ASSESSMENT OF THE INTEGRATED EFFICIENCY OF BLOCK CIPHER ALGORITHMS FOR WIRELESS NETWORKS ON A FPGA CHIP | Bắc | TNU Journal of Science and Technology

ASSESSMENT OF THE INTEGRATED EFFICIENCY OF BLOCK CIPHER ALGORITHMS FOR WIRELESS NETWORKS ON A FPGA CHIP

About this article

Received: 20/07/21                Revised: 31/08/21                Published: 31/08/21

Authors

1. Do Thi Bac, TNU – University of Information and Comunication Technology
2. Duong Thu May Email to author, TNU – University of Information and Comunication Technology

Abstract


Currently, due to the advantage of high security, high-speed block ciphers built by Controlled Substitution Permutation Network, using Switchable Data Dependent Operation, are often chosen. However, these algorithms need to be evaluated for integrated efficiency to ensure resource saving and power consumption reduction. Therefore, in this paper, in addition to introducing the block cipher algorithm BM123-128, we focus on describing how to simulate this algorithm on the XC6VLX240T Virtex-6 FPGA Chip with the support of Xillinx 14.7 software. The integrated efficiency of this algorithm has also been compared with some well-known algorithms of the same type such as EAGLE-128, CIKS-128, COBRAH128, Serpent under the same simulation conditions. Simulation results show that BM123-128 has 5 times better integration efficiency than COBRAH128 and Serpent, 2 times better than CIKS-128.

Keywords


Wireless Network Security; Controlled substitution permutation network; Switchable Data Dependent Operation; Block cipher; Field-programmable gate array

References


[1] B. A. Forouzan, Introduction to cryptography and network security. McGraw-Hill Higher Education, 2008.

[2] M. Madani and C. Tanougast, “FPGA implementation of an optimized A5/3 encryption algorithm,” Microprocessors and Microsystems, vol. 78, pp. 103212, 2020.

[3] N. A. Moldovyan and A. A. Moldovyan, Data-driven Ciphers for Fast Telecommunication Systems, Auerbach Publications Talor & Francis Group, New York, 2008.

[4] S. D. P. Tran, Y. -H. Shin, and C. Lee, “Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks,” KSII Transactions on Internet and Information Systems, vol. 15, no. 6, pp. 2148-2167, 2021, doi: 10.3837/tiis.2021.06.012.

[5] T. B. Do, “Development of some highly integrated cryptographic algorithms on hardware devices,” PhD thesis in mathematics, Institute of Information Technology, Vietnam Academy of Sciences and Society, 2014.

[6] H. M. Nguyen and T. B. Do, “Hybrid Model in the Block Cipher Applications for High-Speed Communications Networks,” International Journal of Computer Networks & Communications (IJCNC), vol. 12, no. 4, July 2020, doi: 10.5121/ijcnc.2020.12404 55.

[7] Y. Ko, C. Lee, S. Hong, J. Sung, and S. Lee, Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. In: Canteaut A., Viswanathan K. (eds) Progress in Cryptology - INDOCRYPT 2004. INDOCRYPT 2004. Lecture Notes in Computer Science, vol. 3348, Springer, Berlin, Heidelberg, doi: https://doi.org/10.1007/978-3-540-30556-916.

[8] N. Moldovyan, A. Moldovyan, M. Eremeev, and N. Sklavos, “New Class of Cryptographic Primitives and Cipher Design for Networks Security,” I. J. Network Security, vol. 2, pp. 114-125, 2006.

[9] C. Chitu and M. Glesner, “An FPGA Implementation of the AES-Rijndaelin OCB/ECB modes of operation,” Microelectronics Journal, vol. 36, pp. 139-146, 2005.

[10] Xilinx Inc, “Development System Reference Guide”, [E-book], 2021. [Online]. Available: www.xilinx.com [Accessed June 04, 2021].




DOI: https://doi.org/10.34238/tnu-jst.4787

Refbacks

  • There are currently no refbacks.
TNU Journal of Science and Technology
Rooms 408, 409 - Administration Building - Thai Nguyen University
Tan Thinh Ward - Thai Nguyen City
Phone: (+84) 208 3840 288 - E-mail: jst@tnu.edu.vn
Based on Open Journal Systems
©2018 All Rights Reserved