Kiran V G Kumar | Visvesvaraya Technological University (original) (raw)

Papers by Kiran V G Kumar

Research paper thumbnail of Design and Implementation of Novel BRISI Lightweight Cipher for Resource Constrained Devices

Microprocessors and Microsystems, 2021

Abstract The Internet of Things (IoT) and cyber-physical systems (CPS) has grown exponentially ov... more Abstract The Internet of Things (IoT) and cyber-physical systems (CPS) has grown exponentially over the recent years, has motivated the development and deployment of the low resource devices for a wide range of applications in the IoT. Many such resource constrained devices are deployed to match the heterogeneous application requirements of IoT and CPS systems, wherein privacy and security have emerged, as the most difficult challenges, as the constrained devices are not been designed to have security features. This paper presents a lightweight cipher, based on ARX (Addition-Modulo, Rotation and XOR) operations, Fiestel structure, an amalgamation of BRIGHT and SIMON structure, hence the name BRISI. The cipher encrypts 32-bit plaintext using 64-bit key. The software implementation is performed using MATLAB tool and it fulfils the Avalanche criterion, Key-sensitivity, correlation coefficient, entropy and histogram. The proposed design is simulated using Xilinx Vivado and is implemented on Nexys-4 DDR Artix-7 and Basys-3 Artix-7 FPGA family and is evaluated for (LUT and register) power and timing

Research paper thumbnail of FPGA Implementation of Simple Encryption Scheme for Resource-Constrained Devices

International Journal of Advanced Trends in Computer Science and Engineering

Internet of things (IoT), where billions of devices are interconnected together, where a huge amo... more Internet of things (IoT), where billions of devices are interconnected together, where a huge amount of data is being exchanged between conventional and resource constrained devices and the security of the data remains a huge concern. While conventional cryptographic algorithms, cannot fit into resource constrained devices, the design of such ciphers (hence the term Lightweight Cipher) is a major challenge, while the three principles of the security triad Confidentiality, Integrity and Availability of the data doesn't change. In this paper, simple Lightweight ciphers based on ARX (Addition, Rotation and XOR) and MRX (Multiplication, Rotation and XOR) operations based on reversible logic and Vedic Mathematics are proposed. The addition and multiplication operations are implemented using Reversible Logic and Vedic Mathematics and a modified Montgomery algorithm is implemented to perform modular operation. The scheme is implemented using both software and hardware. The software implementation is done using MATLAB and the Histogram Analysis, Correlation Analysis and Entropy Analysis for the grayscale image are performed to verify the security of the image, and the simulations and synthesis are performed using Xilinx-Vivado verified on the Nexys-4 Artix-7 FPGA and compared with Virtex-6 FPGA and the performance of the ciphers is compared with the existing state-of-art work.

Research paper thumbnail of FPGA implementation of simple encryption scheme for resource-constrained devices

International Journal of Advanced Trends in Computer Science and Engineering, 2020

Internet of things (IoT), where billions of devices are interconnected together, where a huge amo... more Internet of things (IoT), where billions of devices are interconnected together, where a huge amount of data is being exchanged between conventional and resource constrained devices and the security of the data remains a huge concern. While conventional cryptographic algorithms, cannot fit into resource constrained devices, the design of such ciphers (hence the term Lightweight Cipher) is a major challenge, while the three principles of the security triad Confidentiality, Integrity and Availability of the data doesn't change. In this paper, simple Lightweight ciphers based on ARX (Addition, Rotation and XOR) and MRX (Multiplication, Rotation and XOR) operations based on reversible logic and Vedic Mathematics are proposed. The addition and multiplication operations are implemented using Reversible Logic and Vedic Mathematics and a modified Montgomery algorithm is implemented to perform modular operation. The scheme is implemented using both software and hardware. The software imp...

Research paper thumbnail of An Efficient VLSI Implementation of CDF 5/3 Architecture on FPGA For Image Processing Applications

Image Compression is basically defined as reducing the size of image without altering the picture... more Image Compression is basically defined as reducing the size of image without altering the picture quality of the original image. Various algorithms are currently available for compression of the images, among them the most prominent algorithms the wavelet transform. In recent technology Wavelet transform is named as cutting-edge technology for image processing applications. Discrete cosine transform (DCT) was previously used to compress the image. Due to the drawback of DCT i.e lower compression ratios and blocking artifacts we go for Wavelet transform which has higher compression ratios and PSNR compared to other compression algorithms. There are various types of Wavelets available. These wavelets can be broadly classified as lossy and lossless compression. Majority of Wavelets are lossy in nature. Only CDF 5/3 Wavelet transform is lossless in nature. Hence image processing application that is concerned on accuracy of the image can go for CDF 5/3 Wavelet transform. The proposed technique in this paper has efficient hardware architecture; the hardware is made simpler by eliminating the multipliers which was present in the existing system and replacing it with shifters. Also use of shifters in proposed system increases the frequency of operation of both 1D-DWT and 2D-DWT and also area is drastically reduced.

Research paper thumbnail of FPGA Implementation of Encryption Primitives

In my project, circuit design of an arithmetic module applied to cryptography i.e. Modulo Multipl... more In my project, circuit design of an arithmetic module applied to cryptography i.e. Modulo Multiplicative Inverse used in Montgomery algorithm is presented and results are simulated using Xilinx. This algorithm is useful in doing encryption algorithms in binary arithmetic because all computers only deal with binary numbers. Encryption algorithms rely on modulo arithmetic in which a modulus p is not a power of two unlike in binary arithmetic. This makes encryption algorithms more complex as we would need to carry out modulus p operations especially residue computation in binary arithmetic. Also encryption using this multiplicative inverse is presented with simulation results. This multiplicative inverse function has iterative computations of multiplication, division and subtraction with variable loop times.

Research paper thumbnail of Investigation into Power Quality Issue due to House Hold Equipments

With the ever increasing demand for electricity, conservation of energy is given importance. Conv... more With the ever increasing demand for electricity, conservation of energy is given importance. Conventional method of control is being replaced with electronic methods of control. With this harmonics are introduced into the power system. This is applicable to all types of electrical loads, industrial, domestic and commercial. As on now, the presence of harmonics in domestic sector is not monitored, as the quantity of electricity used by domestic sector is not significant as compared to industrial and commercial sector. Yet with the lighting sector dominated by CFL bulbs and LED bulbs, fans being controlled electronically and increasing use of desktops, laptops, laser printers, air conditioners etc., it is a matter of concern to study the harmonics produced by these devices and its effect on distribution transformer and neighbouring utility services. Harmonic analysis is done using expensive power analysers, digital storage oscilloscope etc., In this project a simple method of analysing harmonics is discussed. Initially the voltage and current drawn is sensed, fed to the computer using data acquisition card, total harmonics, 3 rd , 5 th , 7 th and 9 th harmonics, power factor etc., is measured. The average values of these is taken and represented as source in Matlab Simulink, passive filters are designed and analysed using simulation.

Research paper thumbnail of Implementation of Two Light Weight Cryptographic Algorithms

In recent years, one of the primary reasons that intruders can be successful is that most of the ... more In recent years, one of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in the form they can read and understand. Hence, Cryptography is one of the important features in secure communication .It makes use of key to encrypt the data so that the data sent cannot be accessed by unauthorized users. This paper focuses on Lightweight symmetric cryptography. Lightweight cryptography is used for resource-limited devices such as radio frequency identification tags smart card etc. American National Security Agency (NSA) proposed a new block cipher family named SIMON and the aim of SIMON design is to fill the gap for secure, flexible, and analyzable and to perform exceptionally well across the full spectrum of lightweight applications. International Data Encryption Algorithm (IDEA) is a block cipher aims at providing high level security not based on keeping the algorithm a secret, but rather upon ignorance of the secret key. In this project comparative study of selected lightweight symmetric block ciphers such as IDEA and SIMON are implemented using Xilinx ISE 14.2 simulator.

Research paper thumbnail of Modeling of FPGA and memory using AMBA AHB for DSP applications

The recent trends in the advancement of SOC chips along with the reusable IPs has led to the high... more The recent trends in the advancement of SOC chips along with the reusable IPs has led to the high demand of SOC in the market because of less cost and reduction in the time to market period. This demand has given rise to an issue of interfacing these IPs. The interface between the IPs is very important for the proper communication. The on chip bus of the SOC is required to provide high bandwidth to allow multiple parallel operations. The AMBA AHB bus is widely used by most of the SOC designers because of its simplicity and its better architecture with low power. This project details the usage of AMBA AHB protocol for the transfer of image which can be used for the DSP applications.

Research paper thumbnail of IJARCET VOL 4 ISSUE 4 APR

 Abstract-Digital visual interface transmitter and receiver in a multimedia system allow for tra... more  Abstract-Digital visual interface transmitter and receiver in a multimedia system allow for transmitting of high definition video and audio data between the source and the receiver across a serial link at high speeds. This project highlights a detailed development of digital visual interface (DVI) transmitter and receiver in multimedia system. These include developing the architecture DVI receiver and transmitter, high speed serializer, clock and data recovery circuits and deserializer through the efficient use of FPGA resources. The project makes use of TMDS (Transition Minimized Differential Signaling) technique, that involves advanced TMDS encoding and decoding algorithms using DC balanced transmission, and helps reducing EMI over the transmission lines.

Research paper thumbnail of FPGA Implementation of Lightweight Cryptographic Algorithms-A Survey

Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms ... more Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms for security and confidentiality. Lightweight cryptography is used for resource limited devices such as radio frequency identification (RFID) tags, contactless smart cards, wireless sensor network, health care devices and internet of things (IoT). The comparative evaluations of these block ciphers on any platform is hard. In this paper comparative study of selected symmetric key lightweight block ciphers such as LED, HUMMINGBIRD, PRESENT, GRAIN-128, TEA, KTANTAN is presented.

Research paper thumbnail of Certificate of Publication INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY KIRAN KUMAR V.G MODELING OF FPGA AND MEMORY USING AMBA AHB FOR DSP APPLICATIONS

Research paper thumbnail of IMPLEMENTATION OF MONTGOMERY MODULAR MULTIPLICATION USING HIGH SPEED MULTIPLIER

Many algorithms for Public Key Cryptography, such as RSA, Elliptic Curve Cryptography and Diffie-... more Many algorithms for Public Key Cryptography, such as RSA, Elliptic Curve Cryptography and Diffie-Hellman are used for secure communication. These algorithms mainly use modular exponentiation as their basic operation. Modular exponentiation involves modular multiplication to be done repeatedly which is very costly for computations as there are large operands used. Therefore, time taken for computing is very large. Therefore, this computation time can be reduced immensely by Montgomery multiplication algorithm which is the most efficient modular multiplication algorithm available. It replaces the division by the modulus with a series of additions and divisions by numbers which are a power of 2 which is easier to compute. Montgomery multiplication algorithm involves three basic steps. 1. Conversion of operands to Montgomery domain. 2. Multiplication of operands. 3. Conversion of operands back to integer domain. The speed of the system mainly depends on multipliers and adder used in the system. Therefore, for multiplier architecture we have used Vedic multiplication which is faster than the other methods such as booth algorithm and array multiplier.

Research paper thumbnail of FPGA Implementation of Lightweight Cryptographic Algorithms-A Survey

Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms ... more Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms for security and confidentiality. Lightweight cryptography is used for resource limited devices such as radio frequency identification (RFID) tags, contactless smart cards, wireless sensor network, health care devices and internet of things (IoT). The comparative evaluations of these block ciphers on any platform is hard. In this paper comparative study of selected symmetric key lightweight block ciphers such as LED, HUMMINGBIRD, PRESENT, GRAIN-128, TEA, KTANTAN is presented.

Research paper thumbnail of VLSI IMPLEMENTATION OF ARITHMETIC OPERATION

Design of reducing area, high speed and power are the major areas in VLSI system design. In this ... more Design of reducing area, high speed and power are the major areas in VLSI system design. In this design parallel prefix adders are designed such as Kogge-stone adder, Breunt-Kung adder, Ladner-Fischer adder .Radix-4 Booth multiplier is designed by using Kogge-Stone adder. Vedic multiplier and Vedic division is used to reduced area, LUT tables and increase the speed. The design is synthesized using Xilinx ISE 10.1 design suite and done Cadence Encounter.

Research paper thumbnail of Implementation of Secure and Efficient Arm Based Cryptosystem

Security related concern is a major risk factor in wireless network to send and receive data. Des... more Security related concern is a major risk factor in wireless network to send and receive data. Designers of cryptography must cope with the trade-offs between security, cost, and performance. Symmetric ciphers serve mainly for message integrity checks, entity authentication, the AES algorithm have been developed and will likely lead to an increasing demand for lightweight ciphers that perform well in hardware. This paper has described a low-power; low-cost AES implementation on ARM processor will be high efficiency.AES Algorithm is compiled using GCC compiler in Ubuntu is targeting into an ARM Cortex A9 i.MX6 ALP board. After message data encryption the data is send through IR sensor to another node, while receiving data through sensor module the plain text is obtained by decryption. We get back the original message. The main aim of this work is to provide secured communication before actual data transmission between the source and destination.

Research paper thumbnail of Implementation of MSEA using 8 bit reversible ALU

Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryptio... more Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryption procedure includes arithmetic, rotation and XOR operations. MSEA is also a symmetric algorithm. A symmetric algorithm uses the same key for encryption as well as decryption. In this paper, we have a proposed a technique to make MSEA more efficient in terms of power and memory by using an 8 bit reversible arithmetic and logic unit (ALU). Reversible logic is an emerging technology. The fact that there is no loss of data amounts to the advantage of less power dissipation in the reversible logic. The 8 bit ALU to be used in the design will include operations like left rotation, right rotation, increment, XOR operation. These operations are implemented using the basic reversible gates like Feynman gate, Fredkin gate, Peres gate, HNG gate. These gates can also be used to do the basic operations like AND, NAND, OR, NOR gates.

Research paper thumbnail of Implementation of Modular Reduction and Modular Multiplication Algorithms

Secure and reliable system has become an important exaction in the modern day offices. With the e... more Secure and reliable system has become an important exaction in the modern day offices. With the evolution of office equipment's from handwritten notes to desktops to digital storage of confidential information regarding business, client and employee information has to be stored in a secure manner. Cryptography, process of making the information classified, switch it to a form that may be non-readable, keeping it safe from unauthorized people uses modular operations in many of its algorithms. Unlike other arithmetic operations the length of the output does not vary in modular operations. The length and the value of the output is within the prime number used in the modular operation also called as modulo. In this paper, three modular reduction algorithms and one modular multiplication algorithm is implemented. The algorithms are implemented in Xilinx 14.2 using Spartan 6 as the device. The results are tabulated in this paper.

Research paper thumbnail of Implementation of MSEA using 8 bit reversible ALU

Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryptio... more Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryption procedure includes arithmetic, rotation and XOR operations. MSEA is also a symmetric algorithm. A symmetric algorithm uses the same key for encryption as well as decryption. In this paper, we have a proposed a technique to make MSEA more efficient in terms of power and memory by using an 8 bit reversible arithmetic and logic unit (ALU). Reversible logic is an emerging technology. The fact that there is no loss of data amounts to the advantage of less power dissipation in the reversible logic. The 8 bit ALU to be used in the design will include operations like left rotation, right rotation, increment, XOR operation. These operations are implemented using the basic reversible gates like Feynman gate, Fredkin gate, Peres gate, HNG gate. These gates can also be used to do the basic operations like AND, NAND, OR, NOR gates.

Research paper thumbnail of A Survey on Various Lightweight Cryptographic Algorithms on FPGA

In today's rapid growing technology, digital data are exchanged very frequently in seamless wirel... more In today's rapid growing technology, digital data are exchanged very frequently in seamless wireless networks. Some of the real time applications examples which are transmitted quickly are voice, video, images and text but not limited to high sensitive information like transaction of creditcard, banking and confidential security numbers/data. Thus protection of confidential data is required with high security to avoid unauthorised access to Wireless networks. This can be done by a technique called 'Cryptograhy' and there are two crytography techniques available (such as symmetrical & asymmetrical techniques). The focus in this paper would be on Lightweight symmetric crytography. Lightweight cryptography is used for resource-limited devices such as radio frequency identification (RFID) tags, contactless smart cards and wireless sensor network. In this paper comparative study of selected lightweight symmetric block ciphers such as AES, PRESENT, TEA and HUMMINGBIRD is presented.

Research paper thumbnail of A Study and Comparison of Lightweight Cryptographic Algorithm

As internet is in enormous demand and it acts as a repository for the data and knowledge, there i... more As internet is in enormous demand and it acts as a repository for the data and knowledge, there is unremitting demand for real time implementation of cryptographic algorithms so that one can secure its data over this decentralized network and help in preserving the security of the system. Blowfish is a symmetric key cryptographic algorithm. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Xtea is extended tiny encryption algorithm which encipher the 64 bit input plain text with the help of 128 bit secret key, key is generated by using LFSR. 64 round operations is performed, it works based on fiestel network. this paper comapres XTEA and blowfish algorithms , analysis in terms of the power, delay, area, throughput, implemented on FPGA and finally concludes best algorithm among them.

Research paper thumbnail of Design and Implementation of Novel BRISI Lightweight Cipher for Resource Constrained Devices

Microprocessors and Microsystems, 2021

Abstract The Internet of Things (IoT) and cyber-physical systems (CPS) has grown exponentially ov... more Abstract The Internet of Things (IoT) and cyber-physical systems (CPS) has grown exponentially over the recent years, has motivated the development and deployment of the low resource devices for a wide range of applications in the IoT. Many such resource constrained devices are deployed to match the heterogeneous application requirements of IoT and CPS systems, wherein privacy and security have emerged, as the most difficult challenges, as the constrained devices are not been designed to have security features. This paper presents a lightweight cipher, based on ARX (Addition-Modulo, Rotation and XOR) operations, Fiestel structure, an amalgamation of BRIGHT and SIMON structure, hence the name BRISI. The cipher encrypts 32-bit plaintext using 64-bit key. The software implementation is performed using MATLAB tool and it fulfils the Avalanche criterion, Key-sensitivity, correlation coefficient, entropy and histogram. The proposed design is simulated using Xilinx Vivado and is implemented on Nexys-4 DDR Artix-7 and Basys-3 Artix-7 FPGA family and is evaluated for (LUT and register) power and timing

Research paper thumbnail of FPGA Implementation of Simple Encryption Scheme for Resource-Constrained Devices

International Journal of Advanced Trends in Computer Science and Engineering

Internet of things (IoT), where billions of devices are interconnected together, where a huge amo... more Internet of things (IoT), where billions of devices are interconnected together, where a huge amount of data is being exchanged between conventional and resource constrained devices and the security of the data remains a huge concern. While conventional cryptographic algorithms, cannot fit into resource constrained devices, the design of such ciphers (hence the term Lightweight Cipher) is a major challenge, while the three principles of the security triad Confidentiality, Integrity and Availability of the data doesn't change. In this paper, simple Lightweight ciphers based on ARX (Addition, Rotation and XOR) and MRX (Multiplication, Rotation and XOR) operations based on reversible logic and Vedic Mathematics are proposed. The addition and multiplication operations are implemented using Reversible Logic and Vedic Mathematics and a modified Montgomery algorithm is implemented to perform modular operation. The scheme is implemented using both software and hardware. The software implementation is done using MATLAB and the Histogram Analysis, Correlation Analysis and Entropy Analysis for the grayscale image are performed to verify the security of the image, and the simulations and synthesis are performed using Xilinx-Vivado verified on the Nexys-4 Artix-7 FPGA and compared with Virtex-6 FPGA and the performance of the ciphers is compared with the existing state-of-art work.

Research paper thumbnail of FPGA implementation of simple encryption scheme for resource-constrained devices

International Journal of Advanced Trends in Computer Science and Engineering, 2020

Internet of things (IoT), where billions of devices are interconnected together, where a huge amo... more Internet of things (IoT), where billions of devices are interconnected together, where a huge amount of data is being exchanged between conventional and resource constrained devices and the security of the data remains a huge concern. While conventional cryptographic algorithms, cannot fit into resource constrained devices, the design of such ciphers (hence the term Lightweight Cipher) is a major challenge, while the three principles of the security triad Confidentiality, Integrity and Availability of the data doesn't change. In this paper, simple Lightweight ciphers based on ARX (Addition, Rotation and XOR) and MRX (Multiplication, Rotation and XOR) operations based on reversible logic and Vedic Mathematics are proposed. The addition and multiplication operations are implemented using Reversible Logic and Vedic Mathematics and a modified Montgomery algorithm is implemented to perform modular operation. The scheme is implemented using both software and hardware. The software imp...

Research paper thumbnail of An Efficient VLSI Implementation of CDF 5/3 Architecture on FPGA For Image Processing Applications

Image Compression is basically defined as reducing the size of image without altering the picture... more Image Compression is basically defined as reducing the size of image without altering the picture quality of the original image. Various algorithms are currently available for compression of the images, among them the most prominent algorithms the wavelet transform. In recent technology Wavelet transform is named as cutting-edge technology for image processing applications. Discrete cosine transform (DCT) was previously used to compress the image. Due to the drawback of DCT i.e lower compression ratios and blocking artifacts we go for Wavelet transform which has higher compression ratios and PSNR compared to other compression algorithms. There are various types of Wavelets available. These wavelets can be broadly classified as lossy and lossless compression. Majority of Wavelets are lossy in nature. Only CDF 5/3 Wavelet transform is lossless in nature. Hence image processing application that is concerned on accuracy of the image can go for CDF 5/3 Wavelet transform. The proposed technique in this paper has efficient hardware architecture; the hardware is made simpler by eliminating the multipliers which was present in the existing system and replacing it with shifters. Also use of shifters in proposed system increases the frequency of operation of both 1D-DWT and 2D-DWT and also area is drastically reduced.

Research paper thumbnail of FPGA Implementation of Encryption Primitives

In my project, circuit design of an arithmetic module applied to cryptography i.e. Modulo Multipl... more In my project, circuit design of an arithmetic module applied to cryptography i.e. Modulo Multiplicative Inverse used in Montgomery algorithm is presented and results are simulated using Xilinx. This algorithm is useful in doing encryption algorithms in binary arithmetic because all computers only deal with binary numbers. Encryption algorithms rely on modulo arithmetic in which a modulus p is not a power of two unlike in binary arithmetic. This makes encryption algorithms more complex as we would need to carry out modulus p operations especially residue computation in binary arithmetic. Also encryption using this multiplicative inverse is presented with simulation results. This multiplicative inverse function has iterative computations of multiplication, division and subtraction with variable loop times.

Research paper thumbnail of Investigation into Power Quality Issue due to House Hold Equipments

With the ever increasing demand for electricity, conservation of energy is given importance. Conv... more With the ever increasing demand for electricity, conservation of energy is given importance. Conventional method of control is being replaced with electronic methods of control. With this harmonics are introduced into the power system. This is applicable to all types of electrical loads, industrial, domestic and commercial. As on now, the presence of harmonics in domestic sector is not monitored, as the quantity of electricity used by domestic sector is not significant as compared to industrial and commercial sector. Yet with the lighting sector dominated by CFL bulbs and LED bulbs, fans being controlled electronically and increasing use of desktops, laptops, laser printers, air conditioners etc., it is a matter of concern to study the harmonics produced by these devices and its effect on distribution transformer and neighbouring utility services. Harmonic analysis is done using expensive power analysers, digital storage oscilloscope etc., In this project a simple method of analysing harmonics is discussed. Initially the voltage and current drawn is sensed, fed to the computer using data acquisition card, total harmonics, 3 rd , 5 th , 7 th and 9 th harmonics, power factor etc., is measured. The average values of these is taken and represented as source in Matlab Simulink, passive filters are designed and analysed using simulation.

Research paper thumbnail of Implementation of Two Light Weight Cryptographic Algorithms

In recent years, one of the primary reasons that intruders can be successful is that most of the ... more In recent years, one of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in the form they can read and understand. Hence, Cryptography is one of the important features in secure communication .It makes use of key to encrypt the data so that the data sent cannot be accessed by unauthorized users. This paper focuses on Lightweight symmetric cryptography. Lightweight cryptography is used for resource-limited devices such as radio frequency identification tags smart card etc. American National Security Agency (NSA) proposed a new block cipher family named SIMON and the aim of SIMON design is to fill the gap for secure, flexible, and analyzable and to perform exceptionally well across the full spectrum of lightweight applications. International Data Encryption Algorithm (IDEA) is a block cipher aims at providing high level security not based on keeping the algorithm a secret, but rather upon ignorance of the secret key. In this project comparative study of selected lightweight symmetric block ciphers such as IDEA and SIMON are implemented using Xilinx ISE 14.2 simulator.

Research paper thumbnail of Modeling of FPGA and memory using AMBA AHB for DSP applications

The recent trends in the advancement of SOC chips along with the reusable IPs has led to the high... more The recent trends in the advancement of SOC chips along with the reusable IPs has led to the high demand of SOC in the market because of less cost and reduction in the time to market period. This demand has given rise to an issue of interfacing these IPs. The interface between the IPs is very important for the proper communication. The on chip bus of the SOC is required to provide high bandwidth to allow multiple parallel operations. The AMBA AHB bus is widely used by most of the SOC designers because of its simplicity and its better architecture with low power. This project details the usage of AMBA AHB protocol for the transfer of image which can be used for the DSP applications.

Research paper thumbnail of IJARCET VOL 4 ISSUE 4 APR

 Abstract-Digital visual interface transmitter and receiver in a multimedia system allow for tra... more  Abstract-Digital visual interface transmitter and receiver in a multimedia system allow for transmitting of high definition video and audio data between the source and the receiver across a serial link at high speeds. This project highlights a detailed development of digital visual interface (DVI) transmitter and receiver in multimedia system. These include developing the architecture DVI receiver and transmitter, high speed serializer, clock and data recovery circuits and deserializer through the efficient use of FPGA resources. The project makes use of TMDS (Transition Minimized Differential Signaling) technique, that involves advanced TMDS encoding and decoding algorithms using DC balanced transmission, and helps reducing EMI over the transmission lines.

Research paper thumbnail of FPGA Implementation of Lightweight Cryptographic Algorithms-A Survey

Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms ... more Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms for security and confidentiality. Lightweight cryptography is used for resource limited devices such as radio frequency identification (RFID) tags, contactless smart cards, wireless sensor network, health care devices and internet of things (IoT). The comparative evaluations of these block ciphers on any platform is hard. In this paper comparative study of selected symmetric key lightweight block ciphers such as LED, HUMMINGBIRD, PRESENT, GRAIN-128, TEA, KTANTAN is presented.

Research paper thumbnail of Certificate of Publication INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY KIRAN KUMAR V.G MODELING OF FPGA AND MEMORY USING AMBA AHB FOR DSP APPLICATIONS

Research paper thumbnail of IMPLEMENTATION OF MONTGOMERY MODULAR MULTIPLICATION USING HIGH SPEED MULTIPLIER

Many algorithms for Public Key Cryptography, such as RSA, Elliptic Curve Cryptography and Diffie-... more Many algorithms for Public Key Cryptography, such as RSA, Elliptic Curve Cryptography and Diffie-Hellman are used for secure communication. These algorithms mainly use modular exponentiation as their basic operation. Modular exponentiation involves modular multiplication to be done repeatedly which is very costly for computations as there are large operands used. Therefore, time taken for computing is very large. Therefore, this computation time can be reduced immensely by Montgomery multiplication algorithm which is the most efficient modular multiplication algorithm available. It replaces the division by the modulus with a series of additions and divisions by numbers which are a power of 2 which is easier to compute. Montgomery multiplication algorithm involves three basic steps. 1. Conversion of operands to Montgomery domain. 2. Multiplication of operands. 3. Conversion of operands back to integer domain. The speed of the system mainly depends on multipliers and adder used in the system. Therefore, for multiplier architecture we have used Vedic multiplication which is faster than the other methods such as booth algorithm and array multiplier.

Research paper thumbnail of FPGA Implementation of Lightweight Cryptographic Algorithms-A Survey

Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms ... more Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms for security and confidentiality. Lightweight cryptography is used for resource limited devices such as radio frequency identification (RFID) tags, contactless smart cards, wireless sensor network, health care devices and internet of things (IoT). The comparative evaluations of these block ciphers on any platform is hard. In this paper comparative study of selected symmetric key lightweight block ciphers such as LED, HUMMINGBIRD, PRESENT, GRAIN-128, TEA, KTANTAN is presented.

Research paper thumbnail of VLSI IMPLEMENTATION OF ARITHMETIC OPERATION

Design of reducing area, high speed and power are the major areas in VLSI system design. In this ... more Design of reducing area, high speed and power are the major areas in VLSI system design. In this design parallel prefix adders are designed such as Kogge-stone adder, Breunt-Kung adder, Ladner-Fischer adder .Radix-4 Booth multiplier is designed by using Kogge-Stone adder. Vedic multiplier and Vedic division is used to reduced area, LUT tables and increase the speed. The design is synthesized using Xilinx ISE 10.1 design suite and done Cadence Encounter.

Research paper thumbnail of Implementation of Secure and Efficient Arm Based Cryptosystem

Security related concern is a major risk factor in wireless network to send and receive data. Des... more Security related concern is a major risk factor in wireless network to send and receive data. Designers of cryptography must cope with the trade-offs between security, cost, and performance. Symmetric ciphers serve mainly for message integrity checks, entity authentication, the AES algorithm have been developed and will likely lead to an increasing demand for lightweight ciphers that perform well in hardware. This paper has described a low-power; low-cost AES implementation on ARM processor will be high efficiency.AES Algorithm is compiled using GCC compiler in Ubuntu is targeting into an ARM Cortex A9 i.MX6 ALP board. After message data encryption the data is send through IR sensor to another node, while receiving data through sensor module the plain text is obtained by decryption. We get back the original message. The main aim of this work is to provide secured communication before actual data transmission between the source and destination.

Research paper thumbnail of Implementation of MSEA using 8 bit reversible ALU

Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryptio... more Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryption procedure includes arithmetic, rotation and XOR operations. MSEA is also a symmetric algorithm. A symmetric algorithm uses the same key for encryption as well as decryption. In this paper, we have a proposed a technique to make MSEA more efficient in terms of power and memory by using an 8 bit reversible arithmetic and logic unit (ALU). Reversible logic is an emerging technology. The fact that there is no loss of data amounts to the advantage of less power dissipation in the reversible logic. The 8 bit ALU to be used in the design will include operations like left rotation, right rotation, increment, XOR operation. These operations are implemented using the basic reversible gates like Feynman gate, Fredkin gate, Peres gate, HNG gate. These gates can also be used to do the basic operations like AND, NAND, OR, NOR gates.

Research paper thumbnail of Implementation of Modular Reduction and Modular Multiplication Algorithms

Secure and reliable system has become an important exaction in the modern day offices. With the e... more Secure and reliable system has become an important exaction in the modern day offices. With the evolution of office equipment's from handwritten notes to desktops to digital storage of confidential information regarding business, client and employee information has to be stored in a secure manner. Cryptography, process of making the information classified, switch it to a form that may be non-readable, keeping it safe from unauthorized people uses modular operations in many of its algorithms. Unlike other arithmetic operations the length of the output does not vary in modular operations. The length and the value of the output is within the prime number used in the modular operation also called as modulo. In this paper, three modular reduction algorithms and one modular multiplication algorithm is implemented. The algorithms are implemented in Xilinx 14.2 using Spartan 6 as the device. The results are tabulated in this paper.

Research paper thumbnail of Implementation of MSEA using 8 bit reversible ALU

Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryptio... more Modified Symmetric Encryption Algorithm (MSEA) is an ARX algorithm. In other words, the encryption procedure includes arithmetic, rotation and XOR operations. MSEA is also a symmetric algorithm. A symmetric algorithm uses the same key for encryption as well as decryption. In this paper, we have a proposed a technique to make MSEA more efficient in terms of power and memory by using an 8 bit reversible arithmetic and logic unit (ALU). Reversible logic is an emerging technology. The fact that there is no loss of data amounts to the advantage of less power dissipation in the reversible logic. The 8 bit ALU to be used in the design will include operations like left rotation, right rotation, increment, XOR operation. These operations are implemented using the basic reversible gates like Feynman gate, Fredkin gate, Peres gate, HNG gate. These gates can also be used to do the basic operations like AND, NAND, OR, NOR gates.

Research paper thumbnail of A Survey on Various Lightweight Cryptographic Algorithms on FPGA

In today's rapid growing technology, digital data are exchanged very frequently in seamless wirel... more In today's rapid growing technology, digital data are exchanged very frequently in seamless wireless networks. Some of the real time applications examples which are transmitted quickly are voice, video, images and text but not limited to high sensitive information like transaction of creditcard, banking and confidential security numbers/data. Thus protection of confidential data is required with high security to avoid unauthorised access to Wireless networks. This can be done by a technique called 'Cryptograhy' and there are two crytography techniques available (such as symmetrical & asymmetrical techniques). The focus in this paper would be on Lightweight symmetric crytography. Lightweight cryptography is used for resource-limited devices such as radio frequency identification (RFID) tags, contactless smart cards and wireless sensor network. In this paper comparative study of selected lightweight symmetric block ciphers such as AES, PRESENT, TEA and HUMMINGBIRD is presented.

Research paper thumbnail of A Study and Comparison of Lightweight Cryptographic Algorithm

As internet is in enormous demand and it acts as a repository for the data and knowledge, there i... more As internet is in enormous demand and it acts as a repository for the data and knowledge, there is unremitting demand for real time implementation of cryptographic algorithms so that one can secure its data over this decentralized network and help in preserving the security of the system. Blowfish is a symmetric key cryptographic algorithm. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Xtea is extended tiny encryption algorithm which encipher the 64 bit input plain text with the help of 128 bit secret key, key is generated by using LFSR. 64 round operations is performed, it works based on fiestel network. this paper comapres XTEA and blowfish algorithms , analysis in terms of the power, delay, area, throughput, implemented on FPGA and finally concludes best algorithm among them.