Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission

Data security is currently become a serious concern in wireless communication system for both the users and providers. Without a secure medium, the data transmission is exposed to various types of wireless attacks. Therefore, this paper focuses on the development of a high performance parallel-pipelined-memory-based (P2M) Blowfish as a security design with reduced field programmable gate array (FPGA) utilization, which is the best security design to be embedded in the mobile devices. Through FPGA platform, the performance of the proposed Blowfish shows that a throughput increases by 10.5%, with the hardware utilization and power consumption decrease by 3.5% and 21%, respectively. The P2M Blowfish was validated in two-way communication channel by using FPGA-based radio platform together with ZigBee technology and the real-time transmission was measured in terms of bit-error-rate, received power and communication range. These characteristics have proven that the proposed P2M Blowfish possesses the ability to replace the advanced encryption standard which is known as a complex algorithm employed by most of the wireless communication standards.

[1]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[2]  José G. Delgado-Frias,et al.  FPGA schemes for minimizing the power-throughput trade-off in executing the Advanced Encryption Standard algorithm , 2010, J. Syst. Archit..

[3]  Pawan Dubey,et al.  Performance Comparison of Symmetric Data Encryption Techniques , 2012 .

[4]  Bruce Schneier,et al.  Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor , 1997, FSE.

[5]  Mohuya Chakraborty,et al.  FPGA Implementation of Pipelined Blowfish Algorithm , 2014, 2014 Fifth International Symposium on Electronic System Design.

[6]  Sonia Kuwelkar,et al.  IMPLEMENTATION OF AES AND BLOWFISH ALGORITHM , 2014 .

[7]  D Harinath,et al.  Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security , 2015, CSSE 2015.

[8]  M. Anand Kumar,et al.  Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms , 2012 .

[9]  Widad Ismail,et al.  A Survey of High Performance Cryptography Algorithms for WiMAX Applications Using SDR , 2013 .

[10]  Widad Ismail,et al.  Implementation of high performance advanced encryption standard-128 for WiMAX application on FPGA , 2014, 2014 IEEE 2nd International Symposium on Telecommunication Technologies (ISTT).

[11]  W. Ismail,et al.  Performance Comparison of the Improved Power-Throughput AES and Blowfish Algorithms on FPGA , 2017 .

[12]  P. Karthigaikumar,et al.  Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm , 2010, Int. J. Image Graph..

[13]  Widad Ismail,et al.  Implementation of a High-Performance Blowfish for Secure Wireless Communication , 2016 .

[14]  Christof Paar,et al.  An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists , 2000, AES Candidate Conference.

[15]  S. Pon Priyadharshini,et al.  Implementation of Security in Wireless Sensor Network using Blowfish Algorithm , 2014 .

[16]  T. S. B. Sudarshan,et al.  DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques , 2005, Asia-Pacific Computer Systems Architecture Conference.

[17]  Ioannis Papaefstathiou,et al.  Using Reconfigurable Hardware Devices in WSNs for Reducing the Energy Consumption of Routing and Security Tasks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[18]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[19]  Denny Darlis,et al.  An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).