Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2013 by IJETT Journal
Volume-4 Issue-6                      
Year of Publication : 2013
Authors : Deepthi Barbara Nickolas , Mr. A. Sivasanka


Deepthi Barbara Nickolas , Mr. A. Sivasanka."Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions". International Journal of Engineering Trends and Technology (IJETT). V4(6):2438-2441 Jun 2013. ISSN:2231-5381. published by seventh sense research group.


Security makes the people to stay in the sense of vital modern technologica l improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the level of hardware which decid es the cost in trade basis. The work in this paper concentrates on KECCAK SHA - 3 algorit hm and the sponge construction encryption process with iterative permutation. Thus it leads to reduced amount of encryption time and more importantly provides the ultimate security level among the previous t echniques followed so far. The algorithm uses th e hashing function which is used for secured message authentication of data , digital signature s and password protection. The main advantage of this algorithm is it exhibits high level of parallelism. The hardware implementation process on FPGA is very fast and effective.


[1] N. Menon and P. W. Wong, “A buyer - seller watermarking protocol,” IEEE Trans. Signal Process.,vol.10 ,no.4,pp.643 - 649,Apr. 2001 .
[2] M.Johnson, P. Ishawar, V.M. Prabhakaran, D. Schonberg, and K. Ramachandran, ”On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp.2992 - 3006, Oct. 2004.
[3] M. Kuribayashi and H. Tanaka, ”Fingerp rinting protocol for images based on additive homomorphic property,”IEEE Trans Image Process., vol. 14, no.12,pp. 2129 - 2139, Dec. 2005.
[4] S. Lian, Z. Liu, Z.Ren, and H. Wang,”Commutative encryption and watermarking in video compression,” IEE Trans. Circ uit Syst. Video Technol., vol. 17,no. 6, pp. 774 - 778,Jun. 2007.
[5] Hassan. M. Elkamchouchi Mohamed E. Nasr Roayat Ismail Abdelfatah,” A new secure and fast hashing algorithm (SFHA - 256)” 25th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2008)
[6] T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86 - 97, Feb. 2009.
[7] Susana Eiroa, Iluminada Baturone, “ Hardware authentication based on P UFs and SHA - 3 2nd round candidates” IEEE ,2009.
[8] Liu Jian - dong, Tian Ye, Wang Shu - hong, Yang Kai, “ A Fast New One - Way Cryptographic Hash Function” IEEE 2010.
[9] Rubata Riasat, Imran Sarwar Bajwa, M. Zaman Ale , “A Hash - Based Approach for Colour Image Steganography” IEEE 2011.
[10] Ignacio Algredo - Badillo, Miguel Morales - Sandoval, Claudia Feregrino - Uribe, Ren ?e Cumplido, “Throughput and Efficiency Analysis of Unrolled Hardware Architectures for the SHA - 512 Hash Algorithm” IEEE 2012

Hashing, SHA - 3 Algorithm, S ponge function, Encryption, P ermutation.