{"title":"VLSI implementation of text to image encryption algorithm based on private key encryption","authors":"A. Suresh, A. S. Remya Ajai","doi":"10.1109/ICEEOT.2016.7755647","DOIUrl":null,"url":null,"abstract":"In cryptographic applications, the data sent to a remote host are encrypted at the source machine using an encryption key and then the encrypted data are sent to the destination machine, where it is decrypted to get the original data. Thus the attacker will not have the encryption key which is required to get the original data and so a hacker can do nothing with any cryptographic system. Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs) are used for hardware implementations of cryptographic algorithms. As FPGA devices progressed both in terms of resources and performance, the latest FPGAs provide solutions that are easily customizable for system connectivity, DSP, and data processing applications. In this paper, implementation of an efficient cryptographic algorithm is done in Xilinx SPARTEN 3E FPGA. Also the algorithm is analyzed by calculating the number of all possible key permutations.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEOT.2016.7755647","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In cryptographic applications, the data sent to a remote host are encrypted at the source machine using an encryption key and then the encrypted data are sent to the destination machine, where it is decrypted to get the original data. Thus the attacker will not have the encryption key which is required to get the original data and so a hacker can do nothing with any cryptographic system. Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs) are used for hardware implementations of cryptographic algorithms. As FPGA devices progressed both in terms of resources and performance, the latest FPGAs provide solutions that are easily customizable for system connectivity, DSP, and data processing applications. In this paper, implementation of an efficient cryptographic algorithm is done in Xilinx SPARTEN 3E FPGA. Also the algorithm is analyzed by calculating the number of all possible key permutations.
在加密应用程序中,发送到远程主机的数据在源机器上使用加密密钥进行加密,然后将加密的数据发送到目标机器,在目标机器上对其进行解密以获得原始数据。因此,攻击者将无法获得获得原始数据所需的加密密钥,因此黑客无法对任何加密系统做任何事情。可编程器件如现场可编程门阵列(fpga)用于加密算法的硬件实现。随着FPGA设备在资源和性能方面的进步,最新的FPGA提供了易于定制的解决方案,用于系统连接,DSP和数据处理应用。本文在Xilinx SPARTEN 3E FPGA上实现了一种高效的加密算法。通过计算所有可能的键排列的个数,对算法进行了分析。