Professional Documents
Culture Documents
M.Ananthi
Lecturer, Department of Electrical and Electronics Engineering
OXFORD ENGINEERING COLLEGE, TRICHY.
E-mail : anandhimanivannan1990@gmail.com
Contact No: 9790395578.
clk
round:a2
pt[63..0]
s1[15..0]
s2[15..0]
s3[15..0]
s4[15..0]
s5[15..0]
s6[15..0]
clk
ct[63..0]
round:a3
pt[63..0]
s1[15..0]
s2[15..0]
s3[15..0]
clk
ct[63..0]
s4[15..0]
s5[15..0]
s6[15..0]
pt[63..0]
round:a4
s1[15..0]
s2[15..0]
clk
ct[63..0]
s3[15..0]
pt[63..0]
round:a5
s1[15..0]
s4[15..0]
s2[15..0]
s5[15..0]
s3[15..0]
s6[15..0]
clk
ct[63..0]
pt[63..0]
s4[15..0]
s2[15..0]
s5[15..0]
s3[15..0]
s6[15..0]
round:a6
s1[15..0]
clk
ct[63..0]
s4[15..0]
s5[15..0]
s6[15..0]
pt[63..0]
round:a7
s1[15..0]
s2[15..0]
s3[15..0]
clk
ct[63..0]
pt[63..0]
round:a8
s1[15..0]
s4[15..0]
s2[15..0]
s5[15..0]
s3[15..0]
s6[15..0]
s4[15..0]
s5[15..0]
s6[15..0]
clk
ct[63..0]
pt[63..0]
mod:s1
s1[15..0]
s2[15..0]
ct[63..0]
s3[15..0]
a[15..0]
c[15..0]
b[15..0]
s4[15..0]
s5[15..0]
s6[15..0]
Add0
A [15..0]
B [15..0]
+
ADDER
Add1
ct[63..0]
A [15..0]
B [15..0]
+
ADDER
mod:s2
a[15..0]
c[15..0]
b[15..0]
AREA
ALUT
REG
POWER
Memo
Static
Dynamic
FREQ
I/O
ry
Combinational Logic
2467
Coarse level
0
2478
102
pipelining
Fine level pipelining
9
2479
4
1120
Transitio
ns
371.07mW
4.95mW
38.75m
3446
0.729
580.89mW
5438.64m
W
73.75m
1172597
24.6
588.44mW
W
5681.51m
W
69.16m
1172316
24.7
4. RESULT:
Table.4.1: Comparison of Architectures in area, power, frequency
100%
80%
60%
AREA Memory
40%
AREA REG
20%
AREA ALUT
0%
Combinational Logic
Coarse level pl
Fine level pl
FREQUENCY(in MHz)
30
FREQUENCY(in MHz)
20
10
0
Combinational Logic
Fine level pl
Coarse level pl
Combinational Logic
0%
20%
40%
60%
80%
100%
5. CONCLUSION:
In this paper the three types of Architectures have been implemented and the speed is
increased in fine level pipelining compared with other architectures. By using the modulo
multiplication, the strength of the IDEA have been increased. The big process, inverse modulo
multiplication have been done in the decryption.
REFERENCES:
Atul Kahate Cryptography and Network Security Tata McGraw-Hill Education,
2003.
William Stallings Cryptography and Network Security Principles and Practices 3rd
edition.
Rahul Ranjan1 and I. Ponguzhali2,VLSI Implementation of IDEA Encryption
Algorithm.
web page:www.quadibloc.com/crypto/co040302.html.
Wep page:http://www.shodor.org/interactivate/discussions/CryptographyCipher/
M. Thaduri1, S.-M. Yoo2, R. Gaede3,An efficient VLSI implementation of IDEA
encryption algorithm using VHDL.
,P Kitsos1, O Koufopavlou2, G Selimis3 and N Sklavos4, Low power cryptography
Nick Hoffman1,A Simplified IDEA Algorithm.
A.Fournaris1, N. Sklavos2 and O. Koufopavlou3 VLSI architecture and FPGA
implementation of ICE encryption algorithm.
Rachit Agarwal1, Emanuel Popovici2, Brendan OFlynn3, Coml. OKeeffe4,Low Power
Hardware and Software Implementation of IDEA NXT Algorithm.