FPGA Based Implementation Scenarios of TEA Block Cipher

Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is better to implement the algorithm in hardware as compared to software due to better computational speed and memory usage. Tiny Encryption Al...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2015 13th International Conference on Frontiers of Information Technology (FIT) S. 283 - 286
Hauptverfasser: Hussain, Muhammad Awais, Badar, Rabiah
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 01.12.2015
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is better to implement the algorithm in hardware as compared to software due to better computational speed and memory usage. Tiny Encryption Algorithm known as TEA block cipher is a light-weight and efficient cryptographic algorithm, well suited for wireless communication systems. This paper presents the successful implementation of TEA on FPGA for different design approaches to analyze the performance and resource utilization against each design approach.
AbstractList Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is better to implement the algorithm in hardware as compared to software due to better computational speed and memory usage. Tiny Encryption Algorithm known as TEA block cipher is a light-weight and efficient cryptographic algorithm, well suited for wireless communication systems. This paper presents the successful implementation of TEA on FPGA for different design approaches to analyze the performance and resource utilization against each design approach.
Author Hussain, Muhammad Awais
Badar, Rabiah
Author_xml – sequence: 1
  givenname: Muhammad Awais
  surname: Hussain
  fullname: Hussain, Muhammad Awais
  email: awais.hussain6@gmail.com
  organization: Dept. of Electr. Eng., Namal Coll., Mianwali, Pakistan
– sequence: 2
  givenname: Rabiah
  surname: Badar
  fullname: Badar, Rabiah
  email: rabiah.badar@comsats.edu.pk
  organization: Dept. of Electr. Eng., COMSATS Inst. of Inf. Technol., Islamabad, Pakistan
BookMark eNotjs1KxDAURiMoqGNXLt3kBVqTNLlJlmOZjoUBBbsfbtNbDPaPthvf3hFdfXA4HL57dj1OIzH2KEUmpfDPZVVnSkiTGbhiibdOarC5BwBxy5J1jY1QRlyA1nfMlu_HPX_BlVpeDXNPA40bbnEa-UegEZc4rXzqeH24WP0UvngR509aHthNh_1Kyf_uWF0e6uI1Pb0dq2J_SqMSbkuD9MrKFiU6aAF9EBpyhc5CR-TBgESyovn913VN8OhcJwkoR23AhHzHnv6ykYjO8xIHXL7PVisppM5_APkeQ-w
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/FIT.2015.56
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467396660
1467396656
1467396664
9781467396653
EndPage 286
ExternalDocumentID 7421014
Genre orig-research
GroupedDBID 6IE
6IL
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i208t-c19271da1a86d6a9c04632a876fee96561ae70b6739ffbc9a88f1e6e3a4565c3
IEDL.DBID RIE
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000380378000046&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Dec 20 05:18:35 EST 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i208t-c19271da1a86d6a9c04632a876fee96561ae70b6739ffbc9a88f1e6e3a4565c3
PageCount 4
ParticipantIDs ieee_primary_7421014
PublicationCentury 2000
PublicationDate 20151201
PublicationDateYYYYMMDD 2015-12-01
PublicationDate_xml – month: 12
  year: 2015
  text: 20151201
  day: 01
PublicationDecade 2010
PublicationTitle 2015 13th International Conference on Frontiers of Information Technology (FIT)
PublicationTitleAbbrev FIT
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib025039644
Score 1.6019136
Snippet Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is...
SourceID ieee
SourceType Publisher
StartPage 283
SubjectTerms Algorithm design and analysis
Ciphers
Clocks
Encryption
Field programmable gate arrays
Fiestel
FPGA
Hardware
HDL
tiny encryption algorithm
Title FPGA Based Implementation Scenarios of TEA Block Cipher
URI https://ieeexplore.ieee.org/document/7421014
WOSCitedRecordID wos000380378000046&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED21FQMToBbxLQ-MuI3rJrZHqBpgqSqRoVvlOGepQiSoH_z-ntNQGFjYrMhS5K-8u_jeewD3nvZALlFwYWXERzIveI7e8Si2GAunYut0bTahplM9n5tZCx4OXBhErIvPsB-a9V1-Ublt-FU2oDQuWMu2oa1Usudqfe8dQnJpCNsbCp6IzCB9zULpVtwP5tS_rFNq5EhP_vfOU-j9UPDY7AAuZ9DCsgsqnT0_sicCnoLVsr4fDXOoZG8OS0p7qzWrPMsm1ItQ6p2Nl0E2oAdZOsnGL7xxPuDLYaQ33FHcpURhhdVJkVjjgq7X0NKXyyMaCsGERZrjREnjfe6M1doLTFDaEKA5eQ6dsirxApim_MJrKUZCY9Bm10WhpFXxSNLpjYf2ErphzIvPvbbFohnu1d-Pr-E4zOi-nOMGOpvVFm_hyH1tluvVXb0gOxzaixE
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED2VggQToBbxjQdG0sZxHDsjVA2tKFUlMnSrHOcsVagJ6ge_HzsNhYGFzYosRf7Ku4vvvQdwb-weyBhSjyrmeyHLci9Doz2fK-RUC660rMwmxHgsp9N40oCHHRcGEaviM-y4ZnWXn5d6436VdW0a56xl92Cfh2Hgb9la37vHYjmLLbrXJDzqx91kmLriLd5x9tS_zFMq7EiO__fWE2j_kPDIZAcvp9DAogUimTw_kicLPTmphH0XNXeoIG8aC5v4litSGpL2bS-LU--kN3fCAW1Ik37aG3i194E3D3y59rSNvATNFVUyyiMVa6fsFSj77TKIsQ3CqEI7y5FgsTGZjpWUhmKETLkQTbMzaBZlgedApM0wjGQ0pBKdOrvMc8GU4CGz55cH6gJabsyzj626xawe7uXfj-_gcJC-jmaj4fjlCo7c7G6LO66huV5u8AYO9Od6vlreVovzBY7ojlg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+13th+International+Conference+on+Frontiers+of+Information+Technology+%28FIT%29&rft.atitle=FPGA+Based+Implementation+Scenarios+of+TEA+Block+Cipher&rft.au=Hussain%2C+Muhammad+Awais&rft.au=Badar%2C+Rabiah&rft.date=2015-12-01&rft.pub=IEEE&rft.spage=283&rft.epage=286&rft_id=info:doi/10.1109%2FFIT.2015.56&rft.externalDocID=7421014