首页> 外文会议>International Conference on Computing Methodologies and Communication >Design of Cryptographic model for End-to-End Encryption in FPGA based systems
【24h】

Design of Cryptographic model for End-to-End Encryption in FPGA based systems

机译:基于FPGA系统的端到端加密加密模型设计

获取原文

摘要

Digitization has transformed our world. The famous World Wide Web, various social networks and numerous e-commerce applications are responsible to generate huge volume of data regularly. The emerging data security mechanisms ensures a safe transmission of information through the internet. Symmetric key cryptography is one of the key techniques used for the security of large data transmission over the internet. Some popular symmetric key algorithms; TDES, IDEA, AES etc. The proposed model uses several symmetric key algorithms in cascaded manner. The model is first divided into 64 bits plaintext block and then into two sub-blocks of 32 bits. The left and right blocks go through a list of symmetric key cryptography techniques like TR, RPPT, TB and RPSPNC and bit rotation in one step. TR stands for Triangular Encryption, which is responsible to generate a triangle shape bit stream where different encryption-decryption techniques are achieved by the order of reading bit RPPT (Recursive Pared Parity Technique) a very simple space efficient encryption algorithm produces cipher text by performing logical OR of consecutive bits. Transformation of Bits (TB) uses swapping method of bits of different order for encryption and decryption process. Recursive Positional Substitution on Prime-Nonprime of Cluster (RPSPNC) methodology swaps bits based on prime/non prime bit position and generates intermediate bit stream as a cipher text. Finally merge the two halves sub-blocks to get the 64 bits cipher text. To test the feasibility of the proposed model it is compared with AES and another embedded encryption technique RPPT+TB for entropy, non-homogeneity, n-gram(4-gram) test, frequency distribution graph and FPGA based hardware test.
机译:数字化已经改变了我们的世界。著名的万维网,各种社交网络和众多的电子商务应用程序负责定期产生的数据量巨大。新兴的数据安全机制,确保通过互联网的信息的安全传输。对称密钥加密是用于大型数据传输通过互联网安全的关键技术之一。一些流行的对称密钥算法; TDES,IDEA,AES等所提出的模型采用在级联方式几个对称密钥算法。该模型首先被分成64位的明文块,然后进入的32位的两个子块。左,右块经过的对称密钥加密技术,如TR,RPPT,结核病和RPSPNC为一步钻头旋转列表。 TR代表三角加密,它负责产生,其中不同的加密 - 解密技术由读位RPPT(递归拉帕雷德奇偶校验技术)一个非常简单的空间高效的加密算法通过执行逻辑产生密文的顺序实现一个三角形形状编码比特串连续位的OR。位(TB)的变换使用交换顺序不同的比特的方法,用于加密和解密处理。递归阵地替代对群集的PRIME-非优质(RPSPNC)基于素/非原位位置的方法互换比特,并生成中间比特流作为密文。最后合并两个半子块得到密文的64位。为了测试该模型它与AES比较和用于熵另一个嵌入的加密技术RPPT + TB的可行性,非均匀性,的n-gram(4-克)试验,频率分布图和基于FPGA硬件测试。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号