HARDWARE IMPLEMENTATION OF TEA TINY ENCRYPTION ALGORITHM

Slides:



Advertisements
Similar presentations
International Data Encryption Algorithm
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Spartan-3 FPGA HDL Coding Techniques
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
Registers and Counters. Register Register is built with gates, but has memory. The only type of flip-flop required in this class – the D flip-flop – Has.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
George Mason University FPGA Design Flow ECE 448 Lecture 9.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Spartan II Features  Plentiful logic and memory resources –15K to 200K system gates (up to 5,292 logic cells) –Up to 57 Kb block RAM storage  Flexible.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Chapter 3 – Block Ciphers and the Data Encryption Standard
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Cryptanalysis. The Speaker  Chuck Easttom  
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
Packet Features are enhanced packet management controls (Mark, Restore and Release functions) that facilitate packet retransmission or receive packet discard.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
FPGA (Field Programmable Gate Array): CLBs, Slices, and LUTs Each configurable logic block (CLB) in Spartan-6 FPGAs consists of two slices, arranged side-by-side.
Block ciphers Structure of a multiround block cipher
Feistel Cipher Structure
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
Introduction to FPGA Created & Presented By Ali Masoudi For Advanced Digital Communication Lab (ADC-Lab) At Isfahan University Of technology (IUT) Department.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
“Implementation of a RC5 block cipher algorithm and implementing an attack on it” Cryptography Team Presentation 1.
Estimation of IQ vector components of RF field - Theory and implementation M. Grecki, T. Jeżyński, A. Brandt.
The Tiny Encryption Algorithm (TEA) Chip Ely V. Soto and Todd T. Wilkins 6 December 2001.
Lecture 23 Symmetric Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
FPGA Implementation of RC6 including key schedule Hunar Qadir Fouad Ramia.
Block Cipher- introduction
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
ECE 545 Project 1 Introduction & Specification Part I.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Summary Latch & Flip-Flop
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
School of Computer Science and Engineering Pusan National University
XILINX FPGAs Xilinx lunched first commercial FPGA XC2000 in 1985
6b. Practical Constructions of Symmetric-Key Primitives.
Data Encryption Standard
- Stream Cipher and Block Cipher - Confusion & Diffusion
NET 311 Information Security
Cryptography after DES
Cryptography and Network Security Chapter 3
AES Objectives ❏ To review a short history of AES
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
Cryptography Team Presentation 1
Fifth Edition by William Stallings
Introduction to Modern Symmetric-key Ciphers
Block Ciphers and the Data Encryption Standard (DES)
Chapter -2 Block Ciphers and the Data Encryption Standard
DIGITAL ON/OFF AM MODULATOR AMIT R SHARMA & AKRAM SHAZAD.
About Blowfish Encryption Video made by: Tudor Mare Sorin Nita Valentina Sociu Stefan Stefanescu.
Security Implementation Using Present-Puffin Protocol
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
International Data Encryption Algorithm
Presented by Mohsen Shakiba
DES (Data Encryption Standard)
Florida State University
Advanced Encryption Standard
Feistel Cipher Structure
Blowfish Encryption Algorithm
Presentation transcript:

HARDWARE IMPLEMENTATION OF TEA TINY ENCRYPTION ALGORITHM ANOOP KUMAR PALVAI

The Tiny Encryption Algorithm (TEA) is one of the fastest and most efficient cryptographic algorithms in existence. Developed by Roger Needham and David Wheeler.

OVERVIEW OF TEA TEA is a symmetric key algorithm. TEA is designed to minimize memory footprint and maximize speed. It is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. Achieves the Shannon's properties of complete diffusion and confusion with out the employment of S & P boxes, after only six rounds but thirty two rounds are recommended.

OVERVIEW Contd.. TEA seems to be highly resistant to differential cryptanalysis. TEA is a compromise for safety, ease of implementation, lack of specialized tables, and reasonable performance.

FUNCTIONALITY OF TEA Inputs to encryption algorithm are 64 bits of plain/cipher text , 128 bits of key and output is a cipher/plain text. It performs operations on 32 bit words. Each half of message is used to encrypt the other half over 64 rounds of processing and then combine to produce the cipher text block.

OPERATIONS PERFORMED IN A SINGLE ITERATION Each round i has inputs Left[i-1] and Right[i-1], derived from the previous round, as well as a sub key K[i] derived from the 128 bit overall K. The sub keys K[i] are different from K and from each other. The constant delta =(9E3779B9)h , is derived from the golden number ratio to ensure sub keys to be different.

DECRYPTION Decryption is essentially the same as the encryption process. The sub keys K[i] are used in the reverse order. It reduces the area required for implementation by half.

IMPLENTATION IN HARDWARE

+ Register 1 Register 0 Function SUM >>11 “AND” 3 se E Sel Delta B INPUT (H) INPUT (L) K(0) K(1) K(2) K(3) limit 000 se E

D A <<4 >>5 + B E + + C

St0 reset = ’1’ St5 en2=1, en4=1, s1=1, s2=1 a = ‘0’ St1 s1=1, en1 =1, en2 =1,en4 =1 St2 en1=1, en4 =1, s1 = 1, s2=0 St3 en3 = 1, sel = 10 St4 en2=1, s1=1, s2=1 St8 Sum !=limit St6 St7 en1=1, s1=1, s2=0 Sum = x00000000 False True Sel = 01 01 Sel =00

Tools Used Aldec Active HDL 7.1 for simulation Xilinx XST for synthesis Xilinx ISE 8.2i for implementation Device Utilization Summary Device : xilinx Spartan3 xc3s1500-5fg456 Number of Slice Flip Flops : 118 out of 26,624 1% Total Number 4 input LUTs : 1,130 out of 26,62 4 % Number of occupied Slices : 594 out of 13,312 4% Number of bonded IOBs : 293 out of 333 87% Number of MULT18X18s : 3 out of 32 9% Total equivalent gate count for design: 20,489 Minimum Time Period : 19.765 ns Maximum Frequency : 50.6 MHz

Questions? Thank You