batch no.2

25
A FAST CRYPTOGRAPHY PIPELINED HARDWARE DEVELOPED IN FPGA WITH VHDL PRESENTED BY K.KALPANA (093J1A0407) B.DURGA PRASAD (093J1A0418) L.SHIVA KRISHNA (093J1A0440) B.HARI KRISHNA (093J1A0419) GUIDE: P.VANNUR(M.tech), KOTTAM KRUNAKARA REDDY INSTITUTE OF TECHNOLOGY CHINNA TEKURU, KURNOOL-518 218

Upload: lodingthepage440

Post on 06-May-2015

163 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Batch no.2

A FAST CRYPTOGRAPHY PIPELINED HARDWARE DEVELOPED IN FPGA WITH

VHDL

PRESENTED BY

K.KALPANA (093J1A0407)

B.DURGA PRASAD (093J1A0418)

L.SHIVA KRISHNA (093J1A0440)

B.HARI KRISHNA (093J1A0419)

GUIDE: P.VANNUR(M.tech),

KOTTAM KRUNAKARA REDDY INSTITUTE OF TECHNOLOGY

CHINNA TEKURU, KURNOOL-518 218

Page 2: Batch no.2

CONTENTS

• ABSTRACT• INTRODUCTION• ADVANCED ENCRYPTION STANDARD• ENCRYPTION BLOCK DIAGRAM• ARCHITECTURE OF AES• ADVANTAGES• DISADVANTAGES• APPLICATIONS• CONCLUSION• FUTURE SCOPE

Page 3: Batch no.2

Key words

• Cryptography• Pipeline• FPGA• AES

Page 4: Batch no.2

ABSTRACT

Main objective :

• The main objective of the project is to increase the speed of encryption and decryption by using pipelined hardware.

• Pipelined hardware cryptography was used to improve performance in order to achieve higher throughput and greater parallelism.

Page 5: Batch no.2

What is FPGA ????

• FPGA stands for field programmable gate array.

Why FPGA ????

Page 6: Batch no.2

What is pipeline?

Four Pipelined Instructions

IF

IF

IF

IF

ID

ID

ID

ID

EX

EX

EX

EX M

M

M

M

W

W

W

W

5

1

1

1

Page 7: Batch no.2

What is parallelism?????

Page 8: Batch no.2

INTRODUCTION

• Cryptography - secret writing

DES-Data Encryption Standard

AES-Advanced Encryption Standard

Page 9: Batch no.2

Which is better (software or hardware based cryptograph)??????

Page 10: Batch no.2

AES-Advanced Encryption Standard

What is AES????

and

why AES????

Page 11: Batch no.2

Encryption phases

1.Subbytes

2.Shift rows

3.Mix columns

4.Addround key

• For decryption algorithm will use respective inverse operations.

Page 12: Batch no.2

SubBytes – A non-linear substitution step where each byte is

replaced with another according to a lookup table (known as S Box).

Page 13: Batch no.2

ShiftRows –

A transposition step where each row of the state is

shifted cyclically a certain number of steps.

Page 14: Batch no.2

MixColumns – A mixing operation which operates on the columns of

the state, combining the four bytes in each column using a linear transformation.

Page 15: Batch no.2

AddRoundKey – It is an XOR operation between the state and the round key.

Page 16: Batch no.2

Key Expansion - Three operations.

1.RotWord

2.SubWord

3.XOR operations

Page 17: Batch no.2

Block diagram of I/O of encryption

Page 18: Batch no.2

Round key

Add round key

Sub bytes

Shift rows

Add round keys

Sub bytes

Shift rows

Mix columns

Add round keys

BUFFER

selector

Block Diagram Of Encryption

Page 19: Batch no.2

AES architecture and its blocks 1.Key expansion 2.Encryption 3.Decryption

Page 20: Batch no.2

Architecture diagram of AES

Page 21: Batch no.2

• High Performance• Time to market• Reprogrammable• Reconfigurable• Long term maintenance

Disadvantages• More expensive.• Power consumption is more.

Page 22: Batch no.2

FUTURE SCOPE

• Micro electronics intends to use this work as part of larger projects such as smart metering in power systems and cryptography interface in data communication.

Page 23: Batch no.2

Conclusion

Page 24: Batch no.2

ThankQ

Page 25: Batch no.2

Queries….???