using Multiple Symmetric keys for Multilevel Encryption

What's hot (20)

PDF
Simulated Analysis and Enhancement of Blowfish Algorithm
PDF
Implementation of Designed Encoder and Decoder for Golay Code
PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
PDF
Analysis of symmetric key cryptographic algorithms
PDF
Wireless Network Security Architecture with Blowfish Encryption Model
PPTX
Cyber forensics
PDF
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
PDF
M04302093096
PDF
Enhanced Advanced Encryption Standard (E-AES): using ESET
PDF
Final report
PDF
G05215356
PDF
An improved geo encryption algorithm in location based services
PDF
G05114043
PDF
Малоресурсная криптография - Сергей Мартыненко
PDF
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
PDF
Hybrid AES DES
PPTX
Information and network security 29 international data encryption algorithm
PDF
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
PPTX
Blow fish final ppt
PDF
Iaetsd enhanced cryptography algorithm for providing
Simulated Analysis and Enhancement of Blowfish Algorithm
Implementation of Designed Encoder and Decoder for Golay Code
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
Analysis of symmetric key cryptographic algorithms
Wireless Network Security Architecture with Blowfish Encryption Model
Cyber forensics
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
M04302093096
Enhanced Advanced Encryption Standard (E-AES): using ESET
Final report
G05215356
An improved geo encryption algorithm in location based services
G05114043
Малоресурсная криптография - Сергей Мартыненко
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
Hybrid AES DES
Information and network security 29 international data encryption algorithm
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
Blow fish final ppt
Iaetsd enhanced cryptography algorithm for providing
Ad

Similar to IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in the Data Security with Resistance to Brute-Force and Timing Attacks Written in VHDL Code using Xilinx ISE 9.2i Software (20)

PDF
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
PDF
Simulation based design and analysis of combined effect of various data secur...
PDF
IRJET- Simulation based design and analysis of combined effect of various ...
PDF
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
PDF
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PDF
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
PDF
icwet1097
PDF
Mini Project on Data Encryption & Decryption in JAVA
PDF
Enhancement of DES Algorithm with Multi State Logic
PDF
VHDL Encryption
PDF
RTL Modeling for the Cipher Block Chaining Mode (CBE) for Data Security
PDF
Implementation of DES encryption and decryption Algorithm
PDF
Implementation of-hybrid-cryptography-algorithm
PDF
Aes 128 192_256_bits_project_report
PDF
D010321824
PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
PPT
Cryptography Symmetric Key Algorithm (CSE)
PPT
section-8.ppt
PDF
G04701051058
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
Simulation based design and analysis of combined effect of various data secur...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
icwet1097
Mini Project on Data Encryption & Decryption in JAVA
Enhancement of DES Algorithm with Multi State Logic
VHDL Encryption
RTL Modeling for the Cipher Block Chaining Mode (CBE) for Data Security
Implementation of DES encryption and decryption Algorithm
Implementation of-hybrid-cryptography-algorithm
Aes 128 192_256_bits_project_report
D010321824
“Optimized AES Algorithm Core Using FeedBack Architecture”
Cryptography Symmetric Key Algorithm (CSE)
section-8.ppt
G04701051058
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
web development for engineering and engineering
PDF
composite construction of structures.pdf
PPTX
Geodesy 1.pptx...............................................
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
PPT on Performance Review to get promotions
PPT
Project quality management in manufacturing
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Model Code of Practice - Construction Work - 21102022 .pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Lecture Notes Electrical Wiring System Components
web development for engineering and engineering
composite construction of structures.pdf
Geodesy 1.pptx...............................................
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
R24 SURVEYING LAB MANUAL for civil enggi
Mechanical Engineering MATERIALS Selection
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Operating System & Kernel Study Guide-1 - converted.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT on Performance Review to get promotions
Project quality management in manufacturing
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...

IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in the Data Security with Resistance to Brute-Force and Timing Attacks Written in VHDL Code using Xilinx ISE 9.2i Software

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May2019 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1848 Design and Implementation of 256-bits Cryptography Algorithm used in the Data Security with Resistance to Brute-Force and Timing Attacks Written in VHDL code using Xilinx ISE 9.2i Software Anwesha Das1,Paresh Kumar Pasayat2 1PG student, Dept. of ETC Engineering, IGIT, Odisha, India 2Assistant Professor, Dept. of ETC Engineering, IGIT, Odisha, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – The proposed paper aims to create a virtualmodel for a new cryptography algorithmwhichis implementedusing the modified version of the Data Encryption Standard (DES) and Hamming(448,256) code techniques. The originalversion of DES operates on 64-bits data with 56-bits cipher key to produce 64-bits encrypted data. Whereas the proposed work deals with the encryption of 256-bits original data using 224- bits cipher key to produce 256-bits middletext and this 256- bits middletext is given to the Hamming(448,256) code encryption block to generate 448-bits desired encrypted data. The 256-bits original data has been recovered by decrypting 448-bits encrypted data using the reverse order operations with respect to the encryption process. As the key length is 224-bits and the time required for the encryption is in the range of nanosecond (ns), the data security algorithm is resistant towards the brute-force attackandthetimingattack respectively. The proposed work can be implemented in the banking sector, telecommunication sector and military sector etc. Key Words: DES, Cipher Key, Middletext, Brute-force, Timing attack. 1. INTRODUCTION Cryptography is the process of hiding the content ofthe message by the process of encryption with or without the use of chip code. In this technique, the original message is converted into a message of unreadable format so that the attacker cannot access the original message easily. In the proposed work, the 256-bits original data is converted into 448-bits encoded data using modified DES and the Hamming(448,256) code encryption techniques. The proposed algorithm is different from the existing algorithm in terms of number of data bits and design styles with logic in addition to the achievement of robustness andnewnessof the algorithm. 1.1 Diagrammatic Representation of the proposedwork The project describes the flow chart for the proposed project work. Each number in the model signifies the no. of bits of the input and output of each unit. The diagrammatic representation of the proposed work is given as follows: Fig 1: 256-bits Modified DES Encryption Process HAMMING (7,4) CODE UNIT_2 HAMMING (7,4) CODE UNIT_64 256-BITS INPUT DATA(M) BIT SEPERATOR UNIT_1 HAMMING (7,4) CODE UNIT_1 BIT SEPERATOR UNIT_2 BIT SEPERATOR UNIT_64 BIT APPEND UNIT 448-BITS ENCRYPTED DATA(E) D(0)-D(3) D(4)-D(7) D(252)-D(255) H(0)-H(6) H(7)-H(13) H(441)-H(447) . . . . . Fig 2: Hamming (448,256) code Encryption Process 2. LOGIC USED IN THE PROPOSED DESIGN The logic used in the proposed design has been described in different steps as follow:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May2019 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1849 2.1 MODIFIED DES ENCIPHERMENT ALGORITHM: Step 1: First, 256-bits Original data also known as plaintext is fed to the input of the initial permutation unit which transposes the data randomly to generate 256-bit output. Step 2: The outputs of initial permutation unit is given tothe first rounds which produces 256-bit output using a 192-bit round key generated from a round key generator with 224- bit cipher key as input. Step 3: The outputs of first rounds is again given to the second round which produces 256-bits output using a 192- bit round key generated from a round key generator with 224-bit cipher key as input. Step 4: Similarly, step 3 is repeated till the completion of 16- nos. of round. Step 5: The output of round-16 is given to the final permutation which doesthe randomtranspositionofthe bits to produce 256-bits output and this output is the desired 256-bits encrypted data. 2.2 ROUND KEY GENERATION ALGORITHM: The sixteen nos. of 192-bits round keys are generated from a single 224-bits cipher key by performing the transposition and append operations on the cipher key. 2.3 HAMMING ENCIPHERMENT ALGORITHM: Step 1: First, 256-bits data is divided into 64 nos. of data each consisting of 4-bits. Step 2: The Hamming (7,4) code encoding technique is applied to 4-bits data of all the 64 blocks. For each 4-bits data, the encoding unit generates 7-bits encoded data. The logic for implementing the Hammingcodetechniqueisgiven as follows: Suppose, the 4-bit data (P) to be encoded is P3P2P1P0 and the 7-bits Hamming code (H) generated from each Hamming encoding unit is H6H5H4H3H2H1H0. Here, the value for each bit of H is given as follows: H6 = P3 xor P2 xor P0 H5 = P3 xor P1 xor P0 H4 = P2 xor P1 xor P0 H3 = P3 H2 = P2 H1 = P1 H0 = P0 Step 3 After that, the 7-bits Hamming codes corresponding to each 4-bits data are appended to form the desired 448-bits encoded data. 2.4 DECIPHERMENT ALGORITHM: The algorithm for the decryption process can be written in the reverse order of the encryption algorithm. 3. SIMULATION RESULT AND DISCUSSION The VHDL code of the proposed work has been simulated using Xilinx ISE 9.2i software and the desired simulation results have been obtained. The simulation result of the modified DES encryption process is given as follows: Fig 3: Simulation result of the 256-bits modified DES encryption process The simulation result of the Hamming code encryption process is given as follows: Fig 4: Simulation result of the Hamming (448,256) code encryption process The simulation result of the Hamming code decryption process is given as follows: Fig 5: Simulation result of the Hamming (448,256) code decryption process
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May2019 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1850 The simulation result of the modified DES decryption process is given as follows: Fig 6: Simulation result of the 256-bits modified DES decryption process 4. CONCLUSION It is concluded that the proposedwork isbestsuitedin the field of data security to provide protection to the 256-bits original data from unauthorized access by the attackers available in the network. It is resistant to the brute-force attack, timing attack which makes the algorithm more robust. The VHDL code of the proposed design is compiled and simulated using Xilinx ISE 9.2i software. The maximum combinational path delay required to convert 256-bits plaintext into 448-bits ciphertext is 19.231ns. REFERENCES [1] Dr. Sandeep Tayal, Dr. Nipin Gupta, Dr. Pankaj Gupta, Deepak Goyal, Monika Goyal, “A Review paper on Network Security and Cryptography”, Advances in Computational Sciences and Technology, Volume 10, Number 5,pp. 763- 770,2017. [2] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar, “An efficient VLSI architecture for data encryption standard and its FPGA implementation”,VLSISATA,IEEEInternational Conference,pp.1-5,2016. [3] W.Stallings,“Cryptography and Network Security”, 2nd Edition, Prentice Hall. [4] Douglas L. Perry. “VHDL Programming by Examples”, TMH. [5] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData Encryption Standard using time variable permutations”, International Conference on Microelectronics (ICM),IEEE,pp.126-129,2015. [6] Ramadhan J. Mstafa; Khaled M. Elleithy, “A highly secure video steganography using Hamming code (7, 4)”, Systems, Applications and Technology Conference (LISAT), IEEE Conference,pp.1-6,2014. [7] Ravikumar M.Raypure, Prof. Vinay Keswani, “Implementation For Data Hiding Using Visual Cryptography”, IRJET, Volume: 04, Issue: 07, 2017. .