Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: IMPLEMENTATION OF AES ENCRYPTION & DECRYPTION USING VERILOG
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
IMPLEMENTATION OF AES ENCRYPTION & DECRYPTION USING VERILOG

[attachment=24852]

INTRODUCTION

Over the last decade, there has been an accelerating increase in the accumulations and communication of digital data by government, industry and by other organizations in the private sector. The contents of these communicated and stored data often have very significant value and/or sensitivity. This chapter deals with need of security, types of security attacks, mechanisms and services.

Need for Security

During the earlier times, data was stored in physical documents. But, with the advent of technology the scenario has changed. To cope up with the changes, as padlocks and combinational locks do not suffice, we need new techniques to safeguard the data.
During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.

CRYPTOGRAPHY

Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through network communication paths. Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals, most algorithms can be broken and the information can be revealed if the attacker has enough time, desire, and resources. So a more realistic goal of cryptography is to make obtaining the information too work-intensive to be worth it to the attacker. The first encryption methods date back to 4,000 years ago and were considered more of an ancient art.

DES AND TRIPLE DES

Data Encryption Standard (DES) has had a long and rich history within the computer community. The National Institute of Standards and Technology (NIST) researched the need for the protection of computer systems during the 1960s and initiated a cryptography program in the early 1970s. NIST invited vendors to submit data encryption techniques to be used as a public cryptographic standard. IBM had been developing encryption algorithms to protect financial transactions. In 1974, IBM’s 128-bit algorithm, named Lucifer, was submitted and accepted. There was controversy about if the NSA weakened Lucifer on purpose to give the agency the ability to decrypt messages not intended for them, but in the end, Lucifer became a national cryptographic standard in 1977 and an American National Standards Institute (ANSI) standard in 1978.

Brief Description of Data Encryption Standard (DES)

DES has been implemented in a majority of commercial products using cryptography functionality and in almost all government agencies. It was tested and approved as one of the strongest and most efficient cryptographic algorithms available. The continued overwhelming support of the algorithm is what caused the most confusion when NSA announced in 1986 that as of January 1988, the agency would no longer endorse DES and that DES-based products would no longer fall under compliance of the Federal Standard 1027. The NSA felt that because DES had been so popular for so long, it would surely be targeted for penetration and become useless as an official standard. Many researches disagreed, but DSA wanted to move on to a newer, more secure, and less popular algorithm as the new standard.