You are on page 1of 1

CHIPCraft …The CAREER Engineering

A RAM-based 128-bit key algorithm for MISTY block cipher

ABSTRACT

Due to the rapid development of wireless communications standards, the security subject
in mobile communications has gained more importance. However, it is far more difficult
to develop new highly qualitative cryptography methods for wireless standards. Some
security features have been added and some existing ones have been improved compared
with previous mobile systems, in order to achieve more efficient and secure offered
services. Many attempts have taken place in order to establish qualitative cryptography
methods. The block size is set to 64 bits instead of 128 (the AES does not specify smaller
block size than 128-bit). This was suggested by the project industry board, because the
market will still need this block size for compatibility with present applications (e.g.,
payments with 8-byte personal identification numbers). It is interested in 64-bit block
ciphers, which are more secure and efficient than the ones presently used. The main
purpose of this project work was the evaluation of these algorithms in terms of hardware
implementation performance. In this evaluation, only the 128-bit key generation
algorithm is proposed.

The MISTY1 block cipher operates with 64-bit block size plaintext and 128-bit secret
key. The second key 128-bit key is generated from the secret key using key generation
algorithm. The algorithm uses two ROM memory (LUT) blocks of size 512x9bit and
128x7bit. The main functional modules used in this architecture are FI module, Key
register and State Machine Controller. The 16-bit input data of the function FI is split into
two 9-bit and 7-bit strings. After transformations, bit wise XOR operations and the usage
of the substitution tables (S-boxes) S7 and S9, the output string is produced. At the
beginning and at the end of Fij function, the 7-bit string is zero-extended (through a block
called ZE). The ZE adds two zero bits in front of the 7-bit string, and in the middle part,
the 9-bit string is truncated to 7 bits. The TR module truncates the two most significant
bits of the 9-bit string. This paper appears in: 7803-8834-8/05/2005 IEEE.

Design, Coding, Simulation and Synthesis is done using various EDA tools

--------------------------------------------------------
Somarouthu Technologies, #304, Mehtab Arcade, Tarnaka X roads, Secunderabad-17
9849 753275, 98490 55866, 98493 55866, 040-27015320. chipcrafthyd@gmail.com
www.somarouthu.com info@somarouthu.com

You might also like