0% found this document useful (0 votes)
11 views8 pages

Analysis and Comparison of Symmetric Key Cryptographic Algorithms On FPGA

The document discusses the analysis and comparison of symmetric key cryptographic algorithms implemented on FPGA, focusing on algorithms like DES, TDES, IDEA, and Blowfish. It highlights the importance of data security in communication systems and evaluates the performance of these algorithms based on various parameters such as area utilization, power consumption, and encryption/decryption time. The findings suggest that while Blowfish offers high security due to its large key size, TDES provides better resistance against brute force attacks compared to DES.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views8 pages

Analysis and Comparison of Symmetric Key Cryptographic Algorithms On FPGA

The document discusses the analysis and comparison of symmetric key cryptographic algorithms implemented on FPGA, focusing on algorithms like DES, TDES, IDEA, and Blowfish. It highlights the importance of data security in communication systems and evaluates the performance of these algorithms based on various parameters such as area utilization, power consumption, and encryption/decryption time. The findings suggest that while Blowfish offers high security due to its large key size, TDES provides better resistance against brute force attacks compared to DES.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)

IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

Analysis and Comparison of Symmetric Key


Cryptographic Algorithms on FPGA
Anusha R. Shankari N
Assistant Professor, dept. of Electronics Assistant Professor, dept. of Electronics
& Communication Engineering & Communication Engineering
NMAM Institute of Technology NMAM Institute of Technology
Nitte, India Nitte, India
[email protected] [email protected]

Vaishnavi S. Shetty Srikanth Bhat K


2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) | 978-1-6654-0118-0/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICSSIT53264.2022.9716416

M.Tech., dept. of Electronics & Assistant Professor, dept. of


Communication Engineering Information Science & Engineering
NMAM Institute of Technology NMAM Institute of Technology
Nitte, India Nitte, India
[email protected] [email protected]

Abstract— Data security is considered as one of the prime symmetric key is comparatively less than the Asymmetric
concern for every communication systems. Cryptography has key. Eg: Rivest-Shamir Adelman (RSA), Diffie-Hellman
come up as a resolution which plays a dynamic role in data
security against various data attacks. The cryptography is most II. LITERATURE SURVEY
significant feature of communications security and becoming an Shetty, Vaishnavi S. et al.[3] Surveyed on extensively used
vital building block for network security. This security symmetric key algorithms such as DES, Blowfish, TDES,
mechanism uses some algorithms to convert readable data into PRESENT and KLEIN. On the basis of no. of rounds, size
unreadable data text which can be only accessed by intended
of key, algorithm structure, size of block, and data attacks, a
receiver. In this paper the implementation of some algorithms is
done such as Triple Data Encryption Standard ( TDES), comparison of block cipher cryptographic algorithms is
International Data Encryption Algorithm (IDEA), Data made. DES does not provide long-term security because of
Encryption Standard (DES) and Blowfish algorithm block its small key size length and is easily hacked. When
ciphers for encryption as well as decryption process using compared to DES with a large key size, Triple DES is more
Xilinx 14.5 tool in Verilog as programming language and secure and resistant to brute force attacks. The Blowfish
comparison of algorithms is carried out with performance method has a high level of security due to its large key size,
parameters such as area utilization, power consumption, and is resistant to both linear and differential assaults. The
encryption and decryption time using Spartan6 FPGA device. various lengths of KLEIN deals with giving state-of-the-art
outcomes in their industry while maintaining flexibility and a
Keywords— Data Encryption Standard, Triple Data
Encryption Standard, International Data Encryption reasonable security level for global-based applications.
Algorithm, Blowfish, Field Programmable Gate Array.
Ruziq, F. and Sihombing, P. [4] carried out the combination
I. INTRODUCTION analysis of the LUC algorithm and DES algorithm on data file
Cryptography is a technique for safeguarding data from security. The message will be encrypted with the DES
cyber-attacks. The plaintext in cryptography refers to the algorithm, while the DES external key will be encrypted with
original data, whereas the ciphertext is referred to as secured the LUC algorithm before being sent to the receiver.
data. The encryption method and decryption method are the According to the findings, the length of a file character is
two steps of cryptography. Encryption method is the process directly related to the time it takes to encrypt and decrypt it.
of changing plaintext to ciphertext. The process of The LUC key generation procedure is extremely dependent
transforming ciphertext to plaintext is referred to as on the DES and LUC algorithms when used together. The
decryption. Private key and Public key cryptography [1] are LUC algorithm produces alternative cipher keys when the
the two types of cryptography. The key required for the same DES external keywords are used multiple times. The
encryption and decryption processes in private key cipher key generated by DES external key encryption is
cryptography is same. As a result, before sending any form of different and longer, which improves message security when
data, the key distribution must be finished.. This key acts as utilizing hybrid DES and LUC algorithm cryptography.
vital role in cryptography because of the effect of key size on
security. Examples are Blowfish, Triple DES, DES and Anusha, R. et al. [5] presented an overview of the Blowfish
Blowfish Algorithm [2]. In Asymmetric Cryptography, two algorithm and compares it to DES and IDEA in terms of key,
different types of keys are used: Private key and Public Key. block, rounds, data attack, performance, and flexibility. In
The public key is freely given to the public without any comparison to other algorithm, the Blowfish cryptographic
protection and is necessary to encrypt data, while the private
method is fast and versatile, and provides good security.
key, which is only known by the sender, is necessary to decode
data. Encryption using symmetric key is substantially faster
compared to asymmetric key. The memory requirement of a Damrudi, M. and K. Jadidy Aval [6] presented an innovative
idea to achieve higher security by using cryptography and

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 293


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)
IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

steganography. Huffman is the compression algorithm, RSA, be employed in a variety of applications, including military
AES, TDES, DES, and Blowfish are the cryptography surveillance, environmental monitoring, industrial control,
methods, and LSB is the steganography technique. The data and medical monitoring. Smart grids, mobile phones, RFID
is first compressed using Huffman coding, and then tags, smart cards, and microchips are examples of wireless
encrypted using the above-mentioned encryption techniques. sensor networks that use limited resources. The many ultra-
The confidential message's encrypted text is then inserted in lightweight block ciphers whose purpose is to be software
the cover image using the LSB technique in MATLAB and hardware efficient have been illustrated in this study.
R2016a. The PSNR and MSE error measurements are used to Some factors, such as key size, block size, rounds, and cycles,
compare the strength of the proposed approach. The findings have been used to compare different block ciphers and
show a high PSNR and a low MSE, indicating that the pre- concluded that they must have high throughput and low
processing of the approach using compression and encryption complexity, according to a comparison of various block
methods was successful. In addition, the histograms of the ciphers.
main and enclosed images show that the algorithms achieve
the desired stego- image quality. Shakir, A.N. [12] proposed an encryption technique and
applied it for transmitting data across a network, with the
Asassfeh, M.R. et al. [7] presented the performance software written in the c language. To verify the quality of
estimation of blowfish cryptography algorithm on a parallel security message, the Rivest-Shamir-Adleman (RSA)
platform. The algorithm was developed using the MPI method and the International Data Encryption Algorithm
library, and the experimentation was run on the IMAN1 (IDEA) are considered as a mixture of symmetric and
supercomputer. The experimental results display that asymmetric cryptographic techniques. The following results
increasing the amount of processors reduces the run time of were obtained in the test lab: an algorithm containing more
the blowfish algorithm, as well as rising the speed. It attained than a partial method was adopted, resulting in greater
the best value when the amount of processors is 32 for a confidentiality and complexity as well as the elimination of
plaintext block size of 160Mbyte, and the parallel efficiency the key supply problem. Because the secret is in the
is the greatest. When the processors amount is 2,4,8, the encryption key, which is unpredictable and difficult to detect.
parallel efficiency is up to 99%, 98%, and 66% individually, Furthermore, the use of the RSA method in combination with
when the number of processors is 16, 32, 64, 128, the parallel the IDEA method is recommended for increased security and
efficiency is up to 42%, 24% t, 10%, and 5%, respectively. increased encryption efficiency. It also increased the key
space without increasing the operating time, which is
Shakya, Subarana [8] provides a data security analysis and promising in the field of information and communication
solution for a data migration privacy protection framework. technology.
A Secure Socket Layer (SSL) is installed, and migration
tickets with the bare minimum of permissions are introduced. Mitra, S. et al. [13] proposed TDES cryptographic algorithm
Furthermore, Prediction Based Encryption is used to encrypt to secure widely used e-Transactions such as Electronic Fund
data (PBE). This solution will be useful for healthcare and e- Transfer (EFT), Credit or Debit Cards, e-Wallets, mobile
commerce systems that need to store credit card information. banking. Typically, many assaults on cashless e-Commerce
transactions have been detected, in which intruders attempt to
Anusha R et al. [9] proposed a near field communication modify data for malicious purposes. One popular method of
(NFC) approach that allows users to do touchless processes avoiding such data attacks and preventing cross site grabbing
using their mobile devices. The use of an algorithm in NFC susceptibilities, insecure permissions, and additional
creates complications, and it may lead to possible encryption potential risks is to use cryptographic techniques. TDES is a
for challenging cryptographic algorithms, which is optimal security strategy that outperforms the other most often used
for security, but does not provide communication for future algorithms in terms of security. TDES is a billion times
applications that require streaming data. stronger than DES in terms of security, but is slower in terms
of encryption time.
Hara, T.K., et al. [10] proposed a technique that combined the
concepts of the Diffie Hellman and Blowfish algorithms.
Initially , a computer user will encode a data file using a III. . OVERVIEW OF SYMMETRIC KEY ALGORITHMS
secret- key created by the blowfish method. The Diffie- A. DATA ENCRYPTION STANDARD (DES)
Hellman procedure is then used to generate a common
Data Encryption Standard is a digital encryption
private- key for two computer users attempting to connect
standard that has been accepted as a national security
through an unsecure network. If the second computer user
standard since 1976. It was standardized in 1977 by the
needs to decrypt the data file encrypted by the first computer
National Bureau of Standards which is currently called as
user, then he or she must appeal permission using the shared
National Institute of Standards and Technology. For the past
key. The file can be decrypted using the blowfish algorithm
30 years, it has been the most widely used block cipher.
once the permission has been granted. Thus, by offering a two
level security mechanism and eliminating utmost of the flaws
of present algorithms, the suggested system seeks to confirm
that data is accessed by only the designated user.

Kaur, J., and Sidhu, B. K [11] proposed the importance of


wireless sensor networks and the variety of attacks that may

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 294


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)
IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

The Permuted choice-1 is the initial step (PC-1). The original


64-bit key was permuted to a 56-bit key in PC-1, where eight
additional bits were eliminated as parity-drop bits, and the
remaining 56-bits were split into two parts: Left 𝐶0 and
Right𝐷0 of each 28-bit. Each portion is moved to the left by
one or two bits. Shifting is single bit in 1,2,9, and 16 rounds,
and in the remaining rounds it is two bits. The result of
combining two portions to make 56-bit. According to
Permuted choice-2, this 56-bit data is compressed to 48-bit
data (PC-2), which are then used as a round key
𝑘1, 𝑘2 … . . , 𝑘16.
Decryption method of DES stays same as encryption method
but round keys are in reverse order.
B. TRIPLE DATA ENCRYPTION ALGORITHM (TDES)
TDES is a symmetric key cryptography technique that was
developed in the year 1995 and is based on the DES method.
The plaintext is divided into 64-bit blocks by the TDES
algorithm. TDES employs the DES algorithm three times. As
a result, each DES application requires three separate keys
(𝐾1, 𝐾2 , 𝐾3 ). It rises the key length size to 168- bits (each key
Figure 1. Structure of DES Algorithm [14]
is 56 bits), and the key is referred to as a key bundle as
As per Figure 1, Initial permutation is the first stage. It indicated in Figure 3.
shuffles 64-bit plaintext according to a predetermined
permutation. The original permutation result was then
partitioned into two 32-bit parts: right 𝑅 0 . and left 𝐿 0 . Right
32-bit 𝑅 0 . is applied to a round function ‘F' for each round,
and the result is then XORed to a Left 32-bit 𝐿 0. Both the
parts are then swapped together and the algorithm continues
to the next iteration.
The steps that make up the round function ‘F' are as follows.
The first step is to increase the right 32-bit input to 48-bits. In
the second stage, the expansion results are XORed using a
round key. The 48-bit results from the previous phase are
separated into eight 6-bit chunks and supplied into a
substitution box in the third stage. Each box produces a 4-bit Figure 3. Structure of TDES Algorithm [16]
output. Final permutation is the last phase, in which the 32-
bit output from the preceding stage is rearranged according to The fundamental structure of TDES algorithm is identical to
a specified permutation. that of DES in both decryption and encryption method. In
The subkeys required for sixteen rounds are obtained from decryption, TDES performs all the similar steps of encryption
key generation schedule structure as shown in Figure 2. process but in opposite direction. User initial decrypt the
plaintext using 𝐾3 then encrypt with 𝐾2 and finally decrypt
using 𝐾1 .
C. INTERNATIONAL DATA ENCRYPTION ALGORITHM
(IDEA)
The International Data Encryption Algorithm is a symmetric
key cryptography. It was initially termed as Improved
Proposed Encryption Standard and was released in the year
1991 by Xuejia Lai and James Massey of the Swiss Federal
Institute of Technology. It makes the usage of 64-bit input, a
28-bit key, and 8 identical encryption rounds with 6 different
subkeys, as well as four keys for output transformation. This
algorithm contains three different algebraic processes
completely and it avoids the use of S-boxes are the following:
modular multiplication, modular addition, and XOR.

Figure 2. Key Schedule Structure [15]

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 295


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)
IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

Decryption method is similar to encryption, excluding that


the round keys are inverted and the subkeys for the odd
rounds are inversed. For example, for each group operation,
the values of subkeys 𝑍1 –𝑍4 are replaced by the inverse of
𝑍49 –𝑍52, and for decryption, 𝑍5 and𝑍6 of each group should
be replaced by 𝑍47 and 𝑍48.
D. BLOWFISH ALGORITHM
Blowfish algorithm was standardized by Bruce Schneier in
1993 as substitute to the present symmetric key algorithms.
Blowfish algorithm is used in place of DES and IDEA as a
form of drop in replacement. It makes use of 64bit size of
block and variable key length from 32 to 448 bits, making
appropriate for domestic and international use. It employs
big key-dependent S-boxes and is a 16-round Feistel cipher.

• Key Expansion
Blowfish algorithm key expansion starts through S-
boxes and P- array, which contains a lot of sub-keys
and necessitate precomputation before data
Figure 4. Structure of IDEA Algorithm [17]
encryption or decryption. 𝑃1 , 𝑃2 , . . . 𝑃18 are the
eighteen 32-bit sub-keys that make up the P-array.
From Figure 4 , the 64-bit block of plaintext is broken into Each of the four 32-bit S-boxes has 256 entries:
four 16-bit plaintext parts, referred to as 𝑋1 through 𝑋4 . As a 𝑆1,0 , 𝑆1,1 , 𝑆1,2 … , 𝑆1,254 , 𝑆1,255 ;
result, the first round of the algorithm's inputs are 𝑋1 to𝑋4 . 𝑆2,0 , 𝑆2,1 , 𝑆2,2 … , 𝑆2,254 , 𝑆2,255 ;
There are a total of eight of these rounds. In each round, 6 sub 𝑆3,0 , 𝑆3,1 , 𝑆3,2 … , 𝑆3,254 , 𝑆3,255 ;
keys (each of 16 bits) are created from 128 bit original key. 𝑆4,0 , 𝑆4,1 , 𝑆4,2 … , 𝑆4,254 , 𝑆4,255 ;
These sub keys are assigned to the four initial input blocks
numbered 𝑋1 through 𝑋4 . Thus, there are six sub-keys in the • Initiating the sub keys:
first round, 𝑍1 to 𝑍6 . Keys 𝑍7 to 𝑍12 are available for the
second round. Finally, 𝑍43 to 𝑍48 are the keys that remain. 1.The P-array is first initialized, then the four S-
The final step is an Output Transformation, which only boxes with a fixed string containing the hexadecimal
requires four sub-keys. The Output Transformation round digits of pi.
produces the final output 𝑌1 to 𝑌4 . 2.XOR 𝑃1 with the first 32 bits of the key, XOR𝑃2 with the
second 32 bits, and so on until the key's bits reach 𝑃14 . The
• Key Schedule cycle is repeated for each key bit until the full P-array has
The original 128 bit key is used to produce the first six been XORed with key bits.
sub-keys, 𝑍1 to 𝑍6. Out of the initial 128 bits, the first 96 3.Using the sub-keys stated in steps 1 and 2, the Blowfish
bits are used for the first round since the sub-keys are algorithm is then used to encrypt the all-zero string.
each 16 bits long. As a result, bits 97–128 of the original 4. 𝑃1 and 𝑃2 are replaced with the step 3 output.
key are left unused at the end of the first round. The first 5.Encrypt the output of step 3 with the modified subkeys
round's unused 32 bits are utilized in the second round. using the blowfish technique.
For the second round, 64 additional bits are necessary to 6.Replace 𝑃3 and 𝑃4 with the output of step 5
construct the remaining sub-keys. This is accomplished 7.The procedure is repeated, with all components of the P-
by moving the original key 25 bits to the left in a cyclical array replaced first, followed by all four S-Boxes, and the
fashion. The changed key is then used to create the result changing continually.
remaining four sub-keys in the same manner as the first
round keys. For the rest of the rounds, the sub-key The Blowfish architecture with 16 number of rounds is
creation is carried out in the same manner as shown in depicted in Figure 6. The input is a 64-bit plaintext, which is
Figure 5. split into two 32 bits parts called 𝐿𝐸0 and 𝑅𝐸0. Decryption
method is alike to encryption method, but the numbers
𝑃1 , 𝑃2 , . . . 𝑃18 are given in reverse order.

Figure 5. IDEA Key Generation [18]

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 296


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)
IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

IV. RESULTS AND DISCUSSIONS


This segment provides the simulation outcomes of DES,
Triple DES, IDEA and Blowfish symmetric key algorithms
for both encryption and decryption process. The simulation
of mentioned block cipher algorithms are done by using
Xilinx 14.5 in Verilog code.
A. DATA ENCRYPTION STANDARD
Encryption simulation waveform of DES algorithm is shown
in Figure 8. The input key, plaintext as shown below
Key (in hex): “aabb09182736ccdd”
Plaintext /data_in (in hex): “123456abcd132536”

Figure 8. DES Encryption Process


Figure 6. Structure of Blowfish algorithm [19]
Decryption simulation waveform of DES algorithm is shown
The blowfish symmetric key algorithm transforms plaintext in Figure 9. The input key, plaintext as shown below.
into ciphertext using a 64- bit block component. Initially , the Key (in hex): “aabb09182736ccdd”
64-bit plaintext is divided into two 32- bit parts, which serve Ciphertext / data_in (in hex): “c0b7a8d05f3a829c”
as the Blowfish algorithm foundation. The XOR is then
implemented among the initial part 32-bit block (𝐿𝐸0 ) and
first P-array. The 32-bit data then passed to the F- function,
which produces 32-bit data block. Finally, XORed with the
second part of the block (𝑅𝐸0 ) obtained from the 64-bit
plaintext split. The 32-bit parts, 𝐿 and 𝑅 are exchanged for
upcoming iterations of the Blowfish algorithm once the XOR
operation is completed.

• F function
The important block in the Blowfish algorithm is F
function. It takes a 32-bit input and divides it into
Figure 9. DES Decryption Process
four 8-bit portions equally. The equivalent of each
sub-division S-box is used to convert each 8-bit sub- B. TRIPLE DATA ENCRYPTION STANDARD
division into a 32-bit data block. Using addition Encryption simulation waveform of Triple DES algorithm is
modulo 232 and XOR final 32-bit outputs are shown in Figure 10. The input key, plaintext as shown below
generated as shown in Figure 7. Key1 (in hex): “0352020767208217”
Key2 (in hex): “8602876659082198”
Key3 (in hex): “64056abdfea93457”
Plaintext /data_in (in hex): “7371756967676C65”

Figure 7. Basic F – Function Feistel Network [20]


Figure 10.TDES Encryption Process

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 297


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)
IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

Decryption simulation waveform of Triple DES algorithm is


shown in Figure 11. The input key, plaintext as shown below
Key1 (in hex): “0352020767208217”
Key2 (in hex): “8602876659082198”
Key3 (in hex): “64056abdfea93457”
Ciphertext /data_in (in hex): “c07d2a0fa566fa30”

Figure 14. Blowfish Encryption Process

Decryption simulation waveform of Blowfish algorithm is


shown in Figure 15. The input key, plaintext as shown below.
Key(in hex): “d5118e9dd5118e9d”
Figure 11. TDES Decryption Process Ciphertext / data_in (in hex): “ba799b150d434cfd”
C. INTERNATIONAL DATA ENCRYPTION ALGORITHM
Encryption simulation waveform of IDEA algorithm is
shown in Figure 12. The input key, plaintext as shown below
Key(in hex):“7ca110454a1a6e5701a1d6d039776742”
Plaintext /data_in (in hex): “690f5b0d9a26939b”

Figure 15. Blowfish Decryption Process

V. COMPARATIVE ANALYSIS
The comparison analysis of symmetric key algorithms are
shown in Table 1. This study is useful for determining the
structure, size of block, size of key, number of rounds, S-
boxes, and vulnerability to different data attacks of
Figure 12. IDEA Encryption Process
encryption and decryption algorithms such as DES, TDES,
Decryption simulation waveform of IDEA algorithm is Blowfish, and IDEA.
shown in Figure 13. The input key, plaintext as shown below.
Key(in hex):“7ca110454a1a6e5701a1d6d039776742” Table 1. Comparison List Of Different Attributes Considering for
Ciphertext / data_in (in hex): “1bddb24214237ec7”
Algorithms Using Symmetric Key

ALGORI DES TDES BLOW IDEA


THMS FISH
Created By IBM and IBM Bruce Xuejia
adopted Schneier Lai and
by NIST James
Massey
Year 1975 1995 1993 1991
Figure 13. IDEA Decryption Process
Size of 64 64 64 64
D. BLOWFISH ALGORITHM block (bits)
Encryption simulation waveform of Blowfish algorithm is Size of Key 56 56,112, 32- 448 128
shown in Figure 14. The input key, plaintext as shown below
Key(in hex): “ d5118e9dd5118e9d” (bits) 168
Plaintext /data_in (in hex): “d5118e9dd5118e9d”

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 298


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)
IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

Rounds 16 48 16 8.5 as out of out of


logic of 272 of 272
Structure Feistel Feistel Feistel Substitu
272 88 272 88
Network Networ Network tion- 88 88
k Permuta Numbe 471 6% 308 4% 135 19% 253 3%

tion r of out out 3 out


occupi of of out of
Networ
ed 682 682 of 682
k
slices 2 2 682 2
No. of S- 8 8 4 N/A 2

boxes Numbe 185 58% 304 96% 256 81% 192 60%
r of out out out out
Possible Brute Chosen Brute Differen
bonded of of of of
Attacks force - force tial IOBs 316 316 316 316
attack, plainte attack, attack,
Differenti xt or Known- biclique
B. Timing Analysis
al Known plaintext attack
Encryption Time: This is defined as the total time taken by
cryptoana plainte attack the encryption algorithm to generate a ciphertext from a
lysis, xt plaintext.
Decryption Time: The decryption time is the inverse of
linear attack encryption time that can be defined as the total time taken by
cryptoana the decryption algorithm to create a plaintext from a
ciphertext. The timing summary of symmetric key algorithms
lysis are shown in Table 3.

VI. PERFORMANCE ANALYSIS Table 3. Timing Analysis of Symmetric Key algorithms

A. Device Utilization Analysis Algorithms Encryption Decryption


To analyze the device utilization summary of DES, Triple Time(ns) Time (ns)
DES, Blowfish and IDEA, FPGA Spartan6 is used. .The
algorithm is simulated and synthesized in Xilinx 14.5 with DES 57.841 57.841
family Spartan6. such as number of slice LUTs, number used Triple DES 17.087 17.087
as logic, occupied slices, bonded IOBs. The device utilization
summary of symmetric key algorithms are shown in Table 2. IDEA 267.545 266.902
Blowfish 15.413 15.607
Table 2. Device Utilization Summary of Symmetric Key Algorithms

Algori DES TDES IDEA BLOWFISH C. Power Analysis


thms The power consumption describes how much power is
Device Spartan6 Spartan6 Spartan6 Spartan6 needed in order to implement both encryption and decryption
process. The power summary of symmetric key algorithms
s (xc6slx45) (xc6slx45) (xc6slx45) (xc6slx45)
are shown in Table 4.
Device Us Utili Use Utili Use Utiliz Us Utilize
Utilizat ed zed d zed d ed ed d Table 4. Power Analysis of Symmetric Key algorithms
ion
Algorithms Encryption Decryption
Numbe 141 5% 867 3% 366 13% 726 2%
r of 8 out 6 out Power (mW) Power(mW)
Slice out of out of DES 39.35 38.76
LUTs of 272 of 272
Triple DES 38.52 38.34
272 88 272 88
88 88
IDEA 79.33 79.63
Numbe 141 5% 867 3% 366 13% 726 2% Blowfish 36.04 36.04
r used 8 out 6 out

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 299


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022)
IEEE Xplore Part Number: CFP22P17-ART; ISBN: 978-1-6654-0118-0

CONCLUSION (HIS) (pp. 278-282). IEEE.


[16] Mohammad, O.F., Rahim, M.S.M., Zeebaree, S.R.M. and Ahmed,
F.Y., 2017. A survey and analysis of the image encryption
Nowadays it is obvious that, to obtain more security methods. International Journal of Applied Engineering
and to increase the performance of information security, Research, 12(23), pp.13265-13280.
efficient encryption methods are to be used. The main [17] Almasri, O. and Jani, H.M., 2013. Introducing an Encryption
intention of this paper is to analyze the performance of Algorithm based on IDEA. International Journal of Science and
Research (IJSR), India, 2(9).
symmetric key cryptographic algorithms for both encryption [18] Shehata, K., Hamdy, N., Elagooz, S. and Helmy, M., 2003, May.
and decryption methods on data. The FPGA implementation Design and implementation of IDEA algorithm key schedule on
of algorithms is done in Xilinx 14.5 and simulated using ISIM FPGA. In International Conference on Aerospace Sciences and
simulator. By analyzing device utilization, time and power of Aviation Technology (Vol. 10, No. 10th International Conference On
Aerospace Sciences & Aviation Technology, pp. 717-727). The
symmetric key algorithms obtained by FPGA Spartan6 shows Military Technical College.
that blowfish algorithm is best and takes less area, time and [19] Hassoon, N.H., Ali, R.A., Abed, H.N. and Alkhazraji, A.A.J., 2018.
power compared to other algorithms (DES,TDES and IDEA Multilevel hiding text security using hybrid technique steganography
) for both encryption and decryption process. and cryptography. International Journal of Engineering &
Technology, 7(4), pp.3674-3677.
[20] Hemeida, F., Alexan, W. and Mamdouh, S., 2019, October.
REFERENCES Blowfish–secured audio steganography. In 2019 Novel Intelligent
and Leading Emerging Sciences Conference (NILES) (Vol. 1, pp. 17-
[1] Delfs, H., Knebl, H. and Knebl, H., 2002. Introduction to 20). IEEE.
cryptography (Vol. 2). Heidelberg: Springer.
[2] Rountree, D., 2011. Security for Microsoft Windows system
administrators: introduction to key information security concepts.
Elsevier.
[3] Shetty, V.S., Anusha, R., MJ, D.K. and Hegde, P., 2020, February.
A Survey on Performance Analysis of Block Cipher Algorithms.
In 2020 International Conference on Inventive Computation
Technologies (ICICT) (pp. 167-174). IEEE.
[4] Ruziq, F. and Sihombing, P., “ Combination Analysis of Data
Encryption Standard (DES) Algorithm and LUC Algorithm on File
Security.”, International Journal of Research and Review,
Vol.7,Issue: 2, February 2020.
[5] Anusha, R., Kumar, M.D., Shetty, V.S. and Hegde, N.P., 2020,
November. Symmetric Key Algorithm in Computer security: A
Review. In 2020 4th International Conference on Electronics,
Communication and Aerospace Technology (ICECA) (pp. 765-769).
IEEE.
[6] Damrudi, M., and K. Jadidy Aval., "Image Steganography using LSB
and Encrypted Message with AES, RSA, DES, 3DES and
Blowfish.",International Journal of Engineering and Advanced
Technology 8, Volume-8, Issue-6S3, September 2019.
[7] Aboshsha, B., Dessouky, M., Ramadan, R. and El-Sayed, A., 2019.
Immunity of Lightweight DES Algorithm (DESL) Against Linear
Cryptanalysis Attack. Menoufia Journal of Electronic Engineering
Research, 28(ICEEM2019-Special Issue), pp.381-387.
[8] Shakya, Subarana. "An efficient security framework for data
migration in a cloud computing environment." Journal of Artificial
Intelligence 1.01 (2019): 45-53.
[9] Anusha, R. "Qualitative assessment on effectiveness of security
approaches towards safeguarding NFC devices &
services." International Journal of Electrical and Computer
Engineering (IJECE) 8, no. 2 (2018): 1214-1221.
[10] Hazra, T.K., Mahato, A., Mandal, A. and Chakraborty, A.K., 2017,
August. A hybrid cryptosystem of image and text files using
blowfish and Diffie-Hellman techniques. In 2017 8th Annual
Industrial Automation and Electromechanical Engineering
Conference (IEMECON) (pp. 137-141). IEEE.
[11] Kaur, J. and Sidhu, B.K., 2017. A Survey on Lightweight Block
Ciphers for Wireless Sensor Network. International Journal of
Advanced Research in Computer Science, 8(5).
[12] Shakir, A.N., “Study and Design of an Encryption Algorithm for
Data Transmitted Over the Network by the IDEA and
RSA.”, International Journal of Computer Applications( 975,
p.8887), Volume 176 – No.4, October 2017 .
[13] Mitra, S., Jana, B. and Poray, J., 2017, December. Implementation of
a novel security technique using triple DES in cashless transaction.
In 2017 International Conference on Computer, Electrical &
Communication Engineering (ICCECE) (pp. 1-6). IEEE.
[14] Singh, Gurpreet. "A study of encryption algorithms (RSA, DES,
3DES and AES) for information security." International Journal of
Computer Applications 67, no. 19 (2013).
[15] Zodpe, H.D., Wani, P.W. and Mehta, R.R., 2012, December. Design
and implementation of algorithm for DES cryptanalysis. In 2012
12th International Conference on Hybrid Intelligent Systems

978-1-6654-0118-0/22/$31.00 ©2022 IEEE 300


Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on July 13,2024 at 21:12:15 UTC from IEEE Xplore. Restrictions apply.

You might also like