Journal Paper 1
Journal Paper 1
14
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.1, December 2010
throughput and operating frequency are much less when in C-like notation. For efficiency purposes, it is
compared to SEA (48, 8). So, implementing SEA for applied bitwise to any set of three words of data
constrained systems is a better option. using the following recursive definition:
15
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.1, December 2010
C = Rnr&Lnr ;
switch KLnr−1, KRnr−1;}
Figure 2.2: Pseudo Code description
16
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.1, December 2010
are basically three methodologies to carry out a modulo m are also shown in Figure 4.4. Our implementation of SEA
addition [10]: exhibited a very small area utilization that comes at the cost
1. Table based operator method of increased throughput and reduced power consumption.
2. Hybrid based operator method Consequently, it can be considered as the interesting
3. Adder-Based operator method. alternative for constrained devices.
Figure 4.2
Figure 3.1
4 IMPLEMENTATION RESULTS
Implementation results were extracted with the ISE 9.2i tool
from Xilinx on an device XC4VLX25, VIRTEX-4 platform
with speed grade-12 and XC3S1400, SPARTAN-3 platform
with speed grade -4. XPower Analyzer tool was used to
analyze the power consumption of the implementation. The
implementation was done for variants bit data (n) and a
processor word size (b). We achieved reduction in number
of slice (Figure 4.1), high throughputs (Figure 4.2) and
increase in work frequency (Figure 4.3) in implementation
Figure 4.3
compared to implementation of [1]. Throughput /Area ratio
17
International Journal of Computer Applications (0975 – 8887)
Volume 11– No.1, December 2010
Figure 4.4 [6] Advanced Encryption Standard, FIPS PUB 197, Nov.
2001.
5 CONCLUSION
SEA was initially proposed for low cost software [7] G. Yuval, “Reinventing the travois: Encryption/MAC
implementations. While these design criteria turned out to in 30 ROM bytes,” in Proc. Fast Softw. Encryption
allow low cost hardware implementations as well, it is likely
(FSE), 1997, pp. 205–209.
that targeting a cipher specifically for low cost hardware
would lead to even better solutions.
[8] N. Pramstaller and J. Wolkerstorfer, “A universal and
Through the hardware investigation of the SEA, we show efficient AES co-processor for field programmable
that this modular symmetric algorithm, targeted for low- logic arrays,” in Proc. FPL, 2004, pp. 565–574.
resources software solutions, can interestingly respond to
constrained hardware needs. We first demonstrated that the
[9] Francisco Rodriguez-Henriquez,N.A. Saqib,A. Diaz-
scalability of this algorithm can be kept in the hardware
description language(VHDL). The simple iterative loop Perez,Cetin Kaya K09, “Cryptographic Algorithms on
design achieves interesting performance in area and power Reconfigurable Hardware”, Springer Series on Signals
reduction, improvise throughputs in FPGA. In addition we and Communication Technology,2006.
analysed the power consumed by the SEA module for
different variants in data block and word size. [10] Beuchat,J.-L.; Lab. De l'Infonnatique du Parallelisme,
“ Some Modular adders and multipliers for Field
It is also important to emphasize a number of advantages in
programmable Gate arrays”, in Proc. Parallel and
SEA that cannot be found in other recent block ciphers,
namely its simplicity, scalability(re-implementing SEA for a Distributed processing symposium 2003.
new block size does not require to re-write code), good
combination of encryption and decryption. [11] J.-L. Beuchat. “Modular Multiplication for FPGA
Implementationof the IDEA Block Cipher”, Technical
6 ACKNOWLEDGEMENT Report 2002-32,Laboratoire de l‟Informatique du
We are grateful to the experts who have contributed towards Parall´elisme, Ecole NormaleSup´erieure de Lyon, 46
development of our work. We acknowledge Shankar Kuhan, All´ee d‟Italie, 69364 LyonCedex 07, Sept. 2002.
Thirumurugan and Praveen V for all their help during the
design phase. [12] J.-L. Beuchat and A. Tisserand. Small Multiplier-
basedMultiplication and Division Operators for Virtex-
II Devices.In M. Glesner, P. Zipf, and M. Renovell,
7 REFERENCE editors, Field-Programmable Logic and Applications –
[1] F.Mace, F.X Standert, J J Quisquater “FPGA ReconfigurableComputing Is Going Mainstream,
implementation(s) of a Scalable Encryption algorithm” number 2438 in LectureNotes in Computer Science,
IEEE Transactions on VLSI Systems, Vol.16, 2008, pages 513–522. Springer, 2002.
pp.212-216.
18