Case study: integrated design of RC5 encryption

With the wireless communications coming to homes and offices, the need to have a secure data transmission is of utmost importance. Today, it is important that information is sent confidentially over the network without fear of hackers or unauthorized person having access to it; this makes security implementation in networks a crucial demand. RC5 is an encryption algorithm which is widely used in wireless transport layer security. In this paper, RC5 system architecture is investigated and a high-performance design in terms of encryption throughput is introduced. The proposed architecture designed with a pipeline technique achieves a higher throughput. In this study, over 80% increase was reported in the encryption throughput as compared to related work.

[1]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[3]  Walter Anheier,et al.  Efficient VLSI implementation of modern symmetric block ciphers , 1999, ICECS'99. Proceedings of ICECS '99. 6th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.99EX357).

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[6]  Odysseas G. Koufopavlou,et al.  Mobile Communications World: Security Implementations Aspects - A State of the Art , 2003, Comput. Sci. J. Moldova.

[7]  Odysseas G. Koufopavlou,et al.  Area optimized architecture and VLSI implementation of RC5 encryption algorithm , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.