Description

Description:

All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.

Share

Transcript

International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal
| Page 1652
Effect of newly developed data security algorithm on the 128-bits plaintext and study of resistance to ciphertext attacks with maximum combinational path delay using VHDL
Paresh Kumar Pasayat
1
, Kalpataru Sethi
2
1
Assistant Professor, Dept. of ETC Engineering, IGIT,Odisha, India
2
PG student, Dept. of ETC Engineering, IGIT,Odisha, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract
–
The proposed paper focuses mainly on the hiding of information from the unauthorized access and the novel approach adopted so as to prove the robustness of the data security algorithms. The information consists of 128-bit plaintext which needs to be protected from the hacker by using a newly developed data security algorithm. The algorithm protects the data by performing various operations on the plaintext and the chip codes and obtains a 128-bit ciphertext. The different operations have been achieved with the help of bit splitter unit, bit append unit, xor unit and a dependent functional block. The srcinal data can be retrieved at the receiver end by using reverse cipher unit. The proposed work can be implemented in the banking sector, telecommunication sector and military sector etc.
Key Words
:
Plaintext, Ciphertext, Bit Splitter, Bit ppend, Cipher, Functional Block.
1. INTRODUCTION
Due to the lack of confidentiality, integrity and authentication of the information being used by the different organizations, the researchers are playing an important role for inventing various data security algorithms to protect the information from the unauthorized access. The proposed paper aims to protect 128-bit data by introducing a newly developed data security algorithm. First, 128-bit plaintext is converted into 128-bit ciphertext using two 32-bit chip codes and cipher algorithm. Similarly, the 128-bit ciphertext is converted into 128-bit plaintext by using reverse cipher algorithm.
1.1 Project Model
The project describes the flow chart for the proposed project work. Each number in the model signifies the no. of bit in the input and output of each unit. The diagrammatic representation of the proposed work is given as follows:
Fig 1:
Project
Model
2. LOGIC USED IN THE PROPOSED DESIGN
The logic used in the proposed design has been described in different steps as follow:
2.1 ENCIPHERMENT ALGORITHM:
Step 1: First, 128-bits Original data also know as plaintext is fed to the input of the bit splitter unit which divides the data into four half each having equal no. of bits i.e. 32-bits.
32 128-BITS PLAINTEXT BIT_SPLITTER_UNIT F1 F2 F3 F4 BIT_APPEND_UNIT KEY GENERATION UNIT BIT_SPLITTER_UNIT L1 R1 + BIT_APPEND_UNIT
128-BITS CIPHERTEXT L2 R2 32-BITS 32-BITS 32 32 32 32 32 32 32 128 64 64 64 64 64 64 H0
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal
| Page 1653 Step 2: The outputs of bit splitter unit and the hash value are given to the inputs of the new functional unit (F1) which produces two outputs each having 32-bits (one output given for the bit append unit and another input to the input of the new functional unit). This process is repeated for next three nos. of Fi where i=2 to 4.The hash value of next Fi is the output of the previous Fi. Step 3: The outputs of Fi are appended with the help of bit append unit which produces 128-bits output. Step 4: Two 32-bits cipher keys are appended together to produce 64-bits key output for the Feistel Cipher Unit. Step 5: Feistel Cipher Unit divides the output of bit append unit into two halfs (L1 & R1) each having 64-bits. Then, the XOR operation is performed between L1 and the key. The output of XOR unit and R1 are swapped using the swapper unit. Then, the outputs of the swapper unit is appended using bit append unit which produces 128-bits Ciphertext output. This ciphertext output is the desired encrypted data to be transmitted from the transmitter to the receiver through wire / wireless medium.
2.2 DECIPHERMENT ALGORITHM:
The algorithm for the decryption process can be written in the reverse order of the encryption algorithm.
3. SIMULATION RESULT AND DISCUSSION
The VHDL code of the proposed work has been simulated using Xilinx ISE 9.2i software and the desired results have been obtained. The simulation result of the encipherment process is given as follows: Fig 2: Simulation result of the encipherment process The simulation result of the decipherment process is given as follows: Fig 3: Simulation result of the decipherment process
4. CONCLUSION
After doing the proposed work, it is concluded that the work is best suited in the field of data security to provide protection to the 128-bits srcinal data from unauthorized access. It is resistant to the brute-force attack, timing attack, snooping attack, pattern attack, statistical attack which makes the algorithm more robust. The combinational path delay of the time required to convert 128-bits plaintext into 128-bits ciphertext is 8.063ns which obtained from the Xilinx software.
REFERENCES
[1] Dr. Sandeep Tayal, Dr. Nipin Gupta, Dr. Pankaj Gupta,
Deepak Goyal, Monika Goyal, “A Review paper on Network Security and Cryptography”,
Advances in Computational Sciences and Technology, Volume 10, Number 5,pp. 763-770,2017. [2] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar,
“An efficient VLSI architecture for data encryption standard and its FPGA implementation”,VLSI SATA,IEEE International
Conference,pp.1-5,2016.
[3] W.Stallings,“Cryptography and Network Security”, 2nd
Edition, Prentice Hall.
[4] Douglas L. Perry. “VHDL Programming by Examples”,
TMH.
[5] Soufiane Oukili,Seddik Bri,”FPGA implementation of Data Encryption Standard using time variable permutations”,
International Conference on Microelectronics (ICM),IEEE,pp.126-129,2015. [6] Ramadhan J. Mstafa; Khaled M.
Elleithy, “A highly secure video steganography using Hamming code (7, 4)”, Systems,
Applications and Technology Conference (LISAT), IEEE Conference,pp.1-6,2014. [7] Ravikumar M.Raypure, Prof. Vinay Keswani,
“Implementation For Data Hiding Using Visual
Cryp
tography”, IRJET, Volume: 04, Issue: 07, 2017.

Search

Similar documents

Tags

Related Search

Effect of Ionosphere to GPS positioningEffect of the Yeast and Bacteria Biomass on tEffect of Cough Syrup Containing Codeine on tEffect of Parenting Styles and Religion on SoEffect of Social Networking Towards Students Data SecurityPayment Card Industry Data Security Standardeffect of improved welfare on agricultural prEffect of Electric Arc on Physical PropertiesThe Effect of Monetary Incentive on Employees

We Need Your Support

Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks

SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...Sign Now!

We are very appreciated for your Prompt Action!

x