{"title":"IDEA NXT加密算法的硬件实现","authors":"Andreea Bozesan, Flavius Opritoiu, M. Vladutiu","doi":"10.1109/SIITME.2013.6743640","DOIUrl":null,"url":null,"abstract":"This paper introduces a novel hardware implementation of the IDEA NXT encryption algorithm resistant to attacks, and proposes a strategy for testing the implementation on an Altera DE2 FPGA. The proposed design is analysed with respect to execution time and throughput, revealing its effectiveness in comparison to conventional approaches. Also, its performance in terms of execution time and throughput is presented by comparison to the DES, IDEA and AES cryptographic algorithms, which have been extensively used in the past few decades, and also to other implementations of the NXT algorithm previously developed. The IDEA NXT crypto-algorithm surfaced only a few years ago and little work was done so far to prove its theoretical strengths or to bring improvements, and that is what this study tries to cover.","PeriodicalId":267846,"journal":{"name":"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Hardware implementation of the IDEA NXT crypto-algorithm\",\"authors\":\"Andreea Bozesan, Flavius Opritoiu, M. Vladutiu\",\"doi\":\"10.1109/SIITME.2013.6743640\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces a novel hardware implementation of the IDEA NXT encryption algorithm resistant to attacks, and proposes a strategy for testing the implementation on an Altera DE2 FPGA. The proposed design is analysed with respect to execution time and throughput, revealing its effectiveness in comparison to conventional approaches. Also, its performance in terms of execution time and throughput is presented by comparison to the DES, IDEA and AES cryptographic algorithms, which have been extensively used in the past few decades, and also to other implementations of the NXT algorithm previously developed. The IDEA NXT crypto-algorithm surfaced only a few years ago and little work was done so far to prove its theoretical strengths or to bring improvements, and that is what this study tries to cover.\",\"PeriodicalId\":267846,\"journal\":{\"name\":\"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIITME.2013.6743640\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIITME.2013.6743640","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware implementation of the IDEA NXT crypto-algorithm
This paper introduces a novel hardware implementation of the IDEA NXT encryption algorithm resistant to attacks, and proposes a strategy for testing the implementation on an Altera DE2 FPGA. The proposed design is analysed with respect to execution time and throughput, revealing its effectiveness in comparison to conventional approaches. Also, its performance in terms of execution time and throughput is presented by comparison to the DES, IDEA and AES cryptographic algorithms, which have been extensively used in the past few decades, and also to other implementations of the NXT algorithm previously developed. The IDEA NXT crypto-algorithm surfaced only a few years ago and little work was done so far to prove its theoretical strengths or to bring improvements, and that is what this study tries to cover.