Information Technology Reference
In-Depth Information
Especially proposed FRA implementations allocated resources are less compared
with AES [10] and IDEA [11] and competitive to DES [12]. The FRA of CIKS-1 and
SPECTR-H64 throughput is better compared with IDEA, AES and DES performance.
The proposed PA implementations have high speed performance. The achieved data
rate of PA is much better compared with DES, IDEA and FRA of CIKS-1 and
SPECTR-H64. The penalty of the PA high speed is the increased covered area re-
sources compared with the proposed FRA and the conventional block ciphers IDEA,
DES, and AES.
Although, the presented comparisons with the other encryption algorithms are
given in order to have a detailed overview of CIKS-1 and SPECTR-H64 implementa-
tions. Of course the compared encryption algorithms specifications and characteris-
tics are different, and we can not go on to fair comparisons results. But the illustrated
comparisons are very interesting to the researchers/implementers, for these two DDP-
based ciphers.
5
Conclusions
This paper focuses Data Dependent Permutations (DDP) implementation aspects, in
hardware devices. SPECTR-H64 and CIKS-1 are latest published powerful encryp-
tion algorithms, based on DDP transformations. The implementation cost in different
hardware devices (FPGA and ASIC) for DDP is presented in this work. The perform-
ance of DDP transformations is also introduced, for VLSI integration. Alternative
FPGA and ASICs implementations of both CIKS-1 and SPECTR-H64 are proposed.
The first, based on full rolling technique minimizes the area resources. The second
uses a pipelined development design and has high speed performance. The compari-
sons results, of both proposed architectures with the other block ciphers, proved that
DDP transformations give many promises for security implementations of communi-
cations systems of the future. CIKS-1 or alternative SPECTR-H64 can substitute
efficiently any existing cipher in applications with high speed demands. In addition to
the high achieved throughput, and the ensured security level, the minimized area
resources make these ciphers trustworthy solutions in both wired and wireless com-
munications world.
References
1. Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast Eencryption Algorithm SPECTR-
H64. Proceedings of the International workshop, Methods, Models, and Architectures for
Network Security, Lecture Notes in Computer Science, Berlin, Springer-Verlag, 2001,
vol. 2052, 275-286
2. Moldovyan, A.A., Moldovyan, N.A.: A Cipher Based on Data-Dependent Permutations.
Journal of Cryptology , Vol. 15 (2002) 61-72
3. Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Modern Cryptography:
Protect you Data with Fast Block Ciphers. Wayne, A-LIST Publishing (2003)
Search WWH ::




Custom Search