Research Article |
A Compact Hardware Design and Implementation on FPGA Based Hybrid of AES and Keccak SHA3-512 for Enhancing Data Security
Author(s): K Janshi Lakshmi and G Sreenivasulu
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 12, Issue 1
Publisher : FOREX Publication
Published : 15 march 2024
e-ISSN : 2347-470X
Page(s) : 195-202
Abstract
Data security means protecting important information from unauthorised persons. In a security system, cryptography is the most secure method. Cryptography has many kinds, but the Advanced Encryption Standard (AES) is the most secure system. If combined with AES and Secure Hash Algorithm-3-512Bits (SHA3-512), it becomes compact, more secure, and more authenticated for data communications. The proposed methodology is a hybrid cryptography technique that combines AES with the SHA3-512 algorithm. This system becomes a strong, secure system and produces a strong cipher text. The proposed method AES/SHA3-512 is Hardware implementation on the Artix-7 FPGA family yields the lowest cost and highest hardware efficiency with a reduction in area usage of LUT 18.49%, Flip Flops 0.83%, and IO 3.8%. The proposed architecture is synthesised and simulated using the Vivado 2017.2 version Tool.
Keywords: Data Security
, Cryptography
, AES
, Keccak SHA3-512
, FPGA Artix-7
, Vivado
.
K Janshi Lakshmi*, Research Scholar (Full Time), Department of Electronics and Communication Engineering, Sri Venkateswara University, Tirupati, AndhraPradesh, India; Email: jansikaramala@gmail.com
G Sreenivasulu, Professor, Department of Electronics and Communication Engineering, Sri Venkateswara University, Tirupati, AndhraPradesh, India; Email: gunapatieee@rediffmail.com
-
[1] Advanced Encryption Standard, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, Standard FIPS-197,Nov. 2001.
-
[2] SHA-3 Standard: Permutation-Based Hash Extendable-Output Functions, National Institute of Standards and Technology (NIST), Gaithers burg, MD, USA, Standard FIPS PUB 202, Aug. 2015. [CrossRef]
-
[3] "Keccak Specification Summary", Keccak Team, [online] Available: https://keccak.team/keccak_specs_summary.html.
-
[4] Sheng-Jung Yu, Yu-Chi Lee, Liang-Hsin Lin, “An Energy-Efficient Double Ratchet Cryptographic Processor With Backward Secrecy for IoT Devices”, IEEE Journal of Solid-State Circuits ( Volume: 58, Issue: 6, June 2023), https://doi.org/10.1109/JSSC.2022.3220838. [CrossRef]
-
[5] Dur-e-Shahwar Kundi , Ayesha Khalid , Arshad Aziz, Chenghua Wang, Weiqiang Liu, “Resource-Shared Crypto-Coprocessor of AES Enc/Dec With SHA-3”, IEEE transactions on circuits and systems–i: regular papers, 1549-8328 © 2020 IEEE https://doi.org/10.1109/TCSI.2020.2997916. [CrossRef]
-
[6] Jayanti Sharma , Deepali Koppad , “Low Power and Pipelined Secure hashing Algorithm3(SHA-3)”, 2016 IEEE Annual India Conference (INDICON) , 2016, Electronic ISSN: 2325-9418, https://doi.org/10.1109/INDICON.2016.7839059. [CrossRef]
-
[7] Sara al-shara'a , Raid Khalid ibraheem , Oguz Bayat ,“Implementation of cryptanalysis based on FPGA hardware using AES with SHA-1” 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), ©2019 IEEE. https://doi.org/10.1109/SmartNets48225.2019.9069786. [CrossRef]
-
[8] Noveline Aziz Fauziah, Eko Hari Rachmawanto et al, “Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application”, IEEE Transactions on Dependable and Secure Computing ( Volume: 16, Issue: 2, 01 March-April 2019), https://doi.org/10.1109/TDSC.2017.2687463. [CrossRef]
-
[9] Huanyu Wang, Henian Li et al., “SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (Volume: 41, Issue: 3, March 2022), https://doi.org/10.1109/TCAD.2021.3063998. [CrossRef]
-
[10] P. William, Abha Choubey, G. S. Chhabra, Riju Bhattacharya, K. Vengatesan, Siddhartha Choubey, “Assessment of Hybrid Cryptographic Algorithm for Secure Sharing of Textual and Pictorial Content”, 2022 International Conference on Electronics and Renewable Systems (ICEARS), © 2022 IEEE, https://doi.org/10.1109/ICEARS53579.2022.9751932. [CrossRef]
-
[11] Wenjian Luo, Yamin Hu et al., “Authentication by Encrypted Negative Password”, IEEE Transactions on Information Forensics and Security ( Volume: 14, Issue: 1, January 2019), https://doi.org/10.1109/TIFS.2018.2844854. [CrossRef]
-
[12] K. Janshi Lakshmi and G. Sreenivasulu, “Design and Implementation of S-Box Using Galois Field Approach Based on LUT and Logic Gates for AES-256”, Proceedings of the International Conference on Intelligent Computing, Communication and Information Security, Algorithms for Intelligent Systems, Springer Nature, July 2023, https://doi.org/10.1007/978-981-99-1373-2_10. [CrossRef]
-
[13] Kazim Yumbul and Erkay Savas, “Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms”, The Computer Journal ( Volume: 58, Issue: 10, October 2015), IEEE, https://doi.org/10.1093/comjnl/bxu040. [CrossRef]
-
[14] Jalel Ktari, Tarek Frikha, Mohamed Ali Yousfi,Mohamed Kadhem Belghith, Nessrine Sanei."Embedded Keccak implementation on FPGA", 2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems(DTS),2022 https://doi.org/10.1109/DTS55284.2022.9809847. [CrossRef]
-
[15] Ling Ren, Christopher W. Fletcher, AlbertKwon, Marten van Dijk, Srinivas Devadas."Design and Implementation of the AscendSecure Processor",IEEE Transactions on Dependable and Secure Computing ( Volume: 16, Issue: 2, 01 March-April 2019)https://doi.org/10.1109/TDSC.2017.2687463. [CrossRef]