CFP last date
20 May 2024
Reseach Article

Article:Design and Implementation of FPGA Based Dual key Encryption

by B.Lakshmi, E. Kirubakaran, T.N.Prabakar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 3
Year of Publication: 2010
Authors: B.Lakshmi, E. Kirubakaran, T.N.Prabakar
10.5120/714-1006

B.Lakshmi, E. Kirubakaran, T.N.Prabakar . Article:Design and Implementation of FPGA Based Dual key Encryption. International Journal of Computer Applications. 3, 3 ( June 2010), 21-27. DOI=10.5120/714-1006

@article{ 10.5120/714-1006,
author = { B.Lakshmi, E. Kirubakaran, T.N.Prabakar },
title = { Article:Design and Implementation of FPGA Based Dual key Encryption },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 3 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 21-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number3/714-1006/ },
doi = { 10.5120/714-1006 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:50:55.814526+05:30
%A B.Lakshmi
%A E. Kirubakaran
%A T.N.Prabakar
%T Article:Design and Implementation of FPGA Based Dual key Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 3
%P 21-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, design and FPGA (Field Programmable Gate Array) implementation of embedded system for time based IDEA encryption is presented. Presently available encryption systems, suffer from Brute Force attack in which all key combinations are tried out to find the correct key. In such a case, the time taken for breaking the code depends on the system used for cryptanalysis. In the proposed system, time is used as a second dimension of the key. That is, the correct key entered at the correct time is needed for proper decryption. The proposed scheme uses a dynamically varying number of shifts for both encryption and decryption thereby the system needs to wait till that time and this forms the time based key input. Hence, the possibility of brute force attack is minimized and is free from the system capability. IDEA encryption algorithm is taken as the base and time factor is implemented as a second dimension of the key. The proposed system adds complexity to the IDEA encryption algorithm by including the time as a second dimension besides increasing the time required for cryptanalysis. As the proposed system needs concurrent execution and real time processing, the system is implemented using Altera Stratix III FPGA and the results are presented.

References
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Real Time Systems Time Based Key Brute Force attack Cryptanalysis FPGA