Implementation of Optimized DES Encryption Algorithm upto 4 Round on Spartan 3

 Abstract— Data Security is an important parameter for the industries. It can be achieved by Encryption algorithms which are used to prevent unauthorized access of data. Cryptography is the science of keeping data transfer secure, so that eavesdroppers (or attackers) cannot decipher the transmitted message. In this paper the DES algorithm is optimized upto 4 round using Xilinx software and implemented on Spartan 3 Modelsim. The paper deals with various parameters such as variable key length, key generation mechanism, etc. used in order to provide optimized results.

[1]  C. Boyd,et al.  Modern data encryption , 1993 .

[2]  Xun Yi Identity-based fault-tolerant conference key agreement , 2004, IEEE Transactions on Dependable and Secure Computing.

[3]  A. Kh. Al Jabri,et al.  Secure progressive transmission of compressed images , 1996 .

[4]  Jongan Park,et al.  The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[5]  S. V. Wunnava,et al.  Data encryption performance and evaluation schemes , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).

[6]  Birgit Pfitzmann,et al.  Relating symbolic and cryptographic secrecy , 2005, IEEE Transactions on Dependable and Secure Computing.

[7]  Jean Arlat,et al.  IEEE Transactions on Dependable and Secure Computing , 2006 .

[8]  Manu Bansal,et al.  FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E , 2010 .

[9]  Stephen M. Matyas,et al.  The data encryption standard , 1997, Inf. Secur. Tech. Rep..

[10]  E. Dawson,et al.  A single-chip FPGA implementation of the data encryption standard (DES) algorithm , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).

[11]  Whitfield Diffie,et al.  Cryptographic technology: fifteen year forecast , 1982, SIGA.

[12]  Elisa Bertino,et al.  An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.

[13]  Ritu Agarwal,et al.  Peformance analysis of data encryption algorithms , 2011, 2011 3rd International Conference on Electronics Computer Technology.