Case Studies | Electronics & Communication Engineering | India | Volume 4 Issue 2, February 2015
A New Architecture of High Performance WG Stream Cipher
Grace Mary S., Abhila R. Krishna
Abstract: Cipher is an algorithm for transforming the message. Stream ciphers are light weight symmetric key cryptosystems. These ciphers encrypt a plain-text or decrypt a cipher-text by adding the plain-text or cipher-text bit by bit with the generated keystream bits. Welch-Gong (WG) stream cipher is a cryptographically secure stream cipher. The keystream necessary for generating the WG stream cipher is generated using Welch-Gong keystream generator. The architecture is designed in such a way to reduce the computational complexity by reducing the number of multipliers. The WG design uses the properties of the trace function by using type II optimal normal basis (ONB) representation to optimize the hardware cost in the WG transformation. In-order to reduce the complexity, some necessary signals needed to generate the initial feedback signal is eliminated and further recovered through a new module called Serialized Key Initialization Module (SKIM). The area overhead can be reduced and the performance can be increased by replacing the finite field multiplier used in the WG transformation by high speed Vedic multiplier. The architecture is synthesized using Xilinx ISE Design Suite13.2 and simulated using Xilinx ISim.
Keywords: Welch-Gong WG, Optimal Normal Basis ONB, Welch-Gong WG transformation, stream cipher, Serialized Key Initialization Module SKIM
Edition: Volume 4 Issue 2, February 2015,
Pages: 1169 - 1173
How to Cite this Article?
Grace Mary S., Abhila R. Krishna, "A New Architecture of High Performance WG Stream Cipher", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB151381, Volume 4 Issue 2, February 2015, 1169 - 1173
How to Share this Article?
Similar Articles with Keyword 'stream cipher'
Performance Analysis of JPEG2000 Images In a Compressed and Encrypted Domain Using Three Different Watermarking Techniques
Pallavi B, Sunil M P
Cryptography Algorithm based on DES and RSA in Bluetooth Communication
Veeresh K., Arunkumar Madupu
Similar Articles with Keyword 'WG'
PER Ratio and Bit Rate in Wi-Fi Network
Safaa Elnour Ibrahim, Dr. Khalid Hamid Bilal
Doppler Frequency Effect and BER Performance of FFT Based OFDM System
C Sreevidya, G Sunil
Similar Articles with Keyword 'Optimal'
Planning and Optimization Approach using Genetic Algorithms of a New Generation Cellular Network Capitalizing on the Existing Sites
Raphael Nlend, Emmanuel Tonye
Policy Based an Effective and Efficient Bandwidth Optimisation for Performance Enhancement of an Organisation
Ashok Kumar Tripathi, Ramesh Bharti
Similar Articles with Keyword 'Normal'
Design of Efficient Braun Multiplier for Arithmetic Applications
Robust Segmentation and Classification of Histopathological Image
Jincy Wilson, Vipin V. R.
Similar Articles with Keyword 'Basis'
Comparison of Fuzzy Logic and Neuro Fuzzy Air Purifying System
Tamsa, Amrit Kaur Bhullar
Design a Uplink-Downlink Reconfigurable Patch Antenna for Modern Space Application
Naman Mehrotra, Dr. K. M. Singh, Shashibhushan Sharma
Similar Articles with Keyword 'ONB'
Automatic Number Plate Recognition for use in Different Countries using Raspberry pi (Real Time Approach)
Radhika S. Dangare, Prof. G. D. Dalvi
Spatial Information System for Pico-Satellite Communication with Remote Monitoring Sensors
PHILIP-KPAE F.O, J. J. Biebuma