CFP last date
20 May 2024
Reseach Article

Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL

by Purnima Gehlot, S. R. Biradar, B. P. Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 13
Year of Publication: 2013
Authors: Purnima Gehlot, S. R. Biradar, B. P. Singh
10.5120/12024-8087

Purnima Gehlot, S. R. Biradar, B. P. Singh . Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL. International Journal of Computer Applications. 70, 13 ( May 2013), 36-42. DOI=10.5120/12024-8087

@article{ 10.5120/12024-8087,
author = { Purnima Gehlot, S. R. Biradar, B. P. Singh },
title = { Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 13 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number13/12024-8087/ },
doi = { 10.5120/12024-8087 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:47.571421+05:30
%A Purnima Gehlot
%A S. R. Biradar
%A B. P. Singh
%T Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 13
%P 36-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now-a-days internet is one of the most important sources of communication and thousands of people interact electronically. For sending sensitive messages over the internet, we need security. Hence for secure communication required the algorithms. Among these algorithms is Twofish, a promising 128-bit block cipher and one of the competitors in National Institute of Standards and Technology's (NIST) AES competition, for the replacement of DES at the core of many encryption systems world-wide. In this paper the security algorithm, twofish has been explained with all of its modules (some modules has been modified) for both 128 and 192-bit key size. Implementation on VHDL using Xilinx – 6. 1 xst software has been done taking delay as main constraint.

References
  1. Bruce Schneier, John Kelsey, Doug Whitingz David Wagnerx Chris Hall, Niels Ferguson "Twofish: A 128-Bit Block Cipher" AES submission, 1998.
  2. Shun-Lung Su, Lih-Chyau Wuu, and Jhih-Wei Jhang, "A New 256-bits Block Cipher –Twofish 256", Computer Engineering & Systems, International Conference in IEEE, 2010, pg 166 - 171
  3. Mark De Clercq, Vincent Levesque "A VHDL Implementation of the Twofish Block Cipher" in IEEE, 2006
  4. Hani H. JABER "Relational Database Security Enhancements", in Arab University, 2008
  5. Uskov, A. V, "Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance" Trust Security and Privacy in Computing and Communication, 11th International National Conference in IEEE, 2012, pg. 1042-1048
  6. Dr. S. A. M Rizvi, Dr. Syed Zeeshan Hussain, Neeta Wadhwa, "Performance Analysis of AES and TwoFish Encryption Schemes" in International Conference on Communication Systems and Network Technologies of IEEE Computer Society, 2011, pg. 76-79, vol-3
  7. G. Catalini, F. Chiaraluce, L. Ciccarelli, E. Gamhi, P. Pierleoni, M. Reginelli, "modified twofish algorithm for increasing security and efficiency in the encryption of video signals" in IEEE, 2005
  8. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson,Tadayoshi Kohno, Mike Stay "The Twofish Team's Final Comments on AES Selection"
  9. Rabie A. Mahmoud1, Magdy Saeb2, "A Metamorphic-Enhanced Twofish Block Cipher And Associated FPGA Implementation" in The International Journal of Computer Science and Communication Security (IJCSCS), Volume 2, January 2012
  10. V. Mnssvkr Gupta, K. V. S. Murthy, A. Yesubabu, R. Shiva A Shankar, "Recent performance evaluation among various AES algorithm- MARS, RC6, RIJNDAEL, SERPENT, TWOFISH" in International Journal of Science and Advanced Technology, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Twofish MDS PHT DES Function F and g