Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware

With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent confidentially over the network without fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. In this paper, first, an overview of two well known symmetric encryption cores is presented, namely the 3DES and RC5. Then a performance evaluation of their computer based implementation is compared to demonstrate the RC5 superior performance. The conventional hardware architecture of the RC5 core is presented and investigated. A hardware system design is proposed to improve its performance. The proposed architecture achieved with three stage pipeline technique an increased encryption throughput as compared to related work. By exploiting modern features in Field Programmable Gate Arrays (FPGA), which allow the modeling of a System-on- Programmable-Chip (SoPC), this paper proposes a model for symmetric encryption algorithms ( e.g., RC5). Structural System analysis of the proposed model shows that it offers extra security against single-site physical access attack that other implementations are vulnerable to. By evaluating the performance of this proposed SoPC model, one finds that it raises the encryption throughput to 300 Mbps. Hence, we report over 80% increase in the encryption throughput as compared to related work. Moreover, our work lowers the implementation cost due to the integration of all system parts into one chip.

[1]  Walter Anheier,et al.  Efficient VLSI implementation of modern symmetric block ciphers , 1999, ICECS'99. Proceedings of ICECS '99. 6th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.99EX357).

[2]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  " Cryptography : A New Dimension in Computer Data , 2022 .

[5]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[6]  Ronald L. Rivest,et al.  The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms , 1996, RFC.

[7]  Julian Brently Sessions,et al.  Fast software implementations of block ciphers , 1998 .

[8]  Cheryl Madson,et al.  The ESP DES-CBC Cipher Algorithm With Explicit IV , 1998, RFC.

[9]  Ralph Howard,et al.  Data encryption standard , 1987 .

[10]  Odysseas G. Koufopavlou,et al.  Mobile Communications World: Security Implementations Aspects - A State of the Art , 2003, Comput. Sci. J. Moldova.

[11]  Odysseas G. Koufopavlou,et al.  Area optimized architecture and VLSI implementation of RC5 encryption algorithm , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.

[12]  Burton S. Kaliski,et al.  On the Security of the RC5 Encryption Algorithm , 1998 .

[13]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[14]  Abraham Bookstein,et al.  Cryptography: A new dimension in computer data security ? and ?. Wiley-Interscience, New York (1982). xxi + 775 pp., $43.95. ISBN 0471-04892-5. , 1985 .

[15]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[16]  Andrew Mason CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) (2nd Edition) , 2004 .

[17]  William Hugh Murray,et al.  Modern Cryptography , 1995, Information Security Journal.

[18]  장훈,et al.  [서평]「Computer Organization and Design, The Hardware/Software Interface」 , 1997 .

[19]  P. V. Oorschot Overview of Cryptography , .