CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Optimization of Block Cipher with SIMON

Published on December 2015 by Shylaja C., Shreekanth T.
National Conference on Power Systems and Industrial Automation
Foundation of Computer Science USA
NCPSIA2015 - Number 4
December 2015
Authors: Shylaja C., Shreekanth T.
05373162-acb3-4d31-8d5a-cdf90d745375

Shylaja C., Shreekanth T. . Optimization of Block Cipher with SIMON. National Conference on Power Systems and Industrial Automation. NCPSIA2015, 4 (December 2015), 18-23.

@article{
author = { Shylaja C., Shreekanth T. },
title = { Optimization of Block Cipher with SIMON },
journal = { National Conference on Power Systems and Industrial Automation },
issue_date = { December 2015 },
volume = { NCPSIA2015 },
number = { 4 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 18-23 },
numpages = 6,
url = { /proceedings/ncpsia2015/number4/23350-7279/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Power Systems and Industrial Automation
%A Shylaja C.
%A Shreekanth T.
%T Optimization of Block Cipher with SIMON
%J National Conference on Power Systems and Industrial Automation
%@ 0975-8887
%V NCPSIA2015
%N 4
%P 18-23
%D 2015
%I International Journal of Computer Applications
Abstract

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. Block ciphers are important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data. A block cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than applying it to one bit at a time. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. A recent promising low-cost alternative of advanced encryption standard (AES) on reconfigurable platforms called the SIMON. It has been implemented as the construction of the round function and the key generation of SIMON, that enables bit-serial hardware architectures which can significantly reduce the cost. Encryption and decryption can be done using the same hardware and also propose the hardware architecture of the smallest block cipher ever published on field-programmable gate arrays (FPGAs) at 128-bit level of security.

References
  1. Adyin Aysu,Ege Gulcan and Patrick Schaumont,"SIMON says:Break Area Records of Block Ciphers on FPGAs", IEEE Embedded Systems Letters, Vol. 6, No. 2, June 2014.
  2. William Stallings fifth edition of "Cryptography and Network Security Principles and Practice".
  3. T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A Survey of Lightweight-Cryptography Implementations. In IEEE Design & Test, Volume 24, Issue 6, pages 522–33, 2007. 21.
  4. Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers, "The simon and speck of lightweight block ciphers," National Security Agency 9800 Savage Road, Fort Meade, MD 20755, USA, June 2013.
  5. C. D. Cannière, O. Dunkelman, and M. Kneževi´c. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In CHES 2009, Lecture Notes in Computer Science, No. 5747, pages 272–88. Springer-Verlag, 2009. 5, 19, 20.
  6. T. Good and M. Benaissa, "AES on FPGA from the fastest to the smallest," in Cryptographic Hardware and Embedded Systems CHES 2005, ser. Lecture Notes in Computer Science, J. Rao and B. Sunar, Eds. Berlin, Germany: Springer-Verlag, 2005, vol. 3659, pp. 427–440.
  7. D. Hwang, M. Chaney, S. Karanam, N. Ton, and K. Gaj, "Comparison of FPGA-targeted hardware implementations of eSTREAM stream cipher candidates," in Proc. State of the Art of Stream CiphersWorkshop, SASC 2008 , Lausanne, Switzerland, Feb 2008, pp. 151–162.
  8. P. Bulens, K. Kalach, F. -X. Standaert, and J. -J. Quisquater, "FPGA implementations of estream phase-2 focus candidates with hardware profile," in Proc. State of the Art of Stream Ciphers Workshop, SASC 2007, Bochum, Germany, Jan. 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Aes Simon Block Cipher Feistel Fpga.