Blowfish On FPGA
Blowfish On FPGA
Blowfish On FPGA
FPGA - HARDWARE BASED DES & BLOWFISH SYMMETRIC CIPHER ALGORITHMS FOR ENCRYPTION & DECRYPTION OF SECURED WIRELESS DATA COMMUNICATION
1 1
M.E.[Electronics & Communication] Student, Department Of Electronics & Communication Engineering, Shantilal Shah Engineering College, Bhavnagar, Gujarat 2 Asst.Professor, Department Of Electronics & Communication Engineering, Shantilal Shah Engineering College, Bhavnagar, Gujarat 3 Asst.Professor, Department Of Electronics & Communication Engineering, Sarvajanik College Of Engineering & Technology, Surat, Gujarat chirag_pro7@yahoo.com, icc_narendra@yahoo.co.in, vandshah@gmail.com
ABSTRACT: Now a days internet and wireless networks growing rapidly, information and network security becomes a vital process to protect commerce secret and evaluation privacy. Earlier security was a major issue for military applications but now a days the area of communication applications has been enhanced since most of the communication takes place over the web. Hence, the principal goal of any encryption algorithm is to provide security against any unauthorized attacks as well as to make communication network smoother without any hurdle. In this paper, we demonstrated performance of the most communication network data encryption algorithms: DES and Blowfish in terms of speed and power consumption. In this paper, we also demonstrated simulation results of DES encryption and decryption algorithm in VHDL coding with the help of Xilinx 9.2i ise and practical implementation of DES encryption and decryption algorithm in System C coding on FPGA - Spartan 3 XC3S200 with the help of Xilinx Platform Studio. We have also practically implemented Blowfish encryption and decryption algorithm in System C coding on FPGA - Spartan 3 XC3S200 with the help of Xilinx Platform Studio. We could also show that Blowfish encryption and decryption algorithm simulation results in VHDL coding with the help of Xilinx 9.2i ise in future. The study of DES and Blowfish algorithms shows that Blowfish algorithm runs faster than DES algorithm and the power consumption is almost same. Keywords Encryption Algorithm, Decryption Algorithm, DES, Blowfish, Cryptography, Performance Evaluation. I: INTRODUCTION In recent years, there emerged a lot of communication and networking applications based on internet such as on line shopping, stock trading, web based banking, e-commerce, m-commerce and electronic bill payment. Such a confidential transactions over wired or wireless public networks demand end to end secure connections to ensure data authentication, privacy, integrity, non repudiation, access control and confidentiality[1]. Cryptography converts the original message in to the non readable format and sends the message over an insecure noisy channel. The attacker who are unauthorized to read the message try to break the non readable message but it is almost hard to do it so. O n l y the authorized person has the capability to convert the non readable message to readable one. Data Encryption algorithm plays an important role for information security guarantee. Encryption is the process of transforming the plaintext data into the cipher text in order to conceal its meaning and so preventing any unauthorized recipient from retrieving the original data means forming highly secured data communication networks. The main task of encryption is to ensure secrecy as well as privacy, data authentication, integrity and non repudiation. Companies usually encrypt their data before transmission to ensure that the data is secure during transit. The encrypted data is sent over the public network and is decrypted by the intended recipient only and by other it will be the garbage data. A. Classification Of Cryptography: Encryption algorithms can be classified into two broad categories - Symmetric key encryption and Asymmetric key encryption. 1. Symmetric Key Encryption: Symmetric key encryption may also be referred to as shared key or shared secret encryption. In symmetric key cryptography, the key used for encryption is similar to the key used in decryption. Hence, the key distribution has to be made prior to the transmission of information. The key plays a very important role in symmetric key
Page 739
Page 740
Fig.1 DES Algorithm B. Blowfish Algorithm Bruce Schneier, one of the world's leading cryptologists, designed the Blowfish algorithm [10] and made it available in the public domain. Blowfish is a variable length key from 32 bits to 448 bits, 64 bit block cipher. The algorithm was first introduce in 1993, and has not been cracked yet. It can be optimized in hardware applications due to its compactness. The flow of Blowfish algorithm is shown in Fig.2. It consists of two parts: 1. key expansion part and 2. Data encryption part. Key expansion converts a key of at most 3 2 t o 448 bits into several sub
Fig.2 Blowfish Algorithm C. Security Analysis In this section, we analyse the algorithms strength against attacks from two aspects: differential cryptanalysis and linear cryptanalysis. Eli Biham and Adi Shamir introduced differential cryptanalysis in 1990. They found a chosen plaintext attack against DES which was more efficient than brute force. The best attack against full 16 round DES requires 247 chosen plaintexts. This can be converted to a known plaintext attack, but requires 255 known plaintexts. And 237 DES operations are required during analysis. The attack is heavily dependent on the structure of the S-boxes which happen to be optimized against differential cryptanalysis in DES. In addition, the resistance of DES can be improved by increasing the number of rounds [13]. Linear cryptanalysis is another type of cryptanalytic attack invented by Mitsuru Matsui. The attack uses linear approximations to describe the action of a block cipher [14]. Against full 16 round DES, this attack can recover the key with an average of 243 known plaintexts. A software implementation of this attack recovered a DES key in 50 days using 12 HP9000/735 workstations which is the most effective attack so far [15]. Linear cryptanalysis is newer than differential cryptanalysis and it is efficient against reduced round DES variants. From above analysis, DES can provide a certain security guarantee in some degree by optimizing the construction of S-boxes. Bruce Schneier show differential cryptanalysis on Blowfish is possible either against a reduced number of rounds or with the piece of information which describes the F function. However, the boxes are well designed to resist to an attacks while they are randomly generated in Blowfish [16]. As we know, there is no successful cryptanalysis against Blowfish.
Page 741
As per the above table, Blowfish run faster than DES, about 7.4~7.5 Mbytes per second to 5.7~5.8 Mbytes per second. The remained battery percentage of Blowfish and DES was almost the same, 15% for 50M cycles and about 35% for 100M cycles. Hence it is proved that Blowfish encryption algorithm may be more suitable for wireless network application which exchanges small size packets[11]. IV: SOFTWARE AND HARDWARE REQUIREMENT In order to simulate DES on laptop, We have used Xilinx 9.2i ise software in Windows 8 32 bit Operating System and VHDL Coding Language for simulation purpose. The test platform is Sony Vaio Laptop with Intel Core i5-2430M Processor 2.40 GHz and 4 GB Memory. In order to practically implement DES and Blowfish on FPGA, We have used Xilinx Platform Studio software in Windows XP 32 bit operating system and System C Coding Language for implementation purpose. The test platform is HP Desktop with Intel Core 2 Duo Processor 2.40 GHz, 4 GB Memory and FPGA - Spartan 3 XC3S200 Kit. V: EXPERIMENTAL RESULTS The experimental results of DES are of two types: A. VHDL Simulation Results and B. System C Practical Implementation Results on FPGA. A. VHDL Simulation Results Of DES: Fig.3 shows DES encryption Results to generate cipher text(encrypted data).
Page 742
Fig.3 DES Encryption Fig.4 shows DES decryption results to generate plain text(original data). Fig. 7 Blowfish Encryption and Decryption VI: CONCLUSION AND FUTURE WORK Encryption algorithm plays a vital role for information security guarantee in recent growing internet and communication network applications. In this paper, we studied two symmetric key encryption algorithms: DES and Blowfish. We evaluated encryption speed and power consumption for their performance. Here, We have simulated DES for encryption and decryption with the help of VHDL coding as well as practically implemented DES and Blowfish on FPGA Spartan 3 XC3S200 for encryption and decryption with the help of System C coding. In our future research, we are going to simulate Blowfish encryption and decryption algorithm using VHDL coding. Finally, we are planning to compare performance measures of both algorithms DES and Blowfish in terms of encryption speed and power consumption for wireless communication applications. REFERENCES [1] Karri, R. and Mishra, Minimizing the secure wireless session energy, Journal of Mobile Network and Applications (MONET) 8, 2 (April), pp. 177-185. [2] Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud3, Performance Evaluation of Symmetric Encryption Algorithms, in IJCSNS International Journal of Computer Science and Network Security, vol.8 No.12, December 2008, pp. 280-286. [3] P. Prasithsangaree and P. Krishnamurthy, Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs, Globecom 2003, pp. 1445 1449. [4] Nadeem, A. and Javed, M.Y., "A Performance Comparison of Data Encryption Algorithms," IEEE Information and Communication Technologies, 2005. ICICT 2005. First International Conference, February, 2006, pp. 84- 89. [5] A. Wander, N. Gura, H. Eberle, V. Gupta, and
Fig. 4 DES Decryption B. System C Practical Implementation Results Of DES And Blowfish On FPGA: Fig. 5 shows DES encryption practical implementation results on FPGA to generate cipher text.
Fig.5 DES Encryption Fig. 6 shows DES decryption practical implementation results on FPGA to generate plain text.
Page 743
Page 744