Implementation and Analysis of Cryptographic Ciphers in FPGA

  • V. G. Kiran KumarEmail author
  • C. Shantharama Rai
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 755)


In today’s era of the digital age, every aspect of the stored information has to be secured. The information may be stored in the high end devices like the cloud or servers or the desktop systems or in the hand held devices like PDAs, mobile or the RFID, IoT, health care, etc., or they may communicate effectively in concert to perform certain tasks. The Pervasive computing or ubiquitous computing opens up several challenges in the area of applied cryptography, not only to design a secure cryptographic algorithm but also implementing it efficiently. This paper proposes the effective implementation of cryptographic algorithms in FPGA. The term “effectiveness” implies efficacy (i.e., how effectively can a data be secured) and efficiency (i.e., implementing the algorithm in an efficiently this paper considers three parameters—speed Area and Power).


Lightweight cryptography FPGA Key generation 


  1. 1.
    Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A Survey of lightweight-cryptography implementations. IEEE Des. Test 24(6), 522–33 (2007)Google Scholar
  2. 2.
    Tang,Z., Cie, J., Zhong, H., Yu, M.: A Random PRESENT encryption algorithm based on dynamic s box. Int. J. Secur. Appl. 10(3) (2016)Google Scholar
  3. 3.
    Chaitra, B., Kiran Kumar, V.G., Shantharama, R.C.: A survey on various lightweight cryptographic algorithms on FPGA. IOSR J. Electron. Commun. Eng. 12(1) (2017)Google Scholar
  4. 4.
    Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck of lightweight block ciphers. National Security Agency 9800 Savage Road, Fort Meade, MD 20755, USA, June 2013Google Scholar
  5. 5.
    Sbeiti, M., Silbermann, M., Poschmann, A., Paar, C.: Design space exploration of PRESENT implementations for FPGA’s. Hortz gortz institute for IT securityGoogle Scholar
  6. 6.
    PRESENT: an ultralightweight block cipher. In: Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Securin, Y., Vikkelsoe, C. (eds.), Hortz gortz institute for IT security International Workshop on Cryptographic Hardware and Embedded Systems CHES 2007, pp. 450–466 (2007)Google Scholar
  7. 7.
    Ameli, R.: PRESENT cipher encryption IP core. Digital system lab, IranGoogle Scholar
  8. 8.
    A hardware implementation of simon cryptography algorithm. In: Feizi, S., Ahmadi, A., Nemati A. (eds.), 4th International Conference on Computer and Knowledge Engineering (ICCKE) (2014)Google Scholar
  9. 9.
    Aysu, A., Ege, Gulcan, E., Schaumont, P.: SIMON says: break area records of block ciphers on FPGAs. IEEE Embedded Syst. Lett. 6(2) (2014)Google Scholar
  10. 10.
    Thaduri, M., Yoo, S.M., Gaede, R.: An efficient implementation of IDEA encryption algorithm using VHDL. Elsevier (2004)Google Scholar
  11. 11.
    Nie, T., Zhang, T.: A Study of DES and Blowfish Encryption) Algorithm. 978-1-4244-4547-9/09/IEEE, TENCON (2009)Google Scholar
  12. 12.
    Michael, C.-J.L., Lin, Y.-L.: A VLSI implementation of blowfish encryption/decryption algorithm. In: IEEE Design Automation Conference (A” SP_DAC’00), pp. 1–2 (2000)Google Scholar
  13. 13.
    Liu, S., Gavrylyako, O., Bradford, P.: Implementing the TEA algorithm on sensors. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 64–69 (2004)Google Scholar
  14. 14.
    Wheeler, D., Needham, R.: TEA, a tiny encryption algorithm. In: Proceedings Fast Software Encryption: Second International Workshop, Lecture Notes in Computer Science, vol. 1008, pp. 363–366, December 2004Google Scholar
  15. 15.
    Lai, X., Massey, J.: A proposal for a new block encryption standard. In: Proceedings Eurocrypt ’90, (1990)Google Scholar
  16. 16.
    Kumar, S., Paar, C., poschmann, A.: Leif Uhsadel A survey of lightweight cryptographic implementations. Thomas eisenbarth. Design and test IC’s for secure embedded computing. IEEE Des. Test of Comput. 24(6) (2007)Google Scholar
  17. 17.
    Kiran Kumar, V., Mascarenhas, S.J., Kumar, S., Rakesh, V.: Design and implementation of Tiny encryption algorithm. J. Pais Kiran Kumar, V.G., et al.: Int. J. Eng. Res. Appl. 5(6) (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Sahyadri College of Engineering and ManagementMangaloreIndia
  2. 2.AJ Institute of TechnologyMangaloreIndia

Personalised recommendations