International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 6 | Year 2013 | Article Id. IJETT-V4I6P141 | DOI : https://doi.org/10.14445/22315381/IJETT-V4I6P141

Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions


Deepthi Barbara Nickolas , Mr. A. Sivasanka

Citation :

Deepthi Barbara Nickolas , Mr. A. Sivasanka, "Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions," International Journal of Engineering Trends and Technology (IJETT), vol. 4, no. 6, pp. 2438-2441, 2013. Crossref, https://doi.org/10.14445/22315381/IJETT-V4I6P141

Abstract

Security makes the people to stay in the sense of vital modern technologica l improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the level of hardware which decid es the cost in trade basis. The work in this paper concentrates on KECCAK SHA - 3 algorit hm and the sponge construction encryption process with iterative permutation. Thus it leads to reduced amount of encryption time and more importantly provides the ultimate security level among the previous t echniques followed so far. The algorithm uses th e hashing function which is used for secured message authentication of data , digital signature s and password protection. The main advantage of this algorithm is it exhibits high level of parallelism. The hardware implementation process on FPGA is very fast and effective.


Keywords

Hashing, SHA - 3 Algorithm, S ponge function, Encryption, P ermutation.

References

[1] N. Menon and P. W. Wong, “A buyer - seller watermarking protocol,” IEEE Trans. Signal Process.,vol.10 ,no.4,pp.643 - 649,Apr. 2001 .
[2] M.Johnson, P. Ishawar, V.M. Prabhakaran, D. Schonberg, and K. Ramachandran, ”On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp.2992 - 3006, Oct. 2004.
[3] M. Kuribayashi and H. Tanaka, ”Fingerp rinting protocol for images based on additive homomorphic property,”IEEE Trans Image Process., vol. 14, no.12,pp. 2129 - 2139, Dec. 2005.
[4] S. Lian, Z. Liu, Z.Ren, and H. Wang,”Commutative encryption and watermarking in video compression,” IEE Trans. Circ uit Syst. Video Technol., vol. 17,no. 6, pp. 774 - 778,Jun. 2007.
[5] Hassan. M. Elkamchouchi Mohamed E. Nasr Roayat Ismail Abdelfatah,” A new secure and fast hashing algorithm (SFHA - 256)” 25th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2008)
[6] T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86 - 97, Feb. 2009.
[7] Susana Eiroa, Iluminada Baturone, “ Hardware authentication based on P UFs and SHA - 3 2nd round candidates” IEEE ,2009.
[8] Liu Jian - dong, Tian Ye, Wang Shu - hong, Yang Kai, “ A Fast New One - Way Cryptographic Hash Function” IEEE 2010.
[9] Rubata Riasat, Imran Sarwar Bajwa, M. Zaman Ale , “A Hash - Based Approach for Colour Image Steganography” IEEE 2011.
[10] Ignacio Algredo - Badillo, Miguel Morales - Sandoval, Claudia Feregrino - Uribe, Ren ?e Cumplido, “Throughput and Efficiency Analysis of Unrolled Hardware Architectures for the SHA - 512 Hash Algorithm” IEEE 2012

Time: 0.0014 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB