A New Cryptography System and its IP Core Design for Multimedia Application

In this paper, we have proposed a new cryptography system which combines both the position permutation and the value transformation encryption methods. Three good features involve in this system: (1) High security evaluated with the measure of fractal dimension, (2) The content of encrypted image is sensitive to the initial key, and (3) This system can easily defense against the exhaustive search attack. Besides, for the requirement of real-time in multimedia system, we also proposed the high performance reconfigurable architecture for this system as well as the IP core generator software. The proposed IP core generator can be parameterized by the parameters of system-type, packet size, throughput and security to create the proper IP core for the applications. All the architectures generated from the IP core generator have been verified; except for the coding guideline checking, there exist 100% code coverage. According to the UMC 0.18 um cell library, we further verified all the configurations of architecture for speed, area and power consumption as well as delivering the essential scripts. The verifications of all the configurations, the throughput can be ranged between 1.59 and 2.25 Gbps with the hardware cost of 0.54 and 3.92 mm2. Compared with the existing designs, the proposed design possesses performance enough for most of multimedia system applications.

[1]  Walter Anheier,et al.  Reusable cryptographic VLSI core based on the SAFER K-128 algorithm with 251.8 Mbit/s throughput , 1998, 1998 IEEE Workshop on Signal Processing Systems. SIPS 98. Design and Implementation (Cat. No.98TH8374).

[2]  Michael Keating,et al.  Reuse Methodology Manual , 1999 .

[3]  Yukio Mitsuyama,et al.  VLSI implementation of high performance burst mode for 128-bit block ciphers , 2001, Proceedings 14th Annual IEEE International ASIC/SOC Conference (IEEE Cat. No.01TH8558).

[4]  Ralph Howard,et al.  Data encryption standard , 1987 .

[5]  L. Kocarev,et al.  Pseudorandom bits generated by chaotic maps , 2003 .

[6]  Xun Yi,et al.  Fast encryption for multimedia , 2001, IEEE Trans. Consumer Electron..

[7]  Wolfgang Fichtner,et al.  VINCI: VLSI implementation of the new secret-key block cipher IDEA , 1993, Proceedings of IEEE Custom Integrated Circuits Conference - CICC '93.

[8]  L. Chua,et al.  Chaos: A tutorial for engineers , 1987, Proceedings of the IEEE.

[9]  Jing-Kun Zhong,et al.  On the parameterized IP core design of the new cryptographic system , 2005, 2005 International Symposium on Intelligent Signal Processing and Communication Systems.

[10]  M. Fox,et al.  Fractal feature analysis and classification in medical imaging. , 1989, IEEE transactions on medical imaging.