IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 1    
Website: http://www.ijser.org
scirp IJSER >> IJSER Volume 1, Issue 1, October 2010
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
Full Text(PDF, 3000)  PP.  
Amandeep Singh, Ms. Manu Bansa
Encryption, Hacker, Key, S-boxes, FPG
Data Security is an important parameter for the industries. It can be achieved by Encryption algorithms which are used to prevent unauthorized access of data. Cryptography is the science of keeping data transfer secure, so that eavesdroppers (or attackers) cannot decipher the transmitted message. In this paper the DES algorithm is optimized using Xilinx software and implemented on Spartan 3E FPGA kit. The paper deal with the various parameters such as variable key length, key generation mechanism, etc used in order to provide optimized results.
[1]R u t h M . D a v i s , “The Data Encryption Standard ” Proceedings of Conference on Computer Security and the Data Encryption Standard, National Bureau of Standards, Gaithersburg, MD, Feb. 15, 1977, NBS Special Publication 500-27, pp 5-9.

[2]Whitfleld Diffie, “Cryptographic Technology: Fifteen Year Forecast” Reprinted by permission AAAS, 1982 from Secure Communications and Asymmetric Crypto Systems. AAAS Selecte8 Symposia. Editor: C.J. Simmons. Vol. 69, Westview Press, Boulder, Colorado, pp 38-57.

[ 3 ] C . B o y d . “ M o d e r n D a t a E n c r y p t i o n , ” E l e c t r o n i c s & Communication Engineering Journal, October 1993, pp 271-278

[ 4 ] S e u n g - J o H a n , “ T h e I m p r o v e d D a t a E n c r y p t i o n S t a n d a r d ( D E S ) Algorithm” 1996, pp 1310-1314

[5]A. Kh. AI Jabri, “Secure progressive transmission of compressed i m a g e s ” I E E E T r a n s a c t i o n s o n C o n s u m e r E l e c t r o n i c s , V o l . 4 2 , N o . 3 , AUGUST 1996, pp 504-512

[6]K. Wong, “A single-chip FPGA implementation of the data encryption standard (des) algorithm” IEEE 1998 pp 827-832

[7]Subbarao V. Wunnava, “Data Encryption Performance and Evaluation Schemes” Proceedings IEEE Southeastcon 2002, pp 234- 238

[8]Xun Yi,” Identity-Based Fault-Tolerant Conference Key Agreement” IEEE transactions on dependable and secure computing, vol. 1, no. 3, July-September 2004, pp 170-178

[9] M. Backes, “Relating Symbolic and Cryptographic Secrecy” IEEE t r a n s a c t i o n s o n d e p e n d a b l e a n d s e c u r e c o m p u t i n g , v o l . 2 , n o . 2 , April-June 2005, pp 109-123

[ 1 0 ] E l i s a B e r t i n o , “ A n E f f i c i e n t T i m e - B o u n d H i e r a r c h i c a l K e y Management Scheme for Secure Broadcasting” IEEE transactions on d e p e ndab l e and s e cu r e compu t ing , vo l . 5 , no . 2 , Ap r i l - J un e 2008 , pp 65-70

[11]Hung-Min Sun, “On the Security of an Efficient Time-Bound H i e r a r c h i c a l K e y M a n a g e m e n t S c h e m e ” I E E E t r a n s a c t i o n s o n d e p e ndab l e and s e cu r e compu t ing , vo l . 6 , no . 2 , Ap r i l - J un e 2009 , pp 159-160

[12]Patrick Tague, David Slater,Jason Rogers, and Radha Poovendran, “Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis” IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, April-June 2009p.p. 111-12

Untitled Page