Title: Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices

Authors: R. Rajashree; Vijayakumar Peroumal; Lalit Kishore; K. Venkata Diwakar Reddy; Srujan Reddy; M. Jagannath

Addresses: School of Electronics Engineering, Vellore Institute of Technology, Chennai, India ' School of Electronics Engineering, Vellore Institute of Technology, Chennai, India ' School of Electronics Engineering, Vellore Institute of Technology, Chennai, India ' School of Electronics Engineering, Vellore Institute of Technology, Chennai, India ' School of Electronics Engineering, Vellore Institute of Technology, Chennai, India ' School of Electronics Engineering, Vellore Institute of Technology, Chennai, India

Abstract: Encryption and decryption is accomplished by means of software or hardware, and has been in continuous usage since the 2000s for data encryption using any communication medium. A modern authentication algorithm is introduced based on the AES algorithmic program and SHA algorithms to encrypt information for encrypted communication with improved security features. SHA shall be applied at the same time as the AES mechanism for secrecy, reliability and honesty checks. The core concept of algorithmic application is to achieve a high degree of data protection by integrating SHA and AES algorithmic programs in software and hardware. Both transmitter and receiver sections are included in the proposed model to safely send and receive data. It has been developed using Xilinx ISE 14.2, so that the parameters of the proposed algorithmic program can be compared with various different FPGAs and then further comparison of parameters along with DES algorithm may lead to satisfactory results.

Keywords: advanced encryption standard; AES; data encryption standard; DES; symmetric key cryptography; block ciphers; secure hash algorithm; field programmable gate array; FPGA; authentication.

DOI: 10.1504/IJESDF.2022.122578

International Journal of Electronic Security and Digital Forensics, 2022 Vol.14 No.3, pp.238 - 263

Received: 23 Jul 2020
Accepted: 12 Apr 2021

Published online: 03 May 2022 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article