Professional Documents
Culture Documents
Synthesis of 64 Bit Triple Data Encryption Standard Algorithm Using VHDL PDF
Synthesis of 64 Bit Triple Data Encryption Standard Algorithm Using VHDL PDF
Synthesis off 64
64-Bit
Bit Triple Data Encryption
Standard Algorithm using VHDL
ABSTRACT
Data security is the most important requirement of (XC7VX330t– 3ffg1157). Our design achieves a
today’s world, to transmit digital data from one place operating frequency of 114.33 MHZ.
to another. We need to secure the transmitted data at
the transmitting end so that no unauthorized user can Keywords: Cryptography, DES, TDES, Encryption,
access it. To encrypt the data at the tran
transmitting point Decryption, Implementation Results
and decrypt the data at the receiving point we need the
communication security[8] . Only the authorized user I. INTRODUCTION
can get back the original text, provided they have the In this modern era as the demand and the importance
secret key. Cryptography is a technique to transmit of exchanging valuable data over the internet is
protected data between two wo points. The word booming over electronics communication. The main
‘Cryptography’ was invented by combining two need for today is to protect valuable data from
Greek words, ‘Krypto’ meaning hidden and unauthorized access. As the applications that is
‘graphene’ meaning writing. Cryptography is the increasing day-by-dayday the requirement of network
study of mathematical techniques related to aspects of security to providing quality of service. The security
various information data security. It deals wit with is most challenging aspects in the internet.
protection of data on unsecured channel by altering Cryptography is the one of main categories for
the data in encrypt (coded)form. Basically, we have computer security that converts the original and
two cryptography techniques for digital data transfer, readable data to unreadable
eadable form. Encryption is best
depending on how the encryption--decryption is solution to ensure security. Many encryption
carried out in the system, Symmetric Cryptography algorithms are used in information security system. In
and Asymmetric Cryptography. DES, TRIPLE TRIPLE-DES, this thesis tries to fair comparison between most
IDEA, AND BLOWFISH algorithms use symmetric common and basic symmetric key cryptography
cryptography technique. Due to the importance of the algorithms: Data Encryption Standard
S (DES) and
DES/TDES algorithm and the numerous applications Triple Data Encryption Standard (TDES). The main
that it has, our main concern DES/TDES Encryption/ concern is to get a higher operating frequency.
Decryption using
sing three keys and synthesize TDES,
which give higher operating frequency. In this paper In [10], efficient and compact reconfigurable
we present, TDES synthesis in VHDL, in Electronic synthesis of the Data Encryption Standard (DES)
Code Block(ECB) mode, of this commonly used algorithm [10] and synthesis using device
cryptography scheme with aim to improve VirtexEXCV400e.
performance. The design is simulated
lated and synthesized
in Xilinx ISE 14.7 with family Virtex-77 In [11], a pipelined implementation in VHDL, in ECB
mode, of this commonly used Cryptography scheme
TDES ENCRYPTION
• data in : FF00FF00FF00FF00
• data_out : 328DBFFA68CF0D06
• Key_1: 0000FFFF0000FFFF
Fig 2:- TDES Algorithm working [14] • Key_2 : 00000000FFFFFFFF
000000FFFFFFFF
If we assume that k1, k2 and k3 are the 3 different • Key_3 : FFFF0000FFFF0000
keys and C to be the ciphertext and P to be the
plaintext and F to denote encryption and f to denote TDES DECRYPTION
decryption, then the encryption process of the Triple • data_in : 328DBFFA68CF0D06
DES can be represented as • data_out : FF00FF00FF00FF00
• Key_1: 0000FFFF0000FFFF
C = Fk3 [fk2 {Fk1 (P)}]……..equation.
quation. 1 • Key_2 : 00000000FFFFFFFF
• Key_3 : FFFF0000FFFF0000
In the same way, the decryption process of Triple
DES can be represented as
P = fk1 [Fk2 {fk3 (C)}]……….equation. 2